default search action
IACR Cryptology ePrint Archive, Volume 2024
Volume 2024, 2024
- Vasyl Ustimenko:
On short digital signatures with Eulerian transformations. 1 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López:
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs. 2 - Alex Kampa:
Simple Soundness Proofs. 3 - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Practical Two-party Computational Differential Privacy with Active Security. 4 - Tamir Tassa, Avishay Yanai:
The Multiple Millionaires' Problem. 5 - Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein:
Towards general-purpose program obfuscation via local mixing. 6 - Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. 7 - Alessandro Budroni, Isaac A. Canales-Martínez, Lucas Pandolfo Perin:
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography. 8 - Aviad Ben Arie, Tamir Tassa:
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation. 9 - Sulaiman Alhussaini, Craig Collett, Sergei Sergeev:
On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs. 10 - Daniel Noble, Brett Hemenway Falk, Rafail Ostrovsky:
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier. 11 - Behnam Zahednejad, Chong-zhi Gao:
Two-Round ID-PAKE with strong PFS and single pairing operation. 12 - Zhengjun Cao, Lihua Liu:
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era". 13 - Ahmet Ramazan Agirtas, Oguz Yayla:
A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup. 14 - Zhenkai Hu, Kang Yang, Yu Yu:
Unconditionally secure MPC for Boolean circuits with constant online communication. 15 - Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar:
Reducing the computational complexity of fuzzy identity-based encryption from lattice. 16 - Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang:
PT-symmetric mapping of three states and its implementation on a cloud quantum processor. 17 - Scott R. Fluhrer, Quynh Dang:
Smaller Sphincs+. 18 - Randy Kuang, Maria Perepechaenko, Dafu Lou, Brinda Tank:
Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes. 19 - Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, Christiane Weis:
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy. 20 - Gérald Gavin, Sandrine Tainturier:
Designing homomorphic encryptions with rational functions. 21 - San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. 22 - Mustafa Khairallah:
CCA Security with Short AEAD Tags. 23 - Muhammed Ali Bingöl, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu:
FlexHi: A Flexible Hierarchical Threshold. 24 - Siavash Riahi, Orfeas Stefanos Thyfronitis Litos:
Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures. 25 - Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-based Encryption on Ideal Lattices. 26 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. 27 - Hoeteck Wee, David J. Wu:
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. 28 - Aarav Varshney, Prashant Agrawal, Mahabir Prasad Jhanwar:
YouChoose: A Lightweight Anonymous Proof of Account Ownership. 29 - Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé:
Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs. 30 - Yi-Hsiu Chen, Yehuda Lindell:
Feldman's Verifiable Secret Sharing for a Dishonest Majority. 31 - Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens:
Verifiable FHE via Lattice-based SNARKs. 32 - Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, Li Fagen:
Security analysis and improvements on a semi-quantum electronic voting protocol. 33 - István András Seres, Péter Burcsi, Péter Kutas:
How (not) to hash into class groups of imaginary quadratic fields? 34 - Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg:
A New Approach to Efficient and Secure Fixed-point Computation. 35 - Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li:
Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack. 36 - Damien Robert, Nicolas Sarkis:
Computing 2-isogenies between Kummer lines. 37 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
On Computing the Multidimensional Scalar Multiplication on Elliptic Curves. 38 - Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, Bas Westerbaan:
X-Wing: The Hybrid KEM You've Been Looking For. 39 - Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang:
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. 40 - Aikata, Dhiman Saha, Sujoy Sinha Roy:
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault. 41 - Jan Bobolz, Jesus Diaz, Markulf Kohlweiss:
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. 42 - Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Fuzzy Identity Based Encryption with a flexible threshold value. 43 - Estuardo Alpirez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy:
Adaptive Distributional Security for Garbling Schemes with 풪(|x|) Online Complexity. 44 - Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu:
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion. 45 - Benjamin Dowling, Bhagya Wimalasiri:
Quantum-Secure Hybrid Communication for Aviation Infrastructure. 46 - Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani:
On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing. 47 - Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. 48 - Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu:
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis. 49 - Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Do You Need a Zero Knowledge Proof? 50 - Atul Luykx, Kenneth G. Paterson:
Limits on Authenticated Encryption Use in TLS. 51 - Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram:
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash. 52 - Michael Clear, Ciaran McGoldrick, Hitesh Tewari:
Anonymous Homomorphic IBE with Application to Anonymous Aggregation. 53 - Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. 54 - Yunxiao Zhou, Shengli Liu, Shuai Han:
Multi-Hop Fine-Grained Proxy Re-Encryption. 55 - Youcef Mokrani, David Jao:
Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion. 56 - Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. 57 - Sacha Servan-Schreiber:
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. 58 - Oren Ganon, Itamar Levi:
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors. 59 - Julius Hermelink, Kai-Chun Ning, Emanuele Strieder:
The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. 60 - Mengce Zheng:
Partial Key Exposure Attack on Common Prime RSA. 61 - WenBin Hsieh:
Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol. 62 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:
A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms. 63 - Pierrick Méaux, Qingju Wang:
Extreme Algebraic Attacks. 64 - Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink:
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation. 65 - Tolun Tosun, Amir Moradi, Erkay Savas:
Exploiting the Central Reduction in Lattice-Based Cryptography. 66 - Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-step Mode. 67 - Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs:
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation. 68 - Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. 69 - Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. 70 - Seyedmohammad Nouraniboosjin, Fatemeh Ganji:
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis. 71 - Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. 72 - Lipeng He:
A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications. 73 - Beyza Bozdemir, Betül Askin Özdemir, Melek Önen:
PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. 74 - Moumita Dutta, Chaya Ganesh, Neha Jawalkar:
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting. 75 - Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. 76 - Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. 77 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. 78 - Yanze Yang, Yiran Jia, Guangwu Xu:
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform. 79 - Samuel Jaques:
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions. 80 - Yulin Zhao, Hualin Zhou, Zhiguo Wan:
SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness. 81 - James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan:
Quantum State Obfuscation from Classical Oracles. 82 - Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan:
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers. 83 - Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko:
Efficient Instances of Docked Double Decker With AES. 84 - Dmitrii I. Koshelev:
Simultaneously simple universal and indifferentiable hashing to elliptic curves. 85 - Momonari Kudo, Kazuhiro Yokoyama:
On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases. 86 - Jung Hee Cheon, Hyeongmin Choe, Jai Hyun Park:
Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption. 87 - Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin:
Enabling PERK on Resource-Constrained Devices. 88 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Lidiia Nikiforova, Stanislav Smyshlyaev:
Two-party GOST in two parts: fruitless search and fruitful synthesis. 89 - Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. 90 - Vasyl Ustimenko:
On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography. 91 - Sofía Celi, Alex Davidson:
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. 92 - Xindong Liu, Li-Ping Wang:
Short Code-based One-out-of-Many Proofs and Applications. 93 - Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade:
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions. 94 - Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. 95 - Yasuhiko Ikematsu, Rika Akiyama:
Revisiting the security analysis of SNOVA. 96 - Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem:
Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures. 97 - Pierrick Méaux, Dibyendu Roy:
Theoretical differential fault attacks on FLIP and FiLIP. 98 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains. 99 - Luke Demarest, Sohaib Ahmad, Sixia Chen, Benjamin Fuller, Alexander Russell:
FiveEyes: Cryptographic Biometric Authentication from the Iris. 100 - Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji:
Unconditional Security using (Random) Anonymous Bulletin Board. 101 - Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, Alice Murphy:
Laconic Branching Programs from the Diffie-Hellman Assumption. 102 - Daniel Nager:
ChaCha related 64 bit oriented ARX cipher. 103 - Bo Jiang, Jian Du, Qiang Yan:
AnonPSI: An Anonymity Assessment Framework for PSI. 104 - Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti:
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. 105 - Ibrahim Yakut, Huseyin Polat:
A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy. 106 - Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. 107 - Angus Gruen:
Some Improvements for the PIOP for ZeroCheck. 108 - Jaehyung Kim, Jinyeong Seo, Yongsoo Song:
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. 109 - Peigen Li, Jintai Ding:
Cryptanalysis of the SNOVA signature scheme. 110 - Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. 111 - Matthias J. Kannwischer, Markus Krausz, Richard Petri, Shang-Yi Yang:
pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers. 112 - Wenhui Wu, Muzhou Li, Meiqin Wang:
Improved Linear Key Recovery Attacks on PRESENT. 113 - Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, Ingrid Verbauwhede:
Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC. 114 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤpe. 115 - Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel, Antoine Choffrut:
On the practical CPAD security of "exact" and threshold FHE schemes and libraries. 116 - Alex Pellegrini, Giovanni Tognolini:
Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes. 117 - Charles Gouert, Nektarios Georgios Tsoutsos:
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption. 118 - Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath:
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE. 119 - Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay:
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures. 120 - Stephen M. Williams:
An acceleration of the AKS prime identification algorithm. 121 - Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra:
SPRITE: Secure and Private Routing in Payment Channel Networks. 122 - Elette Boyle, Ilan Komargodski, Neekon Vafa:
Memory Checking Requires Logarithmic Overhead. 123 - Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks. 124 - Melike Çakmak, Ahmet Sinak, Oguz Yayla:
New self-orthogonal codes from weakly regular plateaued functions and their application in LCD codes. 125 - Emanuele Bellini, David Gérault, Matteo Protopapa, Matteo Rossi:
Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK. 126 - Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto:
Attacks Against the INDCPA-D Security of Exact FHE Schemes. 127 - Ehsan Ebrahimi:
Non-Binding (Designated Verifier) Signature. 128 - Gideon Samid:
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. 129 - Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
HADES: Automated Hardware Design Exploration for Cryptographic Primitives. 130 - Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders:
Practical Post-Quantum Signatures for Privacy. 131 - Rui Hao, Chenglong Yi, Weiqi Dai, Zhaonan Zhang:
SimpleFT: A Simple Byzantine Fault Tolerant Consensus. 132 - Meltem Sönmez Turan:
Optimizing Implementations of Boolean Functions. 133 - Sisi Duan, Yue Huang:
Byzantine Fault Tolerance with Non-Determinism, Revisited. 134 - Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, Liehuang Zhu:
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks. 135 - Jiawen Zhang, Jian Liu, Xinpeng Yang, Yinghao Wang, Kejia Chen, Xiaoyang Hou, Kui Ren, Xiaohu Yang:
Secure Transformer Inference Made Non-interactive. 136 - Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, Xiuzhen Cheng:
Sleepy Consensus in the Known Participation Model. 137 - Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu:
Correction Fault Attacks on Randomized CRYSTALS-Dilithium. 138 - David Heath:
Efficient Arithmetic in Garbled Circuits. 139 - Binbin Tu, Min Zhang, Yu Chen:
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps. 140 - Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida:
Secure Statistical Analysis on Multiple Datasets: Join and Group-By. 141 - Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, Hai Jin:
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency. 142 - Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, Xiaohu Yang:
Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security. 143 - Maria Corte-Real Santos, Craig Costello, Benjamin Smith:
Efficient (3,3)-isogenies on fast Kummer surfaces. 144 - Charlotte Hoffmann, Pavel Hubácek, Svetlana Ivanova:
Practical Batch Proofs of Exponentiation. 145 - Jonathan Komada Eriksen, Antonin Leroux:
Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications. 146 - Thorben Moos, Sayandeep Saha, François-Xavier Standaert:
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks. 147 - Charles Bouillaguet, Julia Sauvage:
Preliminary Cryptanalysis of the Biscuit Signature Scheme. 148 - Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. 149 - Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. 150 - Antonio Flórez-Gutiérrez, Yosuke Todo:
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing. 151 - Patrick Derbez, Marie Euler:
Equivalence of Generalised Feistel Networks. 152 - Robin Geelen:
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV. 153 - Aurélien Dupin, Simon Abelard:
Broadcast Encryption using Sum-Product decomposition of Boolean functions. 154 - Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats:
Fully Homomorphic Encryption on large integers. 155 - Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats:
Homomorphic sign evaluation using functional bootstrapping with a RNS representation of integers. 156 - Jeroen van de Graaf, Arjen K. Lenstra:
Delphi: sharing assessments of cryptographic assumptions. 157 - Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, Rohit Sinha:
HiSE: Hierarchical (Threshold) Symmetric-key Encryption. 158 - Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal:
Logstar: Efficient Linear* Time Secure Merge. 159 - Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, Hai Jin:
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast. 160 - Mingshu Cong, Tsz Hon Yuen, Siu Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. 161 - Kasra Abbaszadeh, Christodoulos Pappas, Dimitrios Papadopoulos, Jonathan Katz:
Zero-Knowledge Proofs of Training for Deep Neural Networks. 162 - Chun Guo, Xiao Wang, Kang Yang, Yu Yu:
On Tweakable Correlation Robust Hashing against Key Leakages. 163 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT. 164 - Brent Waters, David J. Wu:
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation. 165 - Hao Guo, Jintai Ding:
A Practical MinRank Attack Against VOX. 166 - Trevor Yap, Dirmanto Jap:
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. 167 - Hanwen Feng, Zhenliang Lu, Qiang Tang:
Breaking the Cubic Barrier: Distributed Key and Randomness Generation through Deterministic Sharding. 168 - Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM. 169 - Trevor Yap Hong Eng, Shivam Bhasin, Léo Weissbart:
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis. 170 - Tairong Huang, Shihe Ma, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. 171 - Zeyu Liu, Yunhao Wang:
Relaxed Functional Bootstrapping: A New Perspective on BGV/BFV Bootstrapping. 172 - Helger Lipmaa, Roberto Parisella, Janno Siim:
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. 173 - Randy Kuang:
QPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation Group. 174 - Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. 175 - Panos Kampanakis, Will Childs-Klein:
The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections. 176 - Qiaohan Chu, Li Lin, Chen Qian, Jie Chen:
Registered Functional Encryption for Quadratic Functions from MDDH. 177 - Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia:
Fast Public-Key Silent OT and More from Constrained Naor-Reingold. 178 - Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo:
Traitor Tracing without Trusted Authority from Registered Functional Encryption. 179 - Aya Fukami, Richard Buurke, Zeno Geradts:
Exploiting RPMB authentication in a closed source TEE implementation. 180 - Dongwon Lee, Seonhong Min, Yongsoo Song:
Functional Bootstrapping for FV-style Cryptosystems. 181 - Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, Yipu Wu:
FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network. 182 - Balthazar Bauer, Georg Fuchsbauer:
On Security Proofs of Existing Equivalence Class Signature Schemes. 183 - Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen:
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. 184 - Alexandre Belling, Azam Soleimanian, Bogdan Ursu:
Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge. 185 - Daniel Dobkin, Nimrod Cever, Itamar Levi:
RAD-FS - Inherent and Embedded SCA-Security in Ultra-Low Power IoTs. 186 - Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, Gohar M. Kyureghyan:
On the bijectivity of the map χ. 187 - Yanxue Jia, Varun Madathil, Aniket Kate:
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. 188 - Haoqian Zhang, Michelle Yeo, Vero Estrada-Galiñanes, Bryan Ford:
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution. 189 - Patrick Struck, Maximiliane Weishäupl:
Constructing Committing and Leakage-Resilient Authenticated Encryption. 190 - Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. 191 - Elette Boyle, Lisa Kohl, Zhe Li, Peter Scholl:
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism. 192 - Laura Maddison:
MQ Does Not Reduce to TUOV. 193 - Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso:
Helium: Scalable MPC among Lightweight Participants and under Churn. 194 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac A. Canales-Martínez, Jorge Chávez-Saab, Julio López:
PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs. 195 - Pierre Pébereau:
Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform. 196 - Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei:
Alba: The Dawn of Scalable Bridges for Blockchains. 197 - Sourav Das, Benny Pinkas, Alin Tomescu, Zhuolun Xiang:
Distributed Randomness using Weighted VRFs. 198 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing. 199 - Karl Kreder, Shreekara Shastry, Apostolos Tzinas, Sriram Vishwanath, Dionysis Zindros:
A Better Proof-of-Work Fork Choice Rule. 200 - Antonio Sanso:
Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders. 201 - Mark Manulis, Jérôme Nguyen:
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability. 202 - Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, Yuriy Polyakov:
Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use. 203 - Zeyu Liu, Eran Tromer, Yunhao Wang:
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. 204 - ChihYun Chuang, IHung Hsu, TingFang Lee:
A Generalized Distributed RSA Key Generation. 205 - Andi Liu, Yizhong Liu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Yuan Lu:
Kronos: A Robust Sharding Blockchain Consensus with Optimal Communication Overhead. 206 - Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, Brent Waters:
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness. 207 - Samuel Lavery:
Asymmetric Cryptography from Number Theoretic Transformations. 208 - Konstantinos Brazitikos, Vassilis Zikas:
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption. 209 - Dionysis Zindros, Apostolos Tzinas, David Tse:
Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers. 210 - Tao Zhang, Shang Shi, Md Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, Mark M. Tehranipoor:
INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems. 211 - Elijah Pelofske:
Analysis of a Programmable Quantum Annealer as a Random Number Generator. 212 - Charlotte Lefevre:
A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes. 213 - Michele Battagliola, Andrea Flamini:
Distributed Fiat-Shamir Transform. 214 - Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo:
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression. 215 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto:
Rate-1 Fully Local Somewhere Extractable Hashing from DDH. 216 - David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede:
Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption. 217 - Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs using Superposition. 218 - Pierre Pébereau:
Singular points of UOV and VOX. 219 - John Preuß Mattsson:
Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3. 220 - Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, Nektarios Georgios Tsoutsos:
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics. 221 - Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Factoring. 222 - Sri Aravinda Krishnan Thyagarajan, Ke Wu, Pratik Soni:
Game-Theoretically Fair Distributed Sampling. 223 - Nir Bitansky, Nathan Geier:
Amplification of Non-Interactive Zero Knowledge, Revisited. 224 - Yilei Chen, Xinyu Mao:
Universal Computational Extractors from Lattice Assumptions. 225 - Keita Emura, Shingo Sato, Atsushi Takayasu:
Attribute-based Keyed (Fully) Homomorphic Encryption. 226 - Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan:
Adaptively Sound Zero-Knowledge SNARKs for UP. 227 - Ren Taguchi, Atsushi Takayasu:
On the Untapped Potential of the Quantum FLT-based Inversion. 228 - Changrui Mu, Shafik Nassar, Ron D. Rothblum, Prashant Nalini Vasudevan:
Strong Batching for Non-Interactive Statistical Zero-Knowledge. 229 - Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu:
Analysis of Layered ROLLO-I. 230 - Eugene Frimpong, Alexandros Bakas, Camille Foucault, Antonis Michalas:
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices. 231 - Hyeonbum Lee, Jae Hong Seo:
On the Security of Nova Recursive Proof System. 232 - Vladimir Shpilrain, Bianca Sosnovski:
Cayley hashing with cookies. 233 - Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from just Passwords. 234 - Miranda Christ, Sam Gunn:
Pseudorandom Error-Correcting Codes. 235 - Hart Montgomery, Sikhar Patranabis:
Public-Key Cryptography through the Lens of Monoid Actions. 236 - Hao Chung, Tim Roughgarden, Elaine Shi:
Collusion-Resilience in Transaction Fee Mechanism Design. 237 - Sönke Jendral:
A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium. 238 - Hiroki Okada, Tsuyoshi Takagi:
Simulation-Secure Threshold PKE from Standard (Ring-)LWE. 239 - Nobuyuki Sugio:
Implementation of Cryptanalytic Programs Using ChatGPT. 240 - Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi:
Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings. 241 - Yifan Song, Xiaxi Ye:
Perfectly-Secure MPC with Constant Online Communication Complexity. 242 - Vipul Goyal, Chen-Da Liu-Zhang, Yifan Song:
Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience. 243 - Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, Mukul Kulkarni:
Don't Use It Twice! Solving Relaxed Linear Code Equivalence Problems. 244 - Xiaoyu Ji, Junru Li, Yifan Song:
Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience. 245 - Adam Blatchley Hansen, Jesper Buus Nielsen, Mark Simkin:
OCash: Fully Anonymous Payments between Blockchain Light Clients. 246 - Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. 247 - Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner:
FRIDA: Data Availability Sampling from FRI. 248 - Nir Bitansky, Sapir Freizeit:
Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes. 249 - Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger:
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi. 250 - Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer:
Communication-Optimal Convex Agreement. 251 - Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, Antoine Joux:
Short Signatures from Regular Syndrome Decoding, Revisited. 252 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai:
2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC. 253 - Brent Waters, Mark Zhandry:
Adaptive Security in SNARGs via iO and Lossy Functions. 254 - Hosein Hadipour, Patrick Derbez, Maria Eichlseder:
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. 255 - Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, Yiding Zhang:
Fiat-Shamir for Bounded-Depth Adversaries. 256 - Dan Boneh, Binyi Chen:
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems. 257 - Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng:
SoK: Decentralized Storage Network. 258 - Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, Xiuzhen Cheng:
Anonymity on Byzantine-Resilient Decentralized Computing. 259 - Antoine Joux, Julian Loss, Benedikt Wagner:
Kleptographic Attacks against Implicit Rejection. 260 - Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi:
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility. 261 - Tim Beyne, Addie Neyt:
Note on the cryptanalysis of Speedy. 262 - Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, Mingyuan Wang:
Threshold Encryption with Silent Setup. 263 - Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin:
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT. 264 - Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha:
Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits. 265 - Leo de Castro, Kevin Lewi, Edward Suh:
WhisPIR: Stateless Private Information Retrieval with Low Communication. 266 - Evan Laufer, Alex Ozdemir, Dan Boneh:
zkPi: Proving Lean Theorems in Zero-Knowledge. 267 - Minki Hhan:
A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More. 268 - Milad Seddigh, Seyed Hamid Baghestani:
A note on PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks. 269 - Samir Jordan Menon, David J. Wu:
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing. 270 - Janice Jianing Si, Tanusree Sharma, Kanye Ye Wang:
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem. 271 - Narendra Kumar Patel, Hemraj Shobharam Lamkuche:
Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers. 272 - Jonathan Trostle:
Information-Theoretic Homomorphic Encryption and 2-Party Computation. 273 - Heewon Chung, Hyojun Kim, Young-Sik Kim, Yongwoo Lee:
Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption. 274 - Chun Guo, Xiao Wang, Xiang Xie, Yu Yu:
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets. 275 - Jiseung Kim, Changmin Lee:
Reduce and Prange: Revisiting Prange's Information Set Decoding for LPN and RSD. 276 - Juliane Krämer, Mirjam Loiero:
Fault Attacks on UOV and Rainbow. 277 - Ulrich Haböck, David Levit, Shahar Papini:
Circle STARKs. 278 - River Moreira Ferreira, Ludovic Perret:
Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$. 279 - Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner:
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. 280 - Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, Hoeteck Wee:
Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup. 281 - Antoine Joux, Hunter Kippen, Julian Loss:
A Concrete Analysis of Wagner's k-List Algorithm over ℤp. 282 - Carmit Hazay, Yibin Yang:
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling. 283 - Baris Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala:
Practical Improvements to Statistical Ineffective Fault Attacks. 284 - Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. 285 - Jules Maire, Damien Vergnaud:
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head. 286 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. 287 - Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:
A generic algorithm for efficient key recovery in differential attacks - and its associated tool. 288 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice. 289 - Martin Mittelbach, Rafael F. Schaefer, Matthieu R. Bloch, Aylin Yener, Onur Günlü:
Secure Integrated Sensing and Communication under Correlated Rayleigh Fading. 290 - Samuel Bouaziz-Ermann, Garazi Muguruza:
Quantum Pseudorandomness Cannot Be Shrunk In a Black-Box Way. 291 - Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, Xue Liu:
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON. 292 - Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen:
Registered Attribute-Based Signature. 293 - Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate. 294 - Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Arnab Roy:
An Efficient Hash Function for Imaginary Class Groups. 295 - Yiming Gao, Jinghui Wang, Honggang Hu, Binang He:
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. 296 - Abhisar, Madhav Yadav, Girish Mishra:
Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography. 297 - Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher:
New Models for the Cryptanalysis of ASCON. 298 - Robin Leander Schröder, Stefan Gast, Qian Guo:
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. 299 - Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-like Hashing. 300 - David Lubicz, Viktor Fischer:
Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device. 301 - Tony Metger, Alexander Poremba, Makrand Sinha, Henry Yuen:
Pseudorandom unitaries with non-adaptive security. 302 - Arthur Lazzaretti, Charalampos Papamanthou:
Single Pass Client-Preprocessing Private Information Retrieval. 303 - Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou:
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. 304 - Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal. 305 - Intak Hwang, Jinyeong Seo, Yongsoo Song:
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions. 306 - Afonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot:
SweetPAKE: Key exchange with decoy passwords. 307 - Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot:
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM. 308 - Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Thari Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, Ozgur Sinanoglu:
NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack. 309 - Matthias Johann Steiner:
A Zero-Dimensional Gröbner Basis for Poseidon. 310 - Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, Akira Takahashi:
Aggregating Falcon Signatures with LaBRADOR. 311 - Benedikt Auerbach, Christoph U. Günther, Krzysztof Pietrzak:
Trapdoor Memory-Hard Functions. 312 - Matthias Johann Steiner:
The Complexity of Algebraic Algorithms for LWE. 313 - Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, Sujoy Sinha Roy:
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration. 314 - Christina Boura, Patrick Derbez, Margot Funk:
Alternative Key Schedules for the AES. 315 - Schuyler Rosefield, Abhi Shelat, LaKyah Tyner:
Threshold Garbled Circuits with Low Overhead. 316 - Giovanni Deligios, Mose Mizrahi Erbes:
Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus. 317 - Alexander Hoover, Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs. 318 - Vasyl Ustimenko:
On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings Z2s, s>1. 319 - Hanjun Li, Sela Navot, Stefano Tessaro:
POPSTAR: Lightweight Threshold Reporting with Reduced Leakage. 320 - Vincent Hwang:
Formal Verification of Emulated Floating-Point Arithmetic in Falcon. 321 - Weixi Zheng, Liu Zhang, Zilong Wang:
Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis. 322 - Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang:
Circuit Bootstrapping: Faster and Smaller. 323 - Jake Januzelli, Lawrence Roy, Jiayu Xu:
Under What Conditions Is Encrypted Key Exchange Actually Secure? 324 - Benedikt Bünz, Jessica Chen:
Proofs for Deep Thought: Accumulation for large memories and deterministic computations. 325 - Nicolas Alhaddad, Mayank Varia, Ziling Yang:
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications. 326 - Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. 327 - Cécile Delerablée, Lénaïck Gouriou, David Pointcheval:
Attribute-Based Signatures with Advanced Delegation, and Tracing. 328 - Houda Ferradi:
How to Validate a Verification? 329 - Aron van Baarsen, Sihang Pu:
Fuzzy Private Set Intersection with Large Hyperballs. 330 - Maryam Bahrani, Pranav Garimidi, Tim Roughgarden:
Transaction Fee Mechanism Design in a Post-MEV World. 331 - Yuval Ishai, Yifan Song:
Leakage-Tolerant Circuits. 332 - Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the DME Signature Scheme. 333 - Jeremiah Blocki, Blake Holman, Seunghoon Lee:
The Impact of Reversibility on Parallel Pebbling. 334 - Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro:
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages. 335 - Khai Hanh Tang, Minh Pham, Chan Nam Ngo:
RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs. 336 - Valerie Gilchrist, Laurane Marco, Christophe Petit, Gang Tang:
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme. 337 - Itai Dinur:
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. 338 - Gianluca Brian, Stefan Dziembowski, Sebastian Faust:
From Random Probing to Noisy Leakages Without Field-Size Dependence. 339 - Brent Waters:
A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors. 340 - Leo de Castro, Keewoo Lee:
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers. 341 - Jiahui He, Kai Hu, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium. 342 - Yang Gao:
Partial Differential Fault Analysis on Ascon. 343 - Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. 344 - Guoqing Zhou, Maozhi Xu:
An Efficient Adaptive Attack Against FESTA. 345 - Maria Ferrara, Antonio Tortora, Maria Tota:
A data aggregation protocol based on TFHE. 346 - Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. 347 - David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, Tina Zhang:
A Computational Tsirelson's Theorem for the Value of Compiled XOR Games. 348 - Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on SHA-2. 349 - Yingxin Li, Fukang Liu, Gaoli Wang:
Automating Collision Attacks on RIPEMD-160. 350 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:
Improved Differential Meet-In-The-Middle Cryptanalysis. 351 - Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. 352 - Felicitas Hörmann, Wessel P. J. van Woerden:
FuLeakage: Breaking FuLeeca by Learning Attacks. 353 - Lev Soukhanov:
WARPfold : Wrongfield ARithmetic for Protostar folding. 354 - Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai:
Adaptively Secure Streaming Functional Encryption. 355 - Kai-Min Chung, Eli Goldin, Matthew Gray:
On Central Primitives for Quantum Cryptography with Classical Communication. 356 - Douglas Stebila:
Security analysis of the iMessage PQ3 protocol. 357 - Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, Debiao He:
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication. 358 - Caicai Chen, Chris Jones:
Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique. 359 - Yassine Hamoudi, Qipeng Liu, Makrand Sinha:
The NISQ Complexity of Collision Finding. 360 - Jiaxin Pan, Doreen Riepel, Runzhi Zeng:
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation. 361 - Shan Chen, Marc Fischlin:
Integrating Causality in Messaging Channels. 362 - Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel:
Time-Averaged Analysis of Selfish Mining in Bitcoin. 363 - Lars Ran, Simona Samardjiska, Monika Trimoska:
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem. 364 - Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Combined Threshold Implementation. 365 - Dipayan Das, Antoine Joux:
Key Recovery Attack on the Partial Vandermonde Knapsack Problem. 366 - Markku-Juhani O. Saarinen:
Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit. 367 - Anand Kumar Narayanan, Youming Qiao, Gang Tang:
Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants. 368 - David Heath, Vladimir Kolesnikov, Lucien K. L. Ng:
Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts. 369 - Daniel Escudero, Yifan Song, Wenhao Wang:
Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus. 370 - Seungjun Baek, Giyoon Kim, Jongsung Kim:
Preimage Attacks on Reduced-Round Ascon-Xof. 371 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan:
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate. 372 - Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, Uri Stemmer:
Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries. 373 - You Lyu, Shengli Liu, Shuai Han:
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World. 374 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search. 375 - Gilad Asharov, Anirudh Chandramouli:
Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS. 376 - Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert:
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking. 377 - Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, Ulrich Rührmair:
Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips. 378 - Elizabeth C. Crites, Aggelos Kiayias, Amirreza Sarencheh:
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity. 379 - Jan Buzek, Stefano Tessaro:
Collision Resistance from Multi-Collision Resistance for all Constant Parameters. 380 - Haotian Shi, Xiutao Feng:
Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure. 381 - Chirag Madaan, Rohan Agarwal, Vipul Saini, Ujjwal Kumar:
Decentralized Access Control Infrastructure for Enterprise Digital Asset Management. 382 - Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran:
Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers. 383 - Truman Welling, Onur Günlü, Aylin Yener:
Transmitter Actions for Secure Integrated Sensing and Communication. 384 - Michel Seck, Abderrahmane Nitaj:
A New Public Key Cryptosystem Based on the Cubic Pell Curve. 385 - Christopher Harth-Kitzerow, Georg Carle:
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings. 386 - Wenqing Hu, Tianyi Liu, Ye Zhang, Yuncong Zhang, Zhenfei Zhang:
Parallel Zero-knowledge Virtual Machine. 387 - Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang:
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding. 388 - Tomer Ashur, Carmit Hazay, Rahul Satish:
On the Feasibility of Sliced Garbling. 389 - Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev:
STIR: Reed-Solomon Proximity Testing with Fewer Queries. 390 - Daniel Escudero, Ivan Tjuawinata, Chaoping Xing:
On Information-Theoretic Secure Multiparty Computation with Local Repairability. 391 - Zhuang Shan, Leyou Zhang, Qing Wu:
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle. 392 - Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima:
Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409 in One Day. 393 - Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, Hongwei Wang:
A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System. 394 - Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos:
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators. 395 - Theresa Krüger:
On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology. 396 - Dan Boneh, Iftach Haitner, Yehuda Lindell:
Exponent-VRFs and Their Applications. 397 - Oana Ciobotaru, Maxim Peter, Vesselin Velichkov:
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK. 398 - Yanyi Liu, Rafael Pass:
A Direct PRF Construction from Kolmogorov Complexity. 399 - Max Duparc, Tako Boris Fouotsa, Serge Vaudenay:
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks. 400 - Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, Ron Steinfeld:
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures. 401 - Xinpeng Yang, Liang Cai, Yinghao Wang, Lu Sun, Jingwei Hu:
Efficient Unbalanced Quorum PSI from Homomorphic Encryption. 402 - Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira:
DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication. 403 - Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, Zheng Wu:
Breaking the DECT Standard Cipher with Lower Time Cost. 404 - Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Secret Sharing: Strong Security and Efficient Constructions. 405 - Damien Robert:
Some notes on algorithms for abelian varieties. 406 - Charlotte Lefevre, Bart Mennink:
Permutation-Based Hashing Beyond the Birthday Bound. 407 - Hongbo Wen, Hanzhi Liu, Shuyang Tang, Shuhan Cao, Domo, Yu Feng:
Modular Indexer: Fully User-Verified Execution Layer for Meta-Protocols on Bitcoin. 408 - Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa:
Nebula: A Privacy-First Platform for Data Backhaul. 409 - Hilarie Orman:
Recent Progress in Quantum Computing Relevant to Internet Security. 410 - Henry Bambury, Hugo Beguinet, Thomas Ricosset, Éric Sageloli:
Polytopes in the Fiat-Shamir with Aborts Paradigm. 411 - Slim Bettaieb, Alessandro Budroni, Marco Palumbi, Décio Luiz Gazzoni Filho:
Quasi-Optimal Permutation Ranking and Applications to PERK. 412 - Juan Carlos Ku-Cauich, Javier Diaz-Vargas, Sara Mandujano-Velazquez:
Bent functions construction using extended Maiorana-McFarland's class. 413 - Joseph Carolan, Alexander Poremba:
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations. 414 - Lei Fan, Zhenghao Lu, Hong-Sheng Zhou:
Column-wise Garbling, and How to Go Beyond the Linear Model. 415 - Wilson D. Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh:
Mangrove: A Scalable Framework for Folding-based SNARKs. 416 - Hongyuan Qu, Guangwu Xu:
An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic. 417 - Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko:
Atomic and Fair Data Exchange via Blockchain. 418 - Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, Anat Paskin-Cherniavsky:
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs. 419 - Noam Mazor, Rafael Pass:
Gap MCSP is not (Levin) NP-complete in Obfustopia. 420 - Xiangyu Hui, Sid Chi-Kin Chau:
LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup. 421 - Deepak Kumar Dalai, Krishna Mallick:
A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. 422 - Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan:
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores. 423 - Flávio Bergamaschi, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, Rui Tang:
On the Concrete Security of Approximate FHE with Noise-Flooding Countermeasures. 424 - Marshall Ball, Yanyi Liu, Noam Mazor, Rafael Pass:
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement. 425 - Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang:
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. 426 - Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. 427 - Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das:
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V. 428 - Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, Sacha Servan-Schreiber:
FOLEAGE: 픽4OLE-Based Multi-Party Computation for Boolean Circuits. 429 - Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang:
SoK: Zero-Knowledge Range Proofs. 430 - Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert:
Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version. 431 - Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra:
Perfect Asynchronous MPC with Linear Communication Overhead. 432 - Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling:
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience. 433 - Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption without Pairings. 434 - Emanuele Giunta, Alistair Stewart:
Unbiasable Verifiable Random Functions. 435 - Conrado Porto Lopes Gouvêa, Chelsea Komlo:
Re-Randomized FROST. 436 - Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. 438 - Enrico Piccione:
Threshold implementations of cryptographic functions between finite Abelian groups. 439 - Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau:
Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA. 440 - Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet:
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields. 441 - Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang:
Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking. 442 - Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. 443 - Mario Yaksetig:
A trust-minimized e-cash for cryptocurrencies. 444 - Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy:
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions. 445 - Ahmed S. Bendary, Wendson A. S. Barbosa, Andrew Pomerance, C. Emre Koksal:
Estimating the Unpredictability of Multi-Bit Strong PUF Classes. 446 - Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, Sebastian Steinhorst:
ORIGO: Proving Provenance of Sensitive Data with Constant Communication. 447 - Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey:
Differential Cryptanalysis of a Lightweight Block Cipher LELBC. 448 - Nabil Alkeilani Alkadri, Nico Döttling, Sihang Pu:
Practical Lattice-Based Distributed Signatures for a Small Number of Signers. 449 - Ward Beullens, Lucas Dodgson, Sebastian H. Faller, Julia Hesse:
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations. 450 - Louis Tremblay Thibault, Michael Walter:
Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2. 451 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Modeling Mobile Crash in Byzantine Consensus. 452 - Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang:
Verifiable Information-Theoretic Function Secret Sharing. 453 - Zhengjun Cao, Zhenfu Cao:
The Systemic Errors of Banded Quantum Fourier Transformation. 454 - Connor Bell, Saba Eskandarian:
Anonymous Complaint Aggregation for Secure Messaging. 455 - Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam:
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction. 456 - Lena Heimberger, Florian Lugstein, Christian Rechberger:
Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern. 457 - Maya Chartouny, Benoit Cogliati, Jacques Patarin:
Classical and Quantum Generic Attacks on 6-round Feistel Schemes. 458 - Luca De Feo, Tako Boris Fouotsa, Lorenz Panny:
Isogeny problems with level structure. 459 - Lorenzo Rovida, Alberto Leporati:
Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption. 460 - Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch:
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. 461 - Tom Gur, Jack O'Connor, Nicholas Spooner:
Perfect Zero-Knowledge PCPs for #P. 462 - Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, Bahattin Yildiz:
Security Guidelines for Implementing Homomorphic Encryption. 463 - Doryan Lesaignoux, Mikael Carmona:
On the Implementation of a Lattice-Based Daa for VANET System. 464 - Dung Bui:
Shorter VOLEitH Signature from Multivariate Quadratic. 465 - Chelsea Komlo, Ian Goldberg:
Arctic: Lightweight and Stateless Threshold Schnorr Signatures. 466 - Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu:
Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures. 467 - Matthias Johann Steiner:
Zero-Dimensional Gröbner Bases for Rescue-XLIX. 468 - Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Malicious Security for Sparse Private Histograms. 469 - Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud:
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations. 470 - Silvia Sconza, Arno Wildi:
Knot-based Key Exchange protocol. 471 - Nibesh Shrestha, Aniket Kate, Kartik Nayak:
Sailfish: Towards Improving Latency of DAG-based BFT. 472 - Mario Yaksetig:
Extremely Simple (Almost) Fail-Stop ECDSA Signatures. 473 - Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, William Wang:
Accumulation without Homomorphism. 474 - Matthew Gregoire, Rachel Thomas, Saba Eskandarian:
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs. 475 - Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, Jinsong Han:
OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning. 476 - Zheyuan He, Zihao Li, Sen Yang:
Large Language Models for Blockchain Security: A Systematic Literature Review. 477 - Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, Jian Wang, Jingyi Feng:
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions. 478 - Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang:
Making Hash-based MVBA Great Again. 479 - Wilbert Wu:
Folding-based zkLLM. 480 - Charlotte Hoffmann, Krzysztof Pietrzak:
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation. 481 - Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou:
Single Server PIR via Homomorphic Thorp Shuffles. 482 - Orhun Kara:
Lower data attacks on Advanced Encryption Standard. 483 - Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin:
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives. 484 - Florette Martinez:
A Variation on Knellwolf and Meier's Attack on the Knapsack Generator. 485 - Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Encryption: New Constructions and Homomorphic Realizations. 486 - Zvika Brakerski, Nir Magrafta:
Real-Valued Somewhat-Pseudorandom Unitaries. 487 - Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. 488 - Zhe Cen, Xiutao Feng, Zhangyi Wang, Yamin Zhu, Chunping Cao:
Guess and Determine Analysis Based on Set Split. 489 - Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl:
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. 490 - Christian Badertscher, Monosij Maitra, Christian Matt, Hendrik Waldner:
Updatable Policy-Compliant Signatures. 491 - Cameron Foreman, Richie Yeung, Florian J. Curchod:
Statistical testing of random number generators and their improvement using randomness extraction. 492 - Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac:
Reckle Trees: Updatable Merkle Batch Proofs with Applications. 493 - István Vajda:
HW-token-based Common Random String Setup. 494 - Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-code-based Signature Schemes. 495 - Thomas Espitau, Shuichi Katsumata, Kaoru Takemure:
Two-Round Threshold Signature from Algebraic One-More Learning with Errors. 496 - István Vajda:
On the Security of Data Markets and Private Function Evaluation. 497 - Jingwei Hu, Yuhong Fang, Wangchen Dai:
Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology. 498 - Jonas Meers, Doreen Riepel:
CCA Secure Updatable Encryption from Non-Mappable Group Actions. 499 - Scott R. Fluhrer:
Side Channel Resistant Sphincs+. 500 - Kwangsu Lee:
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation. 501 - Neyire Deniz Sarier:
Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain. 502 - Alexander Bienstock, Kevin Yeo:
Two Levels are Better than One: Dishonest Majority MPC with $\widetilde{O}(|C|)$ Total Communication. 503 - Benjamin E. Diamond, Jim Posen:
Polylogarithmic Proofs for Multilinears over Binary Towers. 504 - Victor Youdom Kemmoe, Anna Lysyanskaya:
RSA-Based Dynamic Accumulator without Hashing into Primes. 505 - Olive Chakraborty, Aymen Boudguiga:
A Decentralized Federated Learning using Reputation. 506 - Jehyuk Jang, Jamie Judd:
An Efficient SNARK for Field-Programmable and RAM Circuits. 507 - Jules Maire, Damien Vergnaud:
Secure Multi-Party Linear Algebra with Perfect Correctness. 508 - Eli Orvis:
Distribution of cycles in supersingular ℓ-isogeny graphs. 509 - Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang:
DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. 510 - Cezary Pilaszewicz, Lea R. Muth, Marian Margraf:
A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes. 511 - Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, Shuyi Chen:
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium. 512 - Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo:
Quantum Implementation and Analysis of SHA-2 and SHA-3. 513 - Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, Shixiao Sun:
Zero-Knowledge Proof Vulnerability Analysis and Security Auditing. 514 - Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang:
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE. 515 - Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang:
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages. 516 - Damien Robert:
Fast pairings via biextensions and cubical arithmetic. 517 - Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho:
Software-Defined Cryptography: A Design Feature of Cryptographic Agility. 518 - Sulaiman Alhussaini, Sergei Sergeev:
On implementation of Stickel's key exchange protocol over max-min and max-T semirings. 519 - Fernando Virdia, Mia Filic:
A note on securing insertion-only Cuckoo filters. 520 - Tomoki Moriya:
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram. 521 - Mahender Kumar:
Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. 522 - Sophie Schmieg:
Unbindable Kemmy Schmidt: ML-KEM is neither MAL-BIND-K-CT nor MAL-BIND-K-PK. 523 - Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Andrew Zitek-Estrada:
A Time-Space Tradeoff for the Sumcheck Prover. 524 - Marina Blanton, Dennis Murphy:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. 525 - Yi-Hsiu Chen, Yehuda Lindell:
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero-Knowledge. 526 - Taechan Kim:
Slice more? It leaks: Analysis on the paper "On the Feasibility of Sliced Garbling". 527 - Momonari Kudo, Kazuhiro Yokoyama:
The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences. 528 - Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, Younho Lee:
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest. 529 - Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay:
An efficient key generation algorithm for GR-NTRU over dihedral group. 530 - Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Celestin Nkuimi Jugnia:
Avoiding Trusted Setup in Isogeny-based Commitments. 531 - Martin R. Albrecht, Kenneth G. Paterson:
Analysing Cryptography in the Wild - A Retrospective. 532 - Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame:
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation. 533 - Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. 534 - Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei:
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree. 535 - Mihir Bellare, Doreen Riepel, Laura Shea:
Highly-Effective Backdoors for Hash Functions and Beyond. 536 - Wenxuan Wu, Soamar Homsi, Yupeng Zhang:
Confidential and Verifiable Machine Learning Delegations on the Cloud. 537 - Qiping Lin, Fengmei Liu:
A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99. 538 - Daniel Larsson:
Supersingular Hashing using Lattès Maps. 539 - Russell W. F. Lai, Giulio Malavolta:
Lattice-Based Timed Cryptography. 540 - Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank. 541 - Jun Xu, Zhiwei Li, Lei Hu:
Breaking Bicoptor from S&P 2023 Based on Practical Secret Recovery Attack. 542 - Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin:
A Note on the Common Haar State Model. 543 - Novak Kaluderovic, Nan Cheng, Katerina Mitrokotsa:
A post-quantum Distributed OPRF from the Legendre PRF. 544 - Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian:
Optimal Asynchronous Byzantine Consensus with Fair Separability. 545 - Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. 546 - Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, Harshal Shah:
Efficient Permutation Correlations and Batched Random Access for Two-Party Computation. 547 - Décio Luiz Gazzoni Filho, Tomás Recio, Julio López:
Efficient isochronous fixed-weight sampling with applications to NTRU. 548 - Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang:
Integral Attack on the Full FUTURE Block Cipher. 549 - Mustafa Khairallah:
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. 550 - Nimish Mishra, Debdeep Mukhopadhyay:
Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography. 551 - Mario Yaksetig:
Insights from building a blockchain-based metaverse. 552 - Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang:
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations. 553 - Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song:
Leakage-Abuse Attacks Against Structured Encryption for SQL. 554 - Yilei Chen:
Quantum Algorithms for Lattice Problems. 555 - Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann:
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. 556 - Charlotte Lefevre, Bart Mennink:
Permutation-Based Hash Chains with Application to Password Hashing. 557 - Damien Robissout, Lilian Bossuet, Amaury Habrard:
Scoring the predictions: a way to improve profiling side-channel attacks. 558 - Axel Mertens, Georgio Nicolas, Sergi Rovira:
Convolution-Friendly Image Compression in FHE. 559 - Robin Berger, Felix Dörre, Alexander Koch:
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption. 560 - Farzin Renan, Péter Kutas:
SQIAsignHD: SQIsignHD Adaptor Signature. 561 - Harjasleen Malvai, Gregory Neven, Andrew Miller, Siam Hussain:
Practical Proofs of Parsing for Context-free Grammars. 562 - Xavier Bonnetain, Virginie Lallemand:
A Note on Related-Tweakey Impossible Differential Attacks. 563 - Alexander May, Massimo Ostuzzi:
Multiple Group Action Dlogs with(out) Precomputation. 564 - Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun:
On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver. 565 - Foo Yee Yeo, Jason H. M. Ying:
A Near-Linear Quantum-Safe Third-Party Private Set Intersection Protocol. 566 - Aron van Baarsen, Marc Stevens:
Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting. 567 - Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl:
Communication-Efficient Multi-Party Computation for RMS Programs. 568 - Johannes Ottenhues:
An overview of symmetric fuzzy PAKE protocols. 569 - Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang:
Large-Scale Private Set Intersection in the Client-Server Setting. 570 - Thomas Locher, Victor Shoup:
MiniCast: Minimizing the Communication Complexity of Reliable Broadcast. 571 - Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark W. Barrett, Isil Dillig:
Split Gröbner Bases for Satisfiability Modulo Finite Fields. 572 - Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. 573 - Jannik Zeitschner, Amir Moradi:
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software. 574 - Shiping Cai, Kaizhan Lin, Chang-An Zhao:
Pairing Optimizations for Isogeny-based Cryptosystems. 575 - Ivan Buchinskiy, Matvei Kotov, Alexander Treier:
On complexity of the problem of solving systems of tropical polynomial equations of degree two. 576 - Said Eddahmani, Sihem Mesnager:
Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box. 577 - José Luis Crespo, Javier González-Villa, Jaime Gutierrez, Angel Valle:
Assessing the quality of Random Number Generators through Neural Networks. 578 - Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Tight Multi-user Security of Ascon and Its Large Key Extension. 579 - Duy Nguyen:
Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model. 580 - JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, GyuSang Kim, Suhri Kim, Heeseok Kim, Seokhie Hong:
Fault Attack on SQIsign. 581 - Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, Peter Rindal:
Improved Alternating Moduli PRFs and Post-Quantum Signatures. 582 - Omri Shmueli:
A Note on Quantum Algorithms for Lattice Problems. 583 - Jianming Lin, Weize Wang, Chang-An Zhao, Yuhao Zheng:
Efficient Implementations of Square-root Vélu's Formulas. 584 - Ardianto Satriawan, Rella Mareta:
A Complete Beginner Guide to the Number Theoretic Transform (NTT). 585 - Yongge Wang:
Encryption Based Covert Channel for Large Language Models. 586 - Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation. 587 - Simon Erfurth:
Digital Signatures for Authenticating Compressed JPEG Images. 588 - Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz:
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training. 589 - Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks. 590 - Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl:
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures. 591 - Daniel J. Bernstein:
Asymptotics for the standard block size in primal lattice attacks: second order, formally verified. 592 - George Teseleanu:
The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem. 593 - Enrico Bottazzi:
Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation. 594 - Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob and C. 595 - Sidoine Juicielle Kambiré, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Daniel Tieudjo, Djiby Sow:
Cryptanalysis of signature schemes based on the root extraction problem over braid group. 596 - Gewu Bu, Serge Fdida, Maria Potop-Butucaru, Bilel Zaghdoudi:
Blockchain-based decentralized identity system: Design and security analysis. 597 - Ganyuan Cao:
A Characterization of AE Robustness as Decryption Leakage Indistinguishability. 598 - Shany Ben-David:
Probabilistically Checkable Arguments for all NP. 599 - Mustafa Khairallah:
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-. 600 - Henry Bambury, Phong Q. Nguyen:
Improved Provable Reduction of NTRU and Hypercubic Lattices. 601 - Amos Beimel, Oriol Farràs, Oded Nir:
Secret-Sharing Schemes for High Slices. 602 - Divesh Aggarwal, Leong Jin Ming, Alexandra Veliche:
Worst-Case to Average-Case Hardness of LWE: A Simple and Practical Perspective. 603 - Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. 604 - Léo Perrin:
Security Analysis of XHASH8/12. 605 - Sam Gunn, Yael Tauman Kalai, Anand Natarajan, Agi Villanyi:
Classical Commitments to Quantum States. 606 - Truman Welling, Onur Günlü, Aylin Yener:
Low-latency Secure Integrated Sensing and Communication with Transmitter Actions. 607 - Zhengjun Cao, Lihua Liu:
The Practical Advantage of RSA over ECC and Pairings. 608 - Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, Brice Minaud:
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes. 609 - Min Xie, Peichen Ju, Yanqi Zhao, Zoe L. Jiang, Junbin Fang, Yong Yu, Xuan Wang:
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation. 610 - Ward Beullens, Pierre Briaud, Morten Øygarden:
A Security Analysis of Restricted Syndrome Decoding Problems. 611 - Gurgen Arakelov, Nikita Kaskov, Daria Pianykh, Yuriy Polyakov:
FHERMA: Building the Open-Source FHE Components Library for Practical Use. 612 - Jie Xie, Yuncong Hu, Yu Yu:
Hadamard Product Argument from Lagrange-Based Univariate Polynomials. 613 - Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav:
Non-interactive Blind Signatures from Lattices. 614 - Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang:
Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA. 615 - Hyeonbum Lee, Seunghun Paik, Hyunjung Son, Jae Hong Seo:
Cougar: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption. 616 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie:
Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions. 617 - Yuncong Zhang, Shifeng Sun, Dawu Gu:
Efficient KZG-based Univariate Sum-check and Lookup Argument. 618 - Huiqiang Liang, Haining Lu, Geng Wang:
BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison. 619 - Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. 620 - Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh:
How to Lose Some Weight - A Practical Template Syndrome Decoding Attack. 621 - Roozbeh Sarenche, Svetla Nikova, Bart Preneel:
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols. 622 - Elif Ozbay Gurler, Hüseyin Hisil:
Complete group law for genus 2 Jacobians on Jacobian coordinates. 623 - Andrea Basso:
POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies. 624 - Masaya Nanri, Octavio Perez Kempner, Mehdi Tibouchi, Masayuki Abe:
Interactive Threshold Mercurial Signatures and Applications. 625 - Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, Shibdas Roy:
Exponential Quantum Speedup for the Traveling Salesman Problem. 626 - Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos:
Distributed & Scalable Oblivious Sorting and Shuffling. 627 - Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. 628 - Cédric Pilatte:
Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms. 629 - Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, Chris Waddell:
Conditional disclosure of secrets with quantum resources. 630 - Tahoura Mosavirik, Shahin Tajik:
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring. 631 - Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. 632 - Tomer Ashur, Mohammad Mahzoun, Jim Posen, Danilo Sijacic:
Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields. 633 - Robin Jadoul, Axel Mertens, Jeongeun Park, Hilder V. L. Pereira:
NTRU-based FHE for Larger Key and Message Space. 634 - Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. 635 - Seyoon Ragavan:
Regev Factoring Beyond Fibonacci: Optimizing Prefactors. 636 - Marshall Ball, Juan A. Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos:
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity. 637 - Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual and transitive authentication mechanism for IoT network". 638 - Dustin Ray, Caroline El Jazmi:
Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning. 639 - Andrija Novakovic, Liam Eagen:
On Proving Pairings. 640 - Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan:
Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon. 641 - Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
GraphOS: Towards Oblivious Graph Processing. 642 - Giulio Malavolta:
Key-Homomorphic and Aggregate Verifiable Random Functions. 643 - Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, Ming-Shing Chen:
Jumping for Bernstein-Yang Inversion. 644 - Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh:
Toward Independent Key Encryption based on Q-Problem. 645 - Sanchita Ghosh, Anant Sharma, Sreetama Das, Shibdas Roy:
Efficient Quantum Algorithm for SUBSET-SUM Problem. 646 - Pierrick Méaux:
Weightwise (almost) perfectly balanced functions based on total orders. 647 - B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. 648 - Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. 649 - Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-based Direct Anonymous Attestation. 650 - Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-based Enhanced Privacy ID Signature Scheme. 651 - Samuel Lavery:
Compact and Secure Zero-Knowledge Proofs for Quantum-Resistant Cryptography from Modular Lattice Innovations. 652 - Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, Ling Ren:
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT. 653 - Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen:
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification. 654 - Davide Carnemolla, Dario Catalano, Mario Di Raimondo, Federico Savasta:
Implementation and Performance Analysis of Homomorphic Signature Schemes. 655 - Vincent Rijmen:
Cryptanalytic Audit of the XHash Sponge Function and its Components. 656 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. 657 - Tim Beyne, Yu Long Chen:
Information-theoretic security with asymmetries. 658 - Thijs Veugen, Vincent Dunning, Michiel Marcus, Bart Kamphorst:
Secure Latent Dirichlet Allocation. 659 - Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas:
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. 660 - Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, Michal Zajac:
On amortization techniques for FRI-based SNARKs. 661 - Kelong Cong, Jiayi Kang, Georgio Nicolas, Jeongeun Park:
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption. 662 - Xinwei Yong, Jiaojiao Wu, Jianfeng Wang:
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. 663 - Xin Wang, Haochen Wang, Haibin Zhang, Sisi Duan:
Pando: Extremely Scalable BFT Based on Committee Sampling. 664 - Amit Deo, Marc Joye, Benoît Libert, Benjamin R. Curtis, Mayeul de Bellabre:
Homomorphic Evaluation of LWR-based PRFs and Application to Transciphering. 665 - Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa:
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. 666 - Karoline Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, Alice Bowman:
Agile, Post-quantum Secure Cryptography in Avionics. 667 - Abdoulaye Ndiaye:
Blockchain Price vs. Quantity Controls. 668 - Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla:
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses. 669 - Raja Adhithan RadhaKrishnan:
Secure Implementation of SRAM PUF for Private Key Generation. 670 - Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, Asja Fischer:
Exploiting Internal Randomness for Privacy in Vertical Federated Learning. 671 - Shanuja Sasi, Onur Günlü:
Secure Coded Distributed Computing. 672 - Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B. 673 - Wyatt Benno:
SigmaSuite: How to Minimize Foreign Arithmetic in ZKP Circuits While Keeping Succinct Final Verification. 674 - Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, Meghna Sengupta:
Olympic Privacy-Preserving Blueprints: Faster Communication, Highly Functional, Stronger Security. 675 - Karim Eldefrawy, Benjamin Terner, Moti Yung:
Composing Timed Cryptographic Protocols: Foundations and Applications. 676 - Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup:
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography. 677 - Douglas Stebila, Spencer Wilson:
Quantum-Safe Account Recovery for WebAuthn. 678 - Martin Feussner, Igor Semaev:
Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures. 679 - Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, Aayush Yadav:
Universal Vector Commitments. 680 - Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV:
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security. 681 - Wutichai Chongchitmate, Steve Lu, Rafail Ostrovsky:
Approximate PSI with Near-Linear Communication. 682 - Zhengjun Cao, Lihua Liu:
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE". 683 - Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc Viet Le, Mohsen Minaei, Ranjit Kumaresan, Mahdi Zamani:
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains. 684 - Nicolas Alhaddad, Leonid Reyzin, Mayank Varia:
Committing AVID with Partial Retrieval and Optimal Storage. 685 - Ian Malloy:
Unstructured Inversions of New Hope. 686 - Nicholas Brandt:
Levin-Kolmogorov Complexity is not in Linear Time. 687 - Hoeteck Wee, David J. Wu:
Succinct Functional Commitments for Circuits from k-Lin. 688 - Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models. 689 - Alex Charlès, Aleksei Udovenko:
LPN-based Attacks in the White-box Setting. 690 - Alex Charlès, Aleksei Udovenko:
White-box filtering attacks breaking SEL masking: from exponential to polynomial time. 691 - Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, Dionysis Zindros:
Blink: An Optimal Proof of Proof-of-Work. 692 - Pierre Briaud:
A Note of Anemoi Gröbner Bases. 693 - Jesko Dujmovic, Mohammad Hajiabadi:
Lower-Bounds on Public-Key Operations in PIR. 694 - Richard Wassmer:
Beale Cipher 1 and Cipher 3: Numbers With No Messages. 695 - Victor Shoup:
A Theoretical Take on a Practical Consensus Protocol. 696 - Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov:
LINE: Cryptosystem based on linear equations for logarithmic signatures. 697 - Vladimir Braverman, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky:
Private Computations on Streaming Data. 698 - Elijah Pelofske:
An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization. 699 - Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song:
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over ℤ2k without Ring Extensions. 700 - Tomoyuki Morimae, Shogo Yamada, Takashi Yamakawa:
Quantum Unpredictability. 701 - Rune Fiedler, Felix Günther:
Security Analysis of Signal's PQXDH Handshake. 702 - Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, Jiaheng Zhang:
An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks. 703 - Krishnendu Chatterjee, Amirali Ebrahim-Zadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, Dorde Zikelic:
Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains. 704 - Remco Bloemen, Daniel Kales, Philipp Sippl, Roman Walch:
Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users. 705 - Zahra Javar, Bruce M. Kapron:
Linicrypt in the Ideal Cipher Model. 706 - Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, Rosario Cammarota:
Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators. 707 - Nicolai Müller, Amir Moradi:
Automated Generation of Fault-Resistant Circuits. 708 - Justine Paillet, Pierre-Augustin Berthet, Cédric Tavernier:
Masked Computation the Floor Function and its Application to the FALCON Signature. 709 - Samed Düzlü, Rune Fiedler, Marc Fischlin:
BUFFing FALCON without Increasing the Signature Size. 710 - F. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Non-Transferable Anonymous Tokens by Secret Binding. 711 - Hyunji Kim, Kyungbae Jang, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo:
Quantum NV Sieve on Grover for Solving Shortest Vector Problem. 712 - Leizhang Wang:
Analyzing Pump and jump BKZ algorithm using dynamical systems. 713 - Shanxiang Lyu, Ling Liu, Cong Ling:
Learning with Quantization, Polar Quantizer, and Secure Source Coding. 714 - Ali Mahdoum:
A New Cryptographic Algorithm. 715 - Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu:
Unclonable Secret Sharing. 716 - Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, Ida Tucker:
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. 717 - Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas:
PAC-Private Algorithms. 718 - Hoang-Dung Nguyen, Jorge Guajardo, Thang Hoang:
Client-Efficient Online-Offline Private Information Retrieval. 719 - Ward Beullens:
Multivariate Blind Signatures Revisited. 720 - Antonio Faonio, Dario Fiore, Luigi Russo:
Real-world Universal zkSNARKs are non-malleable. 721 - Tim Beyne, Michiel Verbauwhede:
Ultrametric integral cryptanalysis. 722 - Harish Karthikeyan, Antigoni Polychroniadou:
OPA: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning. 723 - Alessandro Chiesa, Giacomo Fenzi:
zkSNARKs in the ROM with Unconditional UC-Security. 724 - Nilanjan Datta, Shreya Dey, Avijit Dutta, Devdutto Kanungo:
Multi User Security of LightMAC and LightMAC_Plus. 725 - Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida:
Challenger: Blockchain-based Massively Multiplayer Online Game Architecture. 726 - Joseph Jaeger:
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise. 727 - Annalisa Barbara, Alessandro Chiesa, Ziyi Guan:
Relativized Succinct Arguments in the ROM Do Not Exist. 728 - Isheeta Nargis, Anwar Hasan:
Covert Adaptive Adversary Model: A New Adversary Model for Multiparty Computation. 729 - André Chailloux, Thomas Debris-Alazard:
New Solutions to Delsarte's Dual Linear Programs. 730 - Wonseok Choi, Jooyoung Lee, Yeongmin Lee:
Tight Security of Double-Block Nonce-Based MACs. 731 - Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, Jinwei Zheng:
Compact Encryption based on Module-NTRU problems. 732 - Zhongtang Luo, Yanxue Jia, Yaobin Shen, Aniket Kate:
Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability. 733 - Aram Jivanyan, Karen Terjanian:
Proof of Stake and Activity: Rewarding On-Chain Activity Through Consensus. 734 - Isheeta Nargis, Anwar Hasan:
Secure Multiparty Computation in the Presence of Covert Adaptive Adversaries. 735 - James Bartusek, Justin Raizes:
Secret Sharing with Certified Deletion. 736 - Rishab Goyal:
Mutable Batch Arguments and Applications. 737 - Prabhanjan Ananth, Zihan Hu, Zikuan Huang:
Quantum Key-Revocable Dual-Regev Encryption, Revisited. 738 - Ziyu Zhao, Jintai Ding, Bo-Yin Yang:
BGJ15 Revisited: Sieving with Streamed Memory Access. 739 - Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Public Inputs and Strong Security. 740 - Rune Fiedler, Christian Janson:
A Deniability Analysis of Signal's Initial Handshake PQXDH. 741 - David Pointcheval:
Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy. 742 - Kai Hu:
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings - with a Break-Fix Strategy. 743 - Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, Kentaro Mihara:
An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator. 744 - Mingyu Cho, Woohyuk Chung, Jincheol Ha, Jooyoung Lee, Eun-Gyeol Oh, Mincheol Son:
FRAST: TFHE-friendly Cipher Based on Random S-boxes. 745 - Céline Chevalier, Guirec Lebrun, Ange Martinelli, Jérôme Plût:
The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS. 746 - Martin R. Albrecht, Joe Rowell:
Scaling Lattice Sieves across Multiple Machines. 747 - Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, Marco Palumbi:
PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem. 748 - Rachit Garg, George Lu, Brent Waters, David J. Wu:
Reducing the CRS Size in Registered ABE Systems. 749 - Xinxin Fan, Veronika Kuchta, Francesco Sica, Lei Xu:
Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs. 750 - Prabhanjan Ananth, Fatih Kaleoglu, Henry Yuen:
Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography. 751 - Aurore Guillevic:
More Embedded Curves for SNARK-Pairing-Friendly Curves. 752 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung:
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption. 753 - Allison Bishop, Hayder Tirmazi:
Adversary Resilient Learned Bloom Filters. 754 - Barbara Gigerl, Florian Mendel, Martin Schläffer, Robert Primas:
Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice. 755 - Dennis Dayanikli, Anja Lehmann:
(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting. 756 - Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. 757 - John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier A. Verbel, Luis Villota:
Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields. 758 - Aloni Cohen, Alexander Hoover, Gabe Schoenbach:
Enhancing Watermarked Language Models to Identify Users. 759 - Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, Benjamin Wesolowski:
SQIsign2D-West: The Fast, the Small, and the Safer. 760 - Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu:
Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage. 761 - Sora Suegami:
Extractable Witness Encryption for Signed Vector Digests from Pairings and Trust-Scalable One-Time Programs. 762 - Yu Morishima, Masahiro Kaminaga:
On SIS-problem-based random Feistel ciphers and its statistical evaluation of resistance against differential cryptanalysis. 763 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Decentralized Multi-Client Functional Encryption with Strong Security. 764 - Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, Elaine Shi:
Information-Theoretic Multi-Server PIR with Global Preprocessing. 765 - Ziyi Guan, Artur Riazanov, Weiqiang Yuan:
Breaking Verifiable Delay Functions in the Random Oracle Model. 766 - Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Damien Stehlé:
Bootstrapping Bits with CKKS. 767 - Denis Firsov, Benjamin Livshits:
The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation. 768 - Damiano Abram, Lawrence Roy, Mark Simkin:
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More. 769 - Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, Benedikt Wagner:
Sublinear-Round Broadcast without Trusted Setup. 770 - Kohei Nakagawa, Hiroshi Onuki:
SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies. 771 - Oriol Farràs, Miquel Guiot:
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation. 772 - Max Duparc, Tako Boris Fouotsa:
SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies. 773 - Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, Maria Potop-Butucaru:
Byzantine Reliable Broadcast with One Trusted Monotonic Counter. 774 - Gal Horowitz, Eyal Ronen, Yuval Yarom:
Spec-o-Scope: Cache Probing at Cache Speed. 775 - Changrui Mu, Prashant Nalini Vasudevan:
Instance-Hiding Interactive Proofs. 776 - Jiangxia Ge, Heming Liao, Rui Xue:
Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model. 777 - Hiroshi Onuki, Kohei Nakagawa:
Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign. 778 - Michael Scott:
Elliptic Curve Cryptography for the masses: Simple and fast finite field arithmetic. 779 - Jaspal Singh, Yu Wei, Vassilis Zikas:
Information-theoretic Multi-server Private Information Retrieval with Client Preprocessing. 780 - Or Keret, Ron D. Rothblum, Prashant Nalini Vasudevan:
Doubly-Efficient Batch Verification in Statistical Zero-Knowledge. 781 - Huck Bennett, Kaung Myat Htay Win:
Relating Code Equivalence to Other Isomorphism Problems. 782 - Kyungbae Jang, Yujin Oh, Hwajeong Seo:
Differential Cryptanalysis on Quantum Computers. 783 - Owen Vaughan:
Universal Blockchain Assets. 784 - Frank Y. C. Lu:
SmartBean: Transparent, Concretely Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs that Runs on Any Group. 785 - Fukang Liu, Mohammad Mahzoun, Willi Meier:
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit. 786 - Robin Frot, Dániel Zentai:
A new attack against search-LWE using Diophantine approximations. 787 - Sven Bauer, Fabrizio De Santis, Kristjane Koleci, Anita Aghaie:
A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. 788 - Yaxi Yang, Xiaojian Liang, Xiangfu Song, Linting Huang, Hongyu Ren, Changyu Dong, Jianying Zhou:
Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF. 789 - Xavier Bultel:
Physical Ring Signature. 790 - Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang:
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? 791 - Daniel Nager:
Stickel's Key Agreement Algebraic Variation. 792 - Jelle Don, Serge Fehr, Yu-Hsuan Huang, Jyun-Jie Liao, Patrick Struck:
Hide-and-Seek and the Non-Resignability of the BUFF Transform. 793 - James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Arup Mondal, Esra Yeniaras:
Detecting Rogue Decryption in (Threshold) Encryption via Self-Incriminating Proofs. 794 - Sven Schäge:
New Limits of Provable Security and Applications to ElGamal Encryption. 795 - Esha Ghosh, Melissa Chase:
Weak Consistency mode in Key Transparency: OPTIKS. 796 - Joseph Jaeger:
Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming. 797 - Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, Aman Verma:
Incompressible Functional Encryption. 798 - Joseph Jaeger, Akshaya Kumar, Igors Stepanovs:
Symmetric Signcryption and E2EE Group Messaging in Keybase. 799 - Yanyi Liu, Noam Mazor, Rafael Pass:
A Note on Zero-Knowledge for NP and One-Way Functions. 800 - Björn Kriepke, Gohar M. Kyureghyan:
Algebraic Structure of the Iterates of χ. 801 - Nicolas T. Courtois, Frédéric Amiel, Alexandre Bonnard de Fonvillars:
On Maximum Size Simultaneous Linear Approximations in Ascon and Keccak and Related Translation and Differential Properties. 802 - Chunghun Baek, Taechan Kim:
Can We Beat Three Halves Lower Bound?: (Im)Possibility of Reducing Communication Cost for Garbled Circuits. 803 - Taechan Kim:
Analysis on Sliced Garbling via Algebraic Approach. 804 - Ali Raya, Vikas Kumar, Sugata Gangopadhyay:
DiTRU: A Resurrection of NTRU over Dihedral Group. 805 - Susumu Kiyoshima:
Resettable Statistical Zero-Knowledge for NP. 806 - Julian Loss, Kecheng Shi, Gilad Stern:
Optimal Consensus in the Presence of Overlapping Faults and Total Omission. 807 - Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, May Buzaglo:
Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability. 808 - Jana Berusková, Martin Jurecek, Olha Jurecková:
Reducing Overdefined Systems of Polynomial Equations Derived from Small Scale Variants of the AES via Data Mining Methods. 809 - Qian Guo, Erik Mårtensson, Adrian Åström:
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber. 810 - Charlotte Hoffmann:
Traceable Secret Sharing Based on the Chinese Remainder Theorem. 811 - Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey:
Relations among new CCA security notions for approximate FHE. 812 - Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan:
How to Redact the Bitcoin Backbone Protocol. 813 - Damiano Abram, Lawrence Roy, Peter Scholl:
Succinct Homomorphic Secret Sharing. 814 - Arnaud Sipasseuth:
Faster verifications and smaller signatures: Trade-offs for ALTEQ using rejections. 815 - Noga Ron-Zewi, Mor Weiss:
Zero-knowledge IOPs Approaching Witness Length. 816 - Arnaud Sipasseuth:
DVA: Dangerous Variations of ALTEQ. 817 - Jan Bobolz, Pooya Farshim, Markulf Kohlweiss, Akira Takahashi:
The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs. 818 - Dachao Wang, Alexander Maximov, Patrik Ekdahl, Thomas Johansson:
A new stand-alone MAC construct called SMAC. 819 - Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing. 820 - Yao-Ching Hsieh, Huijia Lin, Ji Luo:
A General Framework for Lattice-Based ABE Using Evasive Inner-Product Functional Encryption. 821 - Fatima Elsheimy, Julian Loss, Charalampos Papamanthou:
Early Stopping Byzantine Agreement in (1+ε)· f Rounds. 822 - Lucas Piske, Jaspal Singh, Ni Trieu:
Batched Distributed Point Function from Sparse LPN and Homomorphic Secret Sharing. 823 - Eunmin Lee, Joohee Lee, Yuntao Wang:
Improved Meet-LWE Attack via Ternary Trees. 824 - Ayaz Khan:
KHAN Encryption Algorithm: Leveraging Full Reptend Primes. 825 - Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar:
Securing Lightning Channels against Rational Miners. 826 - Xiao Yang, Chengru Zhang, Mark Ryan, Gao Meng:
Multivariate Multi-Polynomial Commitment and its Applications. 827 - Johannes Müller, Jan Oupický:
Post-quantum XML and SAML Single Sign-On. 828 - Arthur Lazzaretti, Zeyu Liu, Ben Fisch, Charalampos Papamanthou:
Multi-Server Doubly Efficient PIR. 829 - Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu:
How (not) to Build Quantum PKE in Minicrypt. 830 - Fangqi Dong, Qipeng Liu, Kewen Wu:
Tight Characterizations for Preprocessing against Cryptographic Salting. 831 - Gal Arnon, Shany Ben-David, Eylon Yogev:
Hamming Weight Proofs of Proximity with One-Sided Error. 832 - Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich:
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis. 833 - Balthazar Bauer, Geoffroy Couteau, Elahe Sadeghi:
Fine-Grained Non-Interactive Key Exchange, Revisited. 834 - Christian Majenz, Fabrizio Sisinni:
Provable security against decryption failure attacks from LWE. 835 - Alex B. Grilo, Philippe Lamontagne:
The Round Complexity of Proofs in the Bounded Quantum Storage Model. 836 - Anders P. K. Dalskov, Daniel Escudero, Ariel Nof:
Fully Secure MPC and zk-FLIOP Over Rings: New Constructions, Improvements and Extensions. 837 - Ignacio Cascudo, Daniele Cozzo, Emanuele Giunta:
Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity. 838 - Tiancheng Xie, Tianyi Liu:
Almost optimal succinct arguments for Boolean circuit on RAM. 839 - Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh:
Batching-Efficient RAM using Updatable Lookup Arguments. 840 - Claude Carlet:
Two generalizations of almost perfect nonlinearity. 841 - Gayathri Garimella, Benjamin Goff, Peihan Miao:
Computation Efficient Structure Aware PSI From Incremental Function Secret Sharing. 842 - José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Pierre-Yves Strub:
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt. 843 - Alexander Karenin, Elena Kirshanova:
Finding Dense Submodules with Algebraic Lattice Reduction. 844 - Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. 845 - Mark Manulis, Hugo Nartz:
Distributed Asynchronous Remote Key Generation. 846 - Lucas Gretta, William He, Angelos Pelecanos:
More Efficient Approximate k-wise Independent Permutations from Random Reversible Circuits via log-Sobolev Inequalities. 847 - Marek Sefranek:
How (Not) to Simulate PLONK. 848 - Haonan Yuan, Wenyuan Wu, Jingwei Chen:
Fast, Lagre Scale Dimensionality Reduction Schemes Based on CKKS. 849 - Noga Amit, Guy N. Rothblum:
Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions. 850 - Jorge Chávez-Saab, Odalis Ortega, Amalia Pizarro-Madariaga:
On the parallelization of square-root Vélu's formulas. 851 - Jimmy Dani, Kalyan Nakka, Nitesh Saxena:
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers. 852 - Jean-Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger, Juan Ramón Troncoso-Pastoriza:
Practical q-IND-CPA-D-Secure Approximate Homomorphic Encryption. 853 - Benoît Libert:
Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk. 854 - Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Zhenqiang Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John C. Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, Matthew Turek:
Securing the Future of GenAI: Policy and Technology. 855 - Seyoon Ragavan, Neekon Vafa, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants. 856 - Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang:
Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations. 857 - Stephan Müller:
Ascon-Keccak AEAD Algorithm. 858 - Kaarel August Kurik, Peeter Laud:
Novel approximations of elementary functions in zero-knowledge proofs. 859 - Gregor Leander, Christof Paar, Julian Speith, Lukas Stennes:
HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits. 860 - Marco Calderini, Alessio Caminata, Irene Villa:
A new multivariate primitive from CCZ equivalence. 861 - Songze Li, Yanbo Dai:
BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning. 862 - Grace Jia, Rachit Agarwal, Anurag Khandelwal:
Length Leakage in Oblivious Data Access Mechanisms. 863 - Liqun Chen, Patrick Hough, Nada El Kassem:
Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation. 864 - Dandan Yuan, Shujie Cui, Giovanni Russello:
Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead. 865 - Charles Gouert, Mehmet Ugurbil, Dimitris Mouris, Miguel de Vega, Nektarios Georgios Tsoutsos:
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations. 866 - Mark Zhandry:
Optimal Traitor Tracing from Pairings. 867 - Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures. 868 - Maria Corte-Real Santos, Craig Costello, Michael Naehrig:
On cycles of pairing-friendly abelian varieties. 869 - Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, Mariana Raykova:
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model. 870 - Ting Peng, Wentao Zhang, Jingsui Weng, Tianyou Ding:
New Approaches for Estimating the Bias of Differential-Linear Distinguishers (Full Version). 871 - Shuangjun Zhang, Dongliang Cai, Yuan Li, Haibin Kan, Liang Zhang:
Epistle: Elastic Succinct Arguments for Plonk Constraint System. 872 - Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski:
Cryptanalysis of Algebraic Verifiable Delay Functions. 873 - Marc Fischlin, Olga Sanina:
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication. 874 - Mihir Bellare, Viet Tung Hoang:
Succinctly-Committing Authenticated Encryption. 875 - Benny Applebaum, Benny Pinkas:
Distributing Keys and Random Secrets with Constant Complexity. 876 - Zhongzhi Zhou, Vahid Amin Ghafari, Hui Liu:
Multiple Sampling Fast Correlation Attack on Small State Stream Ciphers with Limited Round Key Period. 877 - Thomas Decru:
Radical Vélu Isogeny Formulae. 878 - Joakim Brorsson, Elena Pagnin, Bernardo David, Paul Stankovski Wagner:
Consistency-or-Die: Consistency for Key Transparency. 879 - Joseph Macula, Katherine E. Stange:
Extending class group action attacks via pairings. 880 - Peifang Ni, Anqi Tian, Jing Xu:
pipeSwap: Forcing the Early Release of a Secret for Atomic Swaps Across All Blockchains. 881 - Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, Wenling Wu:
Lattice-based Fault Attacks against ECMQV. 882 - Byeong-Seo Min, Joon-Woo Lee:
Low-Latency Linear Transformations with Small Key Transmission for Private Neural Network on Homomorphic Encryption. 883 - Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini:
Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Proofs. 884 - Megumi Ando, Anna Lysyanskaya, Eli Upfal:
Bruisable Onions: Anonymous Communication in the Asynchronous Model. 885 - Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang:
A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms. 886 - Graeme Connell, Vivian Fang, Rolfe Schmidt, Emma Dauterman, Raluca Ada Popa:
Secret Key Recovery in a Global-Scale End-to-End Encryption System. 887 - Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, Mingming Song:
zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing. 888 - Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, Benjamin Livshits:
Analyzing and Benchmarking ZK-Rollups. 889 - Phillip Gajland, Jonas Janneck, Eike Kiltz:
Ring Signatures for Deniable AKEM: Gandalf's Fellowship. 890 - Zhenda Zhang, Svetla Nikova, Ventzislav Nikov:
Glitch-Stopping Circuits: Hardware Secure Masking without Registers. 891 - Darya Kaviani, Sijun Tan, Pravein Govindan Kannan, Raluca Ada Popa:
Flock: A Framework for Deploying On-Demand Distributed Trust. 892 - Aparna Gupte, Vinod Vaikuntanathan:
How to Construct Quantum FHE, Generically. 893 - Akinori Hosoyamada:
Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers. 894 - Gaspard Anthoine, David Balbás, Dario Fiore:
Fully-Succinct Multi-Key Homomorphic Signatures from Standard Assumptions. 895 - Annalisa Cimatti, Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci, Matteo Nardelli, Marco Pedicini:
Dynamic-FROST: Schnorr Threshold Signatures with a Flexible Committee. 896 - Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee, Daniel Wichs:
Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE. 897 - Noah Golowich, Ankur Moitra:
Edit Distance Robust Watermarks for Language Models. 898 - Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, Omer Paneth:
Monotone-Policy Aggregate Signatures. 899 - Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii:
Breaktooth: Breaking Bluetooth Sessions Abusing Power-Saving Mode. 900 - Ryunosuke Takeuchi, Yosuke Todo, Tetsu Iwata:
Practical Committing Attacks against Rocca-S. 901 - Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
Access Structure Hiding Verifiable Tensor Designs. 902 - Jayamine Alupotha, Mathieu Gestin, Christian Cachin:
Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets. 903 - Andreas Hülsing, David Joseph, Christian Majenz, Anand Kumar Narayanan:
On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH. 904 - Christopher Battarbee, Giacomo Borin, Ryann Cartor, Nadia Heninger, David Jao, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt:
On the Semidirect Discrete Logarithm Problem in Finite Groups. 905 - Yoav Ben Dov, Liron David, Moni Naor, Elad Tzalik:
Are Your Keys Protected? Time will Tell. 906 - Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Information Set Decoding. 907 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Preliminary Analysis of Ascon-Xof and Ascon-Hash. 908 - Olivier Bernard, Marc Joye:
Approximate CRT-Based Gadget Decomposition and Application to TFHE Blind Rotation. 909 - Manuel Barbosa, François Dupressoir, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub:
A Tight Security Proof for $\mathrm{SPHINCS^{+}}$, Formally Verified. 910 - Tomer Ashur, Amit Singh Bhati:
Generalized Indifferentiable Sponge and its Application to Polygon Miden VM. 911 - Efrat Cohen, Anat Paskin-Cherniavsky:
Quantum Evolving Secret Sharing for General Access Structures. 912 - Seetal Potluri, Farinaz Koushanfar:
SoK: Model Reverse Engineering Threats for Neural Network Hardware. 913 - Yevgeniy Dodis, Daniel Jost, Antonio Marcedone:
Compact Key Storage: A Modern Approach to Key Backup and Delegation. 914 - Josh Benaloh, Michael Naehrig, Olivier Pereira:
REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections. 915 - Helger Lipmaa:
Polymath: Groth16 Is Not The Limit. 916 - Bishnu Charan Behera, Somindu C. Ramanna:
Unbounded Non-Zero Inner Product Encryption. 917 - Yuanming Song, Lenka Mareková, Kenneth G. Paterson:
Cryptographic Analysis of Delta Chat. 918 - Bishnu Charan Behera, Somindu C. Ramanna:
Multi-Input Functional Encryption for Unbounded Inner Products. 919 - Benoît Libert:
Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption. 920 - Edsger Hughes:
Simple Logarithmic-size LSAG signature. 921 - Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
Scalable Private Set Union, with Stronger Security. 922 - Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin:
On Orchestrating Parallel Broadcasts for Distributed Ledgers. 923 - Steven D. Galbraith:
Climbing and descending tall volcanos. 924 - Dilip S. V. Kumar, Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Time Sharing - A Novel Approach to Low-Latency Masking. 925 - Henri Devillez, Olivier Pereira, Thomas Peters:
Verifiable and Private Vote-by-Mail. 926 - Anjali C. B:
MATHEMATICAL SPECULATIONS ON CRYPTOGRAPHY. 927 - Ritam Bhaumik, Bishwajit Chakraborty, Wonseok Choi, Avijit Dutta, Jérôme Govinden, Yaobin Shen:
The Committing Security of MACs with Applications to Generic Composition. 928 - Itai Dinur:
Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis. 929 - Yuval Ishai, Mahimna Kelkar, Daniel Lee, Yiping Ma:
Information-Theoretic Single-Server PIR in the Shuffle Model. 930 - Abtin Afshar, Jiaqi Cheng, Rishab Goyal:
Leveled Fully-Homomorphic Signatures from Batch Arguments. 931 - Aruna Jayasena, Richard Bachmann, Prabhat Mishra:
CISELeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes. 932 - Brent Waters, David J. Wu:
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP. 933 - Gil Segev, Liat Shapira:
An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures. 934 - Matteo Scarlata, Matilda Backendal, Miro Haller:
MFKDF: Multiple Factors Knocked Down Flat. 935 - James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, Phillipp Schoppmann:
Willow: Secure Aggregation with One-Shot Clients. 936 - Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Distributed Point Function with Constraints, Revisited. 937 - Zoë Ruha Bell, Shafi Goldwasser, Michael P. Kim, Jean-Luc Watson:
Certifying Private Probabilistic Mechanisms. 938 - A. Telveenus:
Two RSA-based Cryptosystems. 939 - Xuanming Liu, Zhelei Zhou, Yinghao Wang, Jinye He, Bingsheng Zhang, Xiaohu Yang, Jiaheng Zhang:
Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing. 940 - Xuanming Liu, Jiawen Zhang, Yinghao Wang, Xinpeng Yang, Xiaohu Yang:
SmartZKCP: Towards Practical Data Exchange Marketplace Against Active Attacks. 941 - Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi:
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Client Stragglers. 942 - Chaya Ganesh, Vineet Nair, Ashish Sharma:
Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs. 943 - Navid Alamati, Varun Maram:
Quantum CCA-Secure PKE, Revisited. 944 - Sathvika Balumuri, Edward Eaton, Philippe Lamontagne:
Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes. 945 - Edward Eaton, Philippe Lamontagne, Peter Matsakis:
Provably Secure Butterfly Key Expansion from the CRYSTALS Post-Quantum Schemes. 946 - Nuttapong Attrapadung, Junichi Tomida:
A Modular Approach to Registered ABE for Unbounded Predicates. 947 - Maria Corte-Real Santos, Krijn Reijnders:
Return of the Kummer: a toolbox for genus 2 cryptography. 948 - Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren:
Efficient 2PC for Constant Round Secure Equality Testing and Comparison. 949 - Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. 950 - Alexander Maximov:
Notes on (failed) attempts to instantiate TLR3. 951 - Benny Applebaum, Kaartik Bhushan, Manoj Prabhakaran:
Communication Complexity vs Randomness Complexity in Interactive Proofs. 952 - Diego Castejon-Molina, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez:
MixBuy: Contingent Payment in the Presence of Coin Mixers. 953 - Murdoch James Gabbay:
Arithmetisation of computation via polynomial semantics for first-order logic. 954 - Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach:
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections. 955 - Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan:
SNARGs under LWE via Propositional Proofs. 956 - Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan:
VRaaS: Verifiable Randomness as a Service on Blockchains. 957 - Da Teng, Yanqing Yao:
Signer Revocability for Threshold Ring Signatures. 958 - Thomas Espitau, Guilhem Niot, Thomas Prest:
Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices. 959 - Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, Radu Titiu:
Designs for practical SHE schemes based on Ring-LWR. 960 - Jeff Burdges, Alfonso Cevallos, Handan Kilinç Alper, Chen-Da Liu-Zhang, Fatemeh Shirazi, Alistair Stewart, Rob Habermeier, Robert Klotzner, Andronik Ordian:
Efficient Execution Auditing for Blockchains under Byzantine Assumptions. 961 - Ryan Little, Lucy Qin, Mayank Varia:
Secure Account Recovery for a Privacy-Preserving Web Service. 962 - Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, Ni Trieu:
Shared OT and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition. 963 - Brett Hemenway Falk, Pratyush Mishra, Matan Shtepel:
Malicious Security for PIR (almost) for Free. 964 - Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao:
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things. 965 - Sengim Karayalcin, Guilherme Perin, Stjepan Picek:
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis. 966 - Itamar Levi, Osnat Keren:
Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost. 967 - Jia Liu, Mark Manulis:
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility. 968 - Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Analysis, modify and apply in IIOT form light-weight PSI in CM20. 969 - Eric Blair:
Cryptography at the Crossroads: Ethical Responsibility, the Cypherpunk Movement and Institutions. 970 - Jianming Lin, Saiyu Wang, Chang-An Zhao:
A Note on (2, 2)-isogenies via Theta Coordinates. 971 - Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, Sophia Yakoubov:
Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity. 972 - Karthik Inbasekar, Yuval Shekel, Michael Asa:
ICICLE v2: Polynomial API for Coding ZK Provers to Run on Specialized Hardware. 973 - Daniel Collins, Sisi Duan, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, Haochen Wang:
Towards Optimal Parallel Broadcast under a Dishonest Majority. 974 - Wonseok Choi, Seongha Hwang, ByeongHak Lee, Jooyoung Lee:
ZLR: a fast online authenticated encryption scheme achieving full security. 975 - Yuval Ishai, Elaine Shi, Daniel Wichs:
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds. 976 - Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, Victor Mollimard:
Improved Boomerang Attacks on 6-Round AES. 977 - Elkana Tovey, Jonathan Weiss, Yossi Gilad:
Distributed PIR: Scaling Private Messaging via the Users' Machines. 978 - Alex Ozdemir, Evan Laufer, Dan Boneh:
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs. 979 - Mohammad Hashemi, Dev M. Mehta, Kyle Mitard, Shahin Tajik, Fatemeh Ganji:
FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference. 980 - Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, Hyunok Oh:
Hadamard Product Arguments and Their Applications. 981 - Daniel Benarroch, Bryan R. Gillespie, Ying Tong Lai, Andrew Miller:
SoK: Programmable Privacy in Distributed Systems. 982 - Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark M. Tehranipoor, Farimah Farahmandi:
SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation. 983 - Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version). 984 - Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. 985 - Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. 986 - Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. 987 - Benjamin Ostrovsky:
Privacy-Preserving Dijkstra. 988 - Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenneth G. Paterson:
A Formal Treatment of End-to-End Encrypted Cloud Storage. 989 - Shravani Patil, Arpita Patra:
Perfectly-secure Network-agnostic MPC with Optimal Resiliency. 990 - Shuhong Gao, Kyle Yates:
Leveled Homomorphic Encryption Schemes for Homomorphic Encryption Standard. 991 - Damien Vidal, Sorina Ionica, Claire Delaplace:
The Complexity of the Crossbred Algorithm. 992 - George Lu, Mark Zhandry:
Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions. 993 - Helger Lipmaa, Roberto Parisella, Janno Siim:
On Knowledge-Soundness of Plonk in ROM from Falsifiable Assumptions. 994 - Sergio Juárez, Mark Blunden, Joris Koopman, Anish Mohammed, Kapil R. Shenvi Pause, Steve Thakur:
Cross-chain bridges via backwards-compatible SNARKs. 995 - Matthias Geihs:
Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR. 996 - Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng:
Dishonest Majority Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers. 997 - Pascal Berrang, Paul Gerhart, Dominique Schröder:
Measuring Conditional Anonymity - A Global Study. 998 - Maryam Rezapour, Benjamin Fuller:
ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes. 999 - Tjard Langhout, Huanhuan Chen, Kaitai Liang:
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures. 1000 - Elena Kirshanova, Chiara Marcolla, Sergi Rovira:
Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption. 1001 - Joseph Shunia:
Elementary Formulas for Greatest Common Divisors and Semiprime Factors. 1002 - Seongho Park, Jaekyoung Choi, Jihye Kim, Hyunok Oh:
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system. 1003 - Seongkwang Kim, ByeongHak Lee, Mincheol Son:
Relaxed Vector Commitment for Shorter Signatures. 1004 - Weizhe Wang, Deng Tang:
Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth. 1005 - Yvo Desmedt, Aydin Abadi:
Delegated-Query Oblivious Transfer and its Practical Applications. 1006 - Claude Carlet:
On the vector subspaces of 픽2n over which the multiplicative inverse function sums to zero. 1007 - Xichao Hu, Dengguo Feng, Lin Jiao, Yonglin Hao, Xinxin Gong, Yongqiang Li:
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods. 1008 - Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, Daniele Venturi:
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences. 1009 - Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, Xuan Wang:
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. 1010 - Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, Girisha Shankar:
Secure Vickrey Auctions with Rational Parties. 1011 - Aydin Abadi, Yvo Desmedt:
Supersonic OT: Fast Unconditionally Secure Oblivious Transfer. 1012 - Aydin Abadi:
Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination. 1013 - Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim:
Grafting: Complementing RNS in CKKS. 1014 - Mingfei Yu, Giovanni De Micheli:
Expediting Homomorphic Computation via Multiplicative Complexity-aware Multiplicative Depth Minimization. 1015 - Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang:
A Succinct Range Proof for Polynomial-based Vector Commitment. 1016 - Senegue Gomez Nyamsi, Laurian Azebaze Guimagang, Emmanuel Fouotsa:
Accelerating pairings on BW10 and BW14 Curves. 1017 - Alan Li, Qingkai Liang, Mo Dong:
Sparsity-Aware Protocol for ZK-friendly ML Models: Shedding Lights on Practical ZKML. 1018 - Archisman Ghosh, Md. Abdur Rahman, Debayan Das, Santosh Ghosh, Shreyas Sen:
Exploiting Clock-Slew Dependent Variability in CMOS Digital Circuits Towards Power and EM SCA Resilience. 1019 - Zahra Motaqy, Mohamed E. Najd, Ghada Almashaqbeh:
chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets. 1020 - Nicholas Michel, Mohamed E. Najd, Ghada Almashaqbeh:
ammBoost: State Growth Control for AMMs. 1021 - Ghada Almashaqbeh, Sixia Chen, Alexander Russell:
Competitive Policies for Online Collateral Maintenance. 1022 - Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices. 1023 - Reyhaneh Rabaninejad, Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig, Antonis Michalas:
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity. 1024 - Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Maximilian Orlt:
Polynomial sharings on two secrets: Buy one, get one free. 1025 - Martin Zbudila, Erik Pohle, Aysajan Abidin, Bart Preneel:
MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing. 1026 - Dung Bui, Geoffroy Couteau, Nikolas Melissaris:
Structured-Seed Local Pseudorandom Generators and their Applications. 1027 - Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Faruk Tuna, Ramin Fuladi, Utku Gülen:
FASIL: A challenge-based framework for secure and privacy-preserving federated learning. 1028 - Ananya Appan, David Heath, Ling Ren:
Oblivious Single Access Machines: A New Model for Oblivious Computation. 1029 - Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, Fu Xiao:
GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture. 1030 - Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
SACfe: Secure Access Control in Functional Encryption with Unbounded Data. 1031 - Animesh Singh, Sikhar Patranabis, Debdeep Mukhopadhyay:
Threshold OPRF from Threshold Additive HE. 1032 - Shuichi Katsumata, Michael Reichle, Kaoru Takemure:
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding. 1033 - Eleni Diamanti, Alex B. Grilo, Adriano Innocenzi, Pascal Lefebvre, Verena Yacoub, Álvaro Yángüez:
A Practical Protocol for Quantum Oblivious Transfer from One-Way Functions. 1034 - Sirui Shen, Chenglu Jin:
Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks. 1035 - Ulrich Haböck:
A note on the G-FFT. 1036 - Ulrich Haböck, Al Kindi:
A note on adding zero-knowledge to STARKs. 1037 - Quang Dao, Justin Thaler:
Constraint-Packing and the Sum-Check Protocol over Binary Tower Fields. 1038 - Samuel Lavery:
Reduction from Average-Case M-ISIS to Worst-Case CVP Over Perfect Lattices. 1039 - Janis Erdmanis:
PeaceFounder: centralised E2E verifiable evoting via pseudonym braiding and history trees. 1040 - Yihang Cheng, Yansong Feng, Yanbin Pan:
Embedding Integer Lattices as Ideals into Polynomial Rings. 1041 - Tariq Bontekoe, Hassan Jameel Asghar, Fatih Turkmen:
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model. 1042 - Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin:
Cryptography in the Common Haar State Model: Feasibility Results and Separations. 1043 - Daniel J. Bernstein, Jolijn Cottaar, Tanja Lange:
Searching for differential addition chains. 1044 - Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo:
Efficient Secret Sharing for Large-Scale Applications. 1045 - Suyash Bagad, Yuval Domb, Justin Thaler:
The Sum-Check Protocol over Fields of Small Characteristic. 1046 - Saikrishna Badrinarayanan, Eysa Lee, Peihan Miao, Peter Rindal:
Improved Multi-Party Fixed-Point Multiplication. 1047 - Gayathri Garimella, Srinivasan Raghuramam, Peter Rindal:
Distributional Secure Merge. 1048 - Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, Goutam Tamvada:
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations. 1049 - Jiaxin Guan, Hart Montgomery:
On Sequential Functions and Fine-Grained Cryptography. 1050 - Xiangyu Liu, Tzannetos Ioannis, Vassilis Zikas:
Adaptor Signatures: New Security Definition and A Generic Construction for NP Relations. 1051 - Deokhwa Hong, Young-Sik Kim, Yongwoo Lee, Eunyoung Seo:
A New Fine Tuning Method for FHEW/TFHE Bootstrapping with IND-CPAD Security. 1052 - Benny Applebaum, Eliran Kachlon:
Stochastic Secret Sharing with 1-Bit Shares and Applications to MPC. 1053 - Jonas Lindstrøm, Kostas Kryptos Chalkias:
Optimized Computation of the Jacobi Symbol. 1054 - Ahmet Ramazan Agirtas, Neslihan Yaman Gökce, Oguz Yayla:
Enhancing Local Verification: Aggregate and Multi-Signature Schemes. 1055 - Behzad Abdolmaleki, Prastudy Fauzi, Toomas Krips, Janno Siim:
Shuffle Arguments Based on Subset-Checking. 1056 - Kristian Gjøsteen:
Password-authenticated Key Exchange and Applications. 1057 - Matteo Campanelli, Dario Fiore, Rosario Gennaro:
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them. 1058 - Jonathan Takeshita, Nirajan Koirala, Colin McKechney, Taeho Jung:
HEProfiler: An In-Depth Profiler of Approximate Homomorphic Encryption Libraries. 1059 - Joseph Johnston:
Quirky Interactive Reductions of Knowledge. 1060 - Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, Sriram Sridhar:
Insta-Pok3r: Real-time Poker on Blockchain. 1061 - Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay:
Compact Key Function Secret Sharing with Non-linear Decoder. 1062 - Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh:
VIMz: Verifiable Image Manipulation using Folding-based zkSNARKs. 1063 - Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan:
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. 1064 - Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu:
AITIA: Efficient Secure Computation of Bivariate Causal Discovery. 1065 - Trisha Datta, Binyi Chen, Dan Boneh:
VerITAS: Verifying Image Transformations at Scale. 1066 - Guofeng Tang, Bo Pang, Long Chen, Zhenfeng Zhang:
Efficient Lattice-Based Threshold Signatures with Functional Interchangeability. 1067 - Shahriar Ebrahimi, Parisa Hassanizadeh:
From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation. 1068 - Mukul Kulkarni, Keita Xagawa:
Strong Existential Unforgeability and More of MPC-in-the-Head Signatures. 1069 - Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, Zhiyuan Zhang:
Protecting cryptographic code against Spectre-RSB. 1070 - Damien Robert:
On the efficient representation of isogenies (a survey). 1071 - Anubhab Baksi:
A Study of Partial Non-Linear Layers with DEFAULT and BAKSHEESH. 1072 - Alvaro Revuelta, Sergei Tikhomirov, Aaryamann Challani, Hanno Cornelius, Simon Pierre Vivier:
Message Latency in Waku Relay with Rate Limiting Nullifiers. 1073 - Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini:
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop. 1074 - Daniel Dore:
TaSSLE: Lasso for the commitment-phobic. 1075 - Dag Arne Osvik, David Canright:
A More Compact AES, and More. 1076 - Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta:
Securely Training Decision Trees Efficiently. 1077 - Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song:
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols. 1078 - Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, Sacha Servan-Schreiber:
QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup. 1079 - Justin Holmgren, Brent Waters:
Separating Selective Opening Security From Standard Security, Assuming IO. 1080 - Matthieu Rambaud, Christophe Levrat:
Practical Non-interactive Multi-signatures, and a Multi-to-Aggregate Signatures Compiler. 1081 - Yujin Oh, Kyungbae Jang, Hwajeong Seo:
Quantum Implementation of LSH. 1082 - Sangwon Kim, Siwoo Eum, Minho Song, Hwajeong Seo:
LEA Block Cipher in Rust Language: Trade-off between Memory Safety and Performance. 1083 - Yuandi Cai, Ru Cheng, Yifan Zhou, Shijie Zhang, Jiang Xiao, Hai Jin:
Enabling Complete Atomicity for Cross-chain Applications Through Layered State Commitments. 1084 - Onur Günlü:
Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy. 1085 - Felix Günther, Douglas Stebila, Shannon Veitch:
Obfuscated Key Exchange. 1086 - Lars Folkerts, Nektarios Georgios Tsoutsos:
Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models. 1087 - Rostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos:
HElix: Genome Similarity Detection in the Encrypted Domain. 1088 - Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos:
Juliet: A Configurable Processor for Computing on Encrypted Data. 1089 - Charles Gouert, Nektarios Georgios Tsoutsos:
PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption. 1090 - Rostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos:
MatcHEd: Privacy-Preserving Set Similarity based on MinHash. 1091 - Xinyao Li, Xiwen Ren, Ling Ning, Changhai Ou:
Fusion Channel Attack with POI Learning Encoder. 1092 - Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, Kui Ren:
Faster Lookup Table Evaluation with Application to Secure LLM Inference. 1093 - Joseph Johnston:
Notes on Multiplying Cyclotomic Polynomials on a GPU. 1094 - Debasmita Chakraborty, Mridul Nandi:
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash. 1095 - Marcel Tiepelt, Christian Martin, Nils Mäurer:
Post-Quantum Ready Key Agreement for Aviation. 1096 - Michael Anastos, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Matthew Kwan, Guillermo Pascual-Perez, Krzysztof Pietrzak:
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging. 1097 - Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Limits of Black-Box Anamorphic Encryption. 1098 - Lars Folkerts, Nektarios Georgios Tsoutsos:
FHE-MENNs: Opportunities and Pitfalls for Accelerating Fully Homomorphic Private Inference with Multi-Exit Neural Networks. 1099 - Franklin Harding, Jiayu Xu:
Unforgeability of Blind Schnorr in the Limited Concurrency Setting. 1100 - Any Muanalifah, Zahari Mahad, Nurwan, Rosalio G. Artes:
Stickel's Protocol using Tropical Increasing Matrices. 1101 - Lihua Liu:
A Note on "Privacy Preserving n-Party Scalar Product Protocol". 1102 - Ron D. Rothblum:
A Note on Efficient Computation of the Multilinear Extension. 1103 - Amos Beimel, Tal Malkin, Noam Mazor:
Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions. 1104 - Anil Kumar Pradhan:
A New CRT-based Fully Homomorphic Encryption. 1105 - Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage:
Masked Vector Sampling for HQC. 1106 - Colin O'Flynn:
Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements. 1107 - Matthieu Rambaud:
Faster Asynchronous Blockchain Consensus and MVBA. 1108 - Banashri Karmakar, Shyam Murthy, Arpita Patra, Protik Paul:
QuickPool: Privacy-Preserving Ride-Sharing Service. 1109 - Falko Strenzke, Johannes Roth:
Legacy Encryption Downgrade Attacks against LibrePGP and CMS. 1110 - John Preuß Mattsson:
Collision Attacks on Galois/Counter Mode (GCM). 1111 - Luke Harmon, Gaetan Delavignette, Hanes Oliveira:
HERatio: Homomorphic Encryption of Rationals using Laurent Polynomials. 1112 - Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi:
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors. 1113 - Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Takashi Nishide:
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE. 1114 - Bilel Zaghdoudi, Maria Potop-Butucaru:
Public vs Private Blockchains lineage storage. 1115 - Shen Dong, Hongrui Cui, Kaiyi Zhang, Kang Yang, Yu Yu:
A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR. 1116 - Ke Zhong, Sebastian Angel:
Oryx: Private detection of cycles in federated graphs. 1117 - Poulami Das, Andreas Erwig, Sebastian Faust:
Shared-Custodial Password-Authenticated Deterministic Wallets. 1118 - Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions. 1119 - Jing Tian, Bo Wu, Lang Feng, Haochen Zhang, Zhongfeng Wang:
A Fast and Efficient SIKE Co-Design: Coarse-Grained Reconfigurable Accelerators with Custom RISC-V Microcontroller on FPGA. 1120 - Onur Isler:
Implementation and Performance Evaluation of Elliptic Curve Cryptography over SECP256R1 on STM32 Microprocessor. 1121 - Giacomo Fenzi, Jan Gilcher, Fernando Virdia:
Finding Bugs and Features Using Cryptographically-Informed Functional Testing. 1122 - Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. 1123 - Maximilian Kroschewski, Anja Lehmann, Cavit Özbay:
OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms. 1124 - Guillaume Barbu, Laurent Grémy, Roch Lescuyer:
Revisiting PACD-based Attacks on RSA-CRT. 1125 - Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, Stefano Tessaro:
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods. 1126 - Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, Miguel de Vega:
Curl: Private LLMs through Wavelet-Encoded Look-Up Tables. 1127 - Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung:
Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE. 1128 - Ryuya Hayashi, Yusuke Sakai, Shota Yamada:
Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions. 1129 - Ahmet Ramazan Agirtas, Arda Bugra Özer, Zülfükar Saygi, Oguz Yayla:
Distributed Verifiable Random Function With Compact Proof. 1130 - Hang Su, Qi Yang, Zhenfei Zhang:
Jolt-b: recursion friendly Jolt with basefold commitment. 1131 - Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren:
A New PPML Paradigm for Quantized Models. 1132 - Hossein Arabnezhad Khanooki, Babak Sadeghiyan:
Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis. 1133 - Thomas Debris-Alazard, Pierre Loisel, Valentin Vasseur:
Exploiting signature leakages: breaking Enhanced pqsigRM. 1134 - Christian Badertscher, Maxim Jourenko, Dimitris Karakostas, Mario Larangeira:
Scalable and Lightweight State-Channel Audits. 1135 - Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3. 1136 - Ludo N. Pulles, Mehdi Tibouchi:
Cryptanalysis of EagleSign. 1137 - Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, David J. Wu:
Dot-Product Proofs and Their Applications. 1138 - Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, Michael Rosenberg:
Anonymous Outsourced Statekeeping with Reduced Server Storage. 1139 - Christian Majenz, Giulio Malavolta, Michael Walter:
Permutation Superposition Oracles for Quantum Query Lower Bounds. 1140 - Chen Yang, Jingwei Chen, Wenyuan Wu, Yong Feng:
Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption. 1141 - Changcun Wang, Zhaopeng Dai:
Predicting one class of truncated matrix congruential generators with unknown parameters. 1142 - Francesco Berti, Carmit Hazay, Itamar Levi:
LR-OT: Leakage-Resilient Oblivious Transfer. 1143 - Zhengjun Cao, Lihua Liu:
A Note on "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain". 1144 - Adrian Neal:
A Practical and Scalable Implementation of the Vernam Cipher, under Shannon Conditions, using Quantum Noise. 1145 - Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai:
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions. 1146 - Clémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, Alexandre Wallet:
A reduction from Hawk to the principal ideal problem in a quaternion algebra. 1147 - Thomas Espitau, Heorhii Pliatsok:
On hermitian decomposition lattices and the module-LIP problem in rank 2. 1148 - Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun:
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. 1149 - Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez:
Finding Practical Parameters for Isogeny-based Cryptography. 1150 - Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar:
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models. 1151 - Reo Eriguchi:
Secure Multiparty Computation of Symmetric Functions with Polylogarithmic Bottleneck Complexity and Correlated Randomness. 1152 - Chen Li, Fangguo Zhang:
Designated-Verifier zk-SNARKs Made Easy. 1153 - Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos:
Blockchain Space Tokenization. 1154 - Vlasis Koutsos, Xiangan Tian, Dimitrios Papadopoulos, Dimitris Chatzopoulos:
Cross Ledger Transaction Consistency for Financial Auditing. 1155 - Tymoteusz Chojecki, Grahame Erskine, James Tuite, Vasyl Ustimenko:
On affine forestry over integral domains and families of deep Jordan-Gauss graphs. 1156 - Jan Kristian Haugland, Tron Omland:
Shift-invariant functions and almost liftings. 1157 - Zhengjun Cao, Lihua Liu:
A Note on " Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters". 1158 - Johannes Ottenhues, Alexander Koch:
LaPSuS - A Lattice-Based Private Stream Aggregation Scheme under Scrutiny. 1159 - Behzad Abdolmaleki, Hannes Blümel, Giacomo Fenzi, Homa Khajeh, Stefan Köpsell, Maryam Zarezadeh:
Post-Quantum Access Control with Application to Secure Data Retrieval. 1160 - Alexander R. Block, Pratyush Ranjan Tiwari:
On the Concrete Security of Non-interactive FRI. 1161 - Henri Devillez, Olivier Pereira, Thomas Peters:
Practical Traceable Receipt-Free Encryption. 1162 - Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, Abishanka Saha:
On the Number of Restricted Solutions to Constrained Systems and their Applications. 1163 - Thomas den Hollander, Daniel Slamanig:
A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More. 1164 - Alexander Burton, Samir Jordan Menon, David J. Wu:
Respire: High-Rate PIR for Databases with Small Records. 1165 - Takumi Shinozaki, Keisuke Tanaka, Masayuki Tezuka, Yusuke Yoshida:
On the Relationship between FuncCPA and FuncCPA+. 1166 - Tamara Finogina, Javier Herranz, Peter B. Roenne:
Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited. 1167 - Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma:
Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel. 1168 - Sulaiman Alhussaini, Sergei Sergeev:
Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques. 1169 - Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede:
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism. 1170 - Akshima, Tyler Besselman, Siyao Guo, Zhiye Xie, Yuping Ye:
Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem. 1171 - Sarah Arpin, Wouter Castryck, Jonathan Komada Eriksen, Gioella Lorenzon, Frederik Vercauteren:
Generalized class group actions on oriented elliptic curves with level structure. 1172 - Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang:
Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms. 1173 - Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, Jian Weng:
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber. 1174 - Vlasis Koutsos, Sankarshan Damle, Dimitrios Papadopoulos, Sujit Gujar, Dimitris Chatzopoulos:
AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities. 1175 - Alex Shafarenko:
A zero-trust swarm security architecture and protocols. 1176 - Mehdi Abri, Hamid Mala:
Cryptanalysis of two post-quantum authenticated key agreement protocols. 1177 - Dominik Marchsreiter:
Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems. 1178 - Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem. 1179 - Pierrick Dartois:
Fast computation of 2-isogenies in dimension 4 and cryptographic applications. 1180 - George Papadoulis, Danai Balla, Panagiotis Grontas, Aris Pagourtzis:
AQQUA: Augmenting Quisquis with Auditability. 1181 - Aditya Damodaran, Simon Rastikian, Peter B. Rønne, Peter Y. A. Ryan:
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. 1182 - Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, Jaspal Singh:
Updatable Private Set Intersection from Structured Encryption. 1183 - Zhaoman Liu, Jianting Ning, Huiying Hou, Yunlei Zhao:
Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric. 1184 - Giacomo Borin, Yi-Fu Lai, Antonin Leroux:
Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies. 1185 - Roberto Avanzi, Orr Dunkelman, Kazuhiko Minematsu:
MATTER: A Wide-Block Tweakable Block Cipher. 1186 - Yaacov Belenky, Hennadii Chernyshchyk, Oleg Karavaev, Oleh Maksymenko, Valery Teper, Daria Ryzhkova, Itamar Levi, Osnat Keren, Yury Kreimer:
STORM - Small Table Oriented Redundancy-based SCA Mitigation for AES. 1187 - Jeb Bearer, Benedikt Bünz, Philippe Camacho, Binyi Chen, Ellie Davidson, Ben Fisch, Brendon Fish, Gus Gutoski, Fernando Krell, Chengyu Lin, Dahlia Malkhi, Kartik Nayak, Keyao Shen, Alex Luoyuan Xiong, Nathan Yospe:
The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange. 1189 - Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann:
Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function. 1190 - Zhengjun Cao, Lihua Liu:
A note on "a novel authentication protocol for IoT-enabled devices". 1191 - Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, Andreas Zankl:
Towards ML-KEM & ML-DSA on OpenTitan. 1192 - Hugues Randriambololona:
The syzygy distinguisher. 1193 - Rafael Carrera Rodriguez, Emanuele Valea, Florent Bruguier, Pascal Benoit:
Hardware Implementation and Security Analysis of Local-Masked NTT for CRYSTALS-Kyber. 1194 - Jianming Lin, Chang-An Zhao, Yuhao Zheng:
Efficient Implementation of Super-optimal Pairings on Curves with Small Prime Fields at the 192-bit Security Level. 1195 - Peihan Miao, Xinyi Shi, Chao Wu, Ruofan Xu:
Client-Aided Privacy-Preserving Machine Learning. 1196 - Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. 1197 - Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, Jingqiang Lin:
ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA. 1198 - Theophilus Agama:
On degrees of carry and Scholz's conjecture. 1199 - Jelle Vos, Mauro Conti, Zekeriya Erkin:
Depth-Aware Arithmetization of Common Primitives in Prime Fields. 1200 - Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction. 1201 - Feng Zhou, Hua Chen, Limin Fan:
Prover - Toward More Efficient Formal Verification of Masking in Probing Model. 1202 - Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Grégoire, Vincent Laporte:
Preservation of Speculative Constant-time by Compilation. 1203 - Sergiu Carpov:
A fast heuristic for mapping Boolean circuits to functional bootstrapping. 1204 - Zhengjun Cao, Lihua Liu:
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card. 1205 - Daniel de Haro Moraes, João Paulo Aragão Pereira, Bruno Estolano Grossi, Gustavo Mirapalheta, George Marcel Monteiro Arcuri Smetana, Wesley Rodrigues, Courtnay Nery Guimarães Jr., Bruno Domingues, Fábio Saito, Marcos Simplício:
Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis. 1206 - Michael Walter:
What Have SNARGs Ever Done for FHE? 1207 - Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra:
Hᴇᴋᴀᴛᴏɴ: Horizontally-Scalable zkSNARKs via Proof Aggregation. 1208 - Mohammed Alghazwi, Tariq Bontekoe, Leon Visscher, Fatih Turkmen:
Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets. 1209 - Quang Dao, Justin Thaler:
More Optimizations to Sum-Check Proving. 1210 - Julius Hermelink, Silvan Streit, Erik Mårtensson, Richard Petri:
A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems. 1211 - Changchang Ding, Zheming Fu:
Efficient Layered Circuit for Verification of SHA3 Merkle Tree. 1212 - Kaartik Bhushan, Alexis Korb, Amit Sahai:
Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions. 1213 - Jiawei Zhang, Jiangshan Long, Changhai Ou, Kexin Qiao, Fan Zhang, Shi Yan:
Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks. 1214 - Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, Bogdan Warinschi:
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols. 1215 - Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, Daniel Slamanig:
Delegatable Anonymous Credentials From Mercurial Signatures With Stronger Privacy. 1216 - Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, Kouichi Sakurai:
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis. 1217 - Xavier Bonnetain, Virginie Lallemand:
A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities. 1218 - Krystal Maughan, Joseph P. Near, Christelle Vincent:
Foldable, Recursive Proofs of Isogeny Computation with Reduced Time Complexity. 1219 - Nikolaos Dimitriou, Albert Garreta, Ignacio Manzur, Ilia Vlasov:
Mova: Nova folding without committing to error terms. 1220 - Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, Hwajeong Seo:
Depth Optimized Quantum Circuits for HIGHT and LEA. 1221 - Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo:
Quantum Implementation and Analysis of ARIA. 1222 - Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic:
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level. 1223 - Axel Durbet, Koray Karabina, Kevin Thiry-Atighehchi:
Generic Construction of Secure Sketches from Groups. 1224 - Knud Ahrens:
SIGNITC: Supersingular Isogeny Graph Non-Interactive Timed Commitments. 1225 - Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin:
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. 1226 - Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, Fan Zhang:
ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments. 1227 - Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models. 1228 - Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. 1229 - Jianing Zhang, Haoyang Wang, Deng Tang:
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY. 1230 - Ganyuan Cao:
A Constructive View of Homomorphic Encryption and Authenticator. 1231 - Ghada Arfaoui, Thibaut Jacques, Cristina Onete:
Efficient and Privacy-Preserving Collective Remote Attestation for NFV. 1232 - Juliane Krämer, Patrick Struck, Maximiliane Weishäupl:
Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC. 1233 - Abiodoun Clement Hounkpevi, Sidoine Djimnaibeye, Michel Seck, Djiby Sow:
EagleSignV3 : A new secure variant of EagleSign signature over lattices. 1234 - Victor Shoup:
Blue fish, red fish, live fish, dead fish. 1235 - Dmytro Zakharov, Oleksandr Kurbatov, Manish Bista, Belove Bist:
Optimizing Big Integer Multiplication on Bitcoin: Introducing w-windowed Approach. 1236 - Ritam Bhaumik, Wonseok Choi, Avijit Dutta, Cuauhtemoc Mancillas López, Hrithik Nandi, Yaobin Shen:
Efficient Variants of TNT with BBB Security. 1237 - Rachit Garg, Rishab Goyal, George Lu:
Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption. 1238 - Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, Yuan Hong:
Efficient Differentially Private Set Intersection. 1239 - Patricia Greene, Mark Motley, Bryan Weeks:
ARADI and LLAMA: Low-Latency Cryptography for Memory Encryption. 1240 - Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, Ari Juels:
PROF: Protected Order Flow in a Profit-Seeking World. 1241 - David Wong, Denis Kolegov, Ivan Mikushin:
Beyond the Whitepaper: Where BFT Consensus Protocols Meet Reality. 1242 - Thales B. Paiva, Marcos A. Simplício Jr., Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo Lopes Cominetti:
Tailoring two-dimensional codes for structured lattice-based KEMs and applications to Kyber. 1243 - Zhengjun Cao, Lihua Liu:
A Note on "Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things". 1244 - Michel Dellepere, Pratyush Mishra, Alireza Shirzad:
Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments. 1245 - Pengcheng Qiu, Guiming Wu, Tingqiang Chu, Changzheng Wei, Runzhou Luo, Ying Yan, Wei Wang, Hui Zhang:
MSMAC: Accelerating Multi-Scalar Multiplication for Zero-Knowledge Proof. 1246 - George Teseleanu:
A Note on the Quasigroup Lai-Massey Structures. 1247 - Morgane Guerreau, Mélissa Rossi:
A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme. 1248 - Parisa Amiri-Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, Gilles Van Assche:
Koala: A Low-Latency Pseudorandom Function. 1249 - Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, Song Bian:
AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation. 1250 - Daniel Dobkin, Edut Katz, David Popovtzer, Itamar Levi:
EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements. 1251 - Henry Corrigan-Gibbs, David J. Wu:
Legendre Sequences are Pseudorandom under the Quadratic-Residuosity Assumption. 1252 - Samuel Coulon, Tianyou Bao, Jiafeng Xie:
FELIX (XGCD for FALCON): FPGA-based Scalable and Lightweight Accelerator for Large Integer Extended GCD. 1253 - Quang Dao, Aayush Jain, Zhengzhong Jin:
Non-Interactive Zero-Knowledge from LPN and MQ. 1254 - Jinhao Zhu, Liana Patel, Matei Zaharia, Raluca Ada Popa:
Compass: Encrypted Semantic Search with High Accuracy. 1255 - Theo Fanuela Prabowo, Chik How Tan:
Concrete Analysis of Schnorr-type Signatures with Aborts. 1256 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Committing Wide Encryption Mode with Minimum Ciphertext Expansion. 1257 - Mihir Bellare, Doreen Riepel, Stefano Tessaro, Yizhao Zhang:
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange. 1258 - Maksym Petkus:
Efficient (Non-)Membership Tree from Multicollision-Resistance with Applications to Zero-Knowledge Proofs. 1259 - Maurice Shih, Michael Rosenberg, Hari Kailad, Ian Miers:
zk-Promises: Making Zero-Knowledge Objects Accept the Call for Banning and Reputation. 1260 - Shai Levin:
A Key-Recovery Attack on a Leaky Seasign Variant. 1261 - Erkan Uslu, Oguz Yayla:
Dilithium-Based Verifiable Timed Signature Scheme. 1262 - Paul Cotan, George Teseleanu:
A Security Analysis of Two Classes of RSA-like Cryptosystems. 1263 - San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, Yingfei Yan:
Succinct Non-Subsequence Arguments. 1264 - Daniel J. Bernstein, Tanja Lange:
Safe curves for elliptic-curve cryptography. 1265 - D'or Banoun, Elette Boyle, Ran Cohen:
Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond. 1266 - Ian Malloy, Dennis Hollenbeck:
Chrysalis Cipher Suite. 1267 - Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri Aravinda Krishnan Thyagarajan:
Improved YOSO Randomness Generation with Worst-Case Corruptions. 1268 - Mike Wa Nkongolo:
Cryptographic Security through Kleene's Theorem and Automata Theory. 1269 - Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang:
Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting. 1270 - Hongrui Cui, Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu:
AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs. 1271 - Julian Nowakowski:
An Improved Algorithm for Code Equivalence. 1272 - Chongrong Li, Yun Li, Pengfei Zhu, Wenjie Qu, Jiaheng Zhang:
HyperPianist: Pianist with Linear-Time Prover via Fully Distributed HyperPlonk. 1273 - Vincent Rieder:
Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples. 1274 - Philippe Teuwen:
MIFARE Classic: exposing the static encrypted nonce variant. 1275 - Alexander Kulpe, Giulio Malavolta, Connor Paddock, Simon Schmidt, Michael Walter:
A bound on the quantum value of all compiled nonlocal games. 1276 - Nicolai Müller, Amir Moradi:
Robust but Relaxed Probing Model. 1277 - Ravi Anand, Shibam Ghosh, Takanori Isobe, Rentaro Shiba:
Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys. 1278 - Kostas Kryptos Chalkias, Charanjit S. Jutla, Jonas Lindstrøm, Varun Madathil, Arnab Roy:
Improved Polynomial Division in Cryptography. 1279 - Rasheed Kibria, Farimah Farahmandi, Mark M. Tehranipoor:
A Survey on SoC Security Verification Methods at the Pre-silicon Stage. 1280 - Liam Eagen, Ariel Gabizon, Marek Sefranek, Patrick Towa, Zachary J. Williamson:
Stackproofs: Private proofs of stack and contract execution using Protogalaxy. 1281 - Jonghyun Kim, Jong Hwan Park:
NTRU+PKE: Efficient Public-Key Encryption Schemes from the NTRU Problem. 1282 - Ghada Almashaqbeh:
Password-authenticated Cryptography from Consumable Tokens. 1283 - Youngjin Bae, Jung Hee Cheon, Guillaume Hanrot, Jai Hyun Park, Damien Stehlé:
Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused. 1284 - Antoine Urban, Matthieu Rambaud:
Robust Multiparty Computation from Threshold Encryption Based on RLWE. 1285 - Hirofumi Yoshioka, Wakaha Ogata, Keitaro Hashimoto:
Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions. 1286 - Vadim Lyubashevsky:
Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA). 1287 - Minjoo Sim, Siwoo Eum, Gyeongju Song, Minwoo Lee, Sangwon Kim, Minho Song, Hwajeong Seo:
KpqClean Ver2: Comprehensive Benchmarking and Analysis of KpqC Algorithm Round 2 Submissions. 1288 - Corentin Jeudy, Olivier Sanders:
Improved Lattice Blind Signatures from Recycled Entropy. 1289 - Fredrik Meisingseth, Christian Rechberger:
SoK: Computational and Distributed Differential Privacy for MPC. 1290 - Rafaël del Pino, Shuichi Katsumata, Thomas Prest, Mélissa Rossi:
Raccoon: A Masking-Friendly Signature Proven in the Probing Model. 1291 - Sohto Chiku, Keisuke Hara, Junji Shikata:
Chosen Ciphertext Security for (Hierarchical) Identity-Based Matchmaking Encryption. 1292 - Ngoc Khanh Nguyen, Gregor Seiler:
Greyhound: Fast Polynomial Commitments from Lattices. 1293 - Shweta Agrawal, Simran Kumari, Ryo Nishimaki:
Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security. 1294 - Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, Dawu Gu:
Identity-Based Encryption from Lattices with More Compactness in the Standard Model. 1295 - Michele Ciampi, Aggelos Kiayias, Yu Shen:
Universal Composable Transaction Serialization with Order Fairness. 1296 - Ward Beullens:
Improved Cryptanalysis of SNOVA. 1297 - Dmitrii I. Koshelev:
Point (de)compression for elliptic curves over highly 2-adic finite fields. 1298 - Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang:
Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups). 1299 - David Gérault, Anna Hambitzer, Moritz Huppert, Stjepan Picek:
SoK: 5 Years of Neural Differential Cryptanalysis. 1300 - Chang Chen, Zelong Wu, Guoyu Yang, Qi Chen, Wei Wang, Jin Li:
Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial. 1301 - Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Siu-Ming Yiu:
RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage. 1302 - Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem. 1303 - Xingwei Ren, Yongqiang Li, Mingsheng Wang:
Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity. 1304 - Claude Carlet, Palash Sarkar:
Constructions of Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks. 1305 - Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, Xiaoyun Wang:
Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure. 1306 - Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert:
On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR. 1307 - Ryan Seah, Daren Khu, Alexander Hoover, Ruth Ng:
LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted. 1308 - Archisman Ghosh, Dong-Hyun Seo, Debayan Das, Santosh Ghosh, Shreyas Sen:
R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection. 1309 - Hayato Watanabe, Ryoma Ito, Toshihiro Ohigashi:
On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers. 1310 - Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, Hyoseung Kim:
Dynamic Threshold Key Encapsulation with a Transparent Setup. 1311 - Mia Filic, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, Anupama Unnikrishnan:
Probabilistic Data Structures in the Wild: A Security Analysis of Redis. 1312 - George Teseleanu:
A Lattice Attack Against a Family of RSA-like Cryptosystems. 1313 - Aydin Abadi:
Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles. 1314 - Omar Ahmed, Nektarios Georgios Tsoutsos:
PulpFHE: Complex Instruction Set Extensions for FHE Processors. 1315 - Arnab Roy, Matthias Johann Steiner:
Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields. 1316 - Hiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, Daniel Tschudi:
MAESTRO: Multi-party AES using Lookup Tables. 1317 - Jincheol Ha, Jooyoung Lee:
Patching and Extending the WWL+ Circuit Bootstrapping Method to FFT Domains. 1318 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Quantum-safe Signatureless DNSSEC. 1319 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation. 1320 - Enrico Talotti, Matteo Paier, Marino Miculan:
ECC's Achilles' Heel: Unveiling Weak Keys in Standardized Curves. 1321 - Debao Wang, Yiwen Gao, Yongbin Zhou, Xian Huang:
Revisiting a Realistic EM Side-Channel Attack on a Complex Modern SoC. 1322 - Hao Cheng, Johann Großschädl, Ben Marshall, Daniel Page, Markku-Juhani O. Saarinen:
SoK: Instruction Set Extensions for Cryptographers. 1323 - Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari:
CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher. 1324 - Francesco Berti, François-Xavier Standaert, Itamar Levi:
Authenticity in the Presence of Leakage using a Forkcipher. 1325 - Zhengjun Cao, Lihua Liu:
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks. 1326 - Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond. 1327 - Roberto Avanzi, Orr Dunkelman, Shibam Ghosh:
A Note on ARADI and LLAMA. 1328 - Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA. 1329 - Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
New Results for Coppersmith's Method from the Perspective of Sumsets Theory. 1330 - Yansong Feng, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan:
Practical Small Private Exponent Attacks against RSA. 1331 - Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, Christophe Petit:
Attacking trapdoors from matrix products. 1332 - Yan Jiang, Youwen Zhu, Jian Wang, Yudi Zhang:
Efficient online and Non-Interactive Threshold Signatures with Identifiable Aborts for Identity-Based Signatures in the IEEE P1363 Standard. 1333 - George Teseleanu:
Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. 1334 - Kai Hu, Trevor Yap:
Perfect Monomial Prediction for Modular Addition. 1335 - Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas-López, Palash Sarkar:
Fast Low Level Disk Encryption Using FPGAs. 1336 - Juan Carlos Ku-Cauich, Javier Diaz-Vargas:
Construction bent functions using the Maiorana McFarland class. 1337 - Anqi Tian, Peifang Ni, Yingzi Gao, Jing Xu:
Horcrux: Synthesize, Split, Shift and Stay Alive Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments. 1338 - Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Comprehensive Robustness Analysis of GCM, CCM, and OCB3. 1339 - Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang:
Unbalanced Private Set Union with Reduced Computation and Communication. 1340 - Pascal Hammer, Veronika Krause, Tobias Probst, Jürgen Mottok:
Approach for High-Performance Random Number Generators for Critical Systems. 1341 - Hua-Lei Yin:
Unconditionally secure key distribution without quantum channel. 1342 - Hua-Lei Yin:
Generalized one-way function and its application. 1343 - Shaoquan Jiang:
Quantum Security of a Compact Multi-Signature. 1344 - Maximilian Pursche, Nikolai Puch, Sebastian N. Peters, Michael P. Heinl:
SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices. 1345 - Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, Mridul Nandi:
Provably Secure Online Authenticated Encryption and Bidirectional Online Channels. 1346 - Shuaishuai Li, Cong Zhang, Dongdai Lin:
Secure Multiparty Computation with Lazy Sharing. 1347 - Michael Brand, Benoît Poletti:
Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs. 1348 - Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, Fuchun Guo:
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR. 1349 - Lukasz Chmielewski, Lubomír Hrbácek:
Update to the Sca25519 Library: Mitigating Tearing-based Side-channel Attacks. 1350 - Benjamin E. Diamond, Angus Gruen:
Proximity Gaps in Interleaved Codes. 1351 - Doreen Riepel, Marloes Venema, Tanya Verma:
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra. 1352 - Jacob A. Blindenbach, Jung Hee Cheon, Gamze Gürsoy, Jiayi Kang:
On the overflow and p-adic theory applied to homomorphic encryption. 1353 - David Chaum, Richard Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagórski, Bingsheng Zhang, Zeyuan Yin:
Votexx: Extreme Coercion Resistance. 1354 - Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. 1355 - Ruiyang Li, Yiteng Sun, Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang:
Leakage-Resilience of Circuit Garbling. 1356 - Ori Mazor, Ori Rottenstreich:
Understanding the Blockchain Interoperability Graph based on Cryptocurrency Price Correlation. 1357 - Lynn Engelberts, Simona Etinski, Johanna Loyer:
Quantum Sieving for Code-Based Cryptanalysis and Its Limitations for ISD. 1358 - Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, Maria Eichlseder:
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs. 1359 - Biming Zhou, Haodong Jiang, Yunlei Zhao:
CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3. 1360 - Christian Badertscher, Fabio Banfi, Jesus Diaz:
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging. 1361 - Benedikt Wagner, Arantxa Zapico:
A Documentation of Ethereum's PeerDAS. 1362 - Sabyasachi Dey, Gregor Leander, Nitin Kumar Sharma:
Improved Key Recovery Attacks on Reduced-Round Salsa20. 1363 - Anca Nitulescu, Nikitas Paslis, Carla Ràfols:
FLIP-and-prove R1CS. 1364 - Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. 1365 - Jungho Moon, Zhanibek Omarov, Donghoon Yoo, Yongdae An, Heewon Chung:
Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations. 1366 - Jonas Bertels, Quinten Norga, Ingrid Verbauwhede:
A Better Kyber Butterfly for FPGAs. 1367 - Renas Bacho, Benedikt Wagner:
Tightly Secure Non-Interactive BLS Multi-Signatures. 1368 - Lorenzo Martinico, Markulf Kohlweiss:
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework. 1369 - Tarun Yadav, Manoj Kumar:
ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON. 1370 - Christopher Harth-Kitzerow, Yongqin Wang, Rachit Rajat, Georg Carle, Murali Annavaram:
PIGEON: A Framework for Private Inference of Neural Networks. 1371 - Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, Wenguang Chen:
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits. 1372 - Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin:
Uncompressing Dilithium's public key. 1373 - Shuhei Nakamura, Yusuke Tani, Hiroki Furue:
Lifting approach against the SNOVA scheme. 1374 - S. S. Aravind Vishnu, M. Sethumadhavan, K. V. Lakshmy:
ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme. 1375 - Kamil Kluczniak, Leonard Schild:
FDFB2: Functional Bootstrapping via Sparse Polynomial Multiplication. 1376 - Ehsan Ebrahimi:
Security Strengthening of Threshold Symmetric Schemes. 1377 - Michael Klooß, Michael Reichle, Benedikt Wagner:
Practical Blind Signatures in Pairing-Free Groups. 1378 - Hyewon Sung, Sieun Seo, Taekyung Kim, Chohong Min:
EvalRound+ Bootstrapping and its Rigorous Analysis for CKKS Scheme. 1379 - Thomas Roche:
EUCLEAK. 1380 - Shivam Bhasin, Harishma Boyapally, Dirmanto Jap:
Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor. 1381 - Arghya Bhattacharjee, Ritam Bhaumik, Chandranan Dhar:
Universal Context Commitment without Ciphertext Expansion. 1382 - René Rodríguez-Aldama, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei:
Self-Orthogonal Minimal Codes From (Vectorial) p-ary Plateaued Functions. 1383 - Sebastian H. Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann:
Password-Protected Key Retrieval with(out) HSM Protection. 1384 - Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, Rotem Oshman:
Locally Verifiable Distributed SNARGs. 1385 - Tobias Frauenschläger, Jürgen Mottok:
Problems and New Approaches for Crypto-Agility in Operational Technology. 1386 - Camille Nuoskala, Hossein Abdinasibfar, Antonis Michalas:
SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption. 1387 - Shuichi Hirahara, Zhenjian Lu, Igor C. Oliveira:
One-Way Functions and pKt Complexity. 1388 - Tomas Gerlich, Jakub Breier, Pavel Sikora, Zdenek Martinasek, Aron Gohr, Anubhab Baksi, Xiaolu Hou:
DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES. 1389 - Shibam Mukherjee, Christian Rechberger, Markus Schofnegger:
Cache Timing Leakages in Zero-Knowledge Protocols. 1390 - Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang:
Scalable Equi-Join Queries over Encrypted Database. 1391 - Madické Diadji Mbodj, Anis Bkakria:
Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography. 1392 - Yekaterina Podiatchev, Ariel Orda, Ori Rottenstreich:
Survivable Payment Channel Networks. 1393 - Erki Külaots, Toomas Krips, Hendrik Eerikson, Pille Pullonen-Raudvere:
SLAMP-FSS: Two-Party Multi-Point Function Secret Sharing from Simple Linear Algebra. 1394 - Felix Linker, Ralf Sasse, David A. Basin:
A Formal Analysis of Apple's iMessage PQ3 Protocol. 1395 - Lars Ran, Simona Samardjiska:
Rare structures in tensor graphs - Bermuda triangles for cryptosystems based on the Tensor Isomorphism problem. 1396 - Nazli Deniz Türe, Murat Cenk:
Efficient Batch Algorithms for the Post-Quantum Crystals Dilithium Signature Scheme and Crystals Kyber Encryption Scheme. 1397 - Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, Alessandro Tomasi:
Coercion-resistant i-voting with short PIN and OAuth 2.0. 1398 - Guillermo Angeris, Alex Evans, Gyumin Roh:
A Note on Ligero and Logarithmic Randomness. 1399 - You Lyu, Shengli Liu, Shuai Han:
Efficient Asymmetric PAKE Compiler from KEM and AE. 1400 - Brent Waters, Hoeteck Wee, David J. Wu:
New Techniques for Preimage Sampling: Improved NIZKs and More from LWE. 1401 - Daniel Bloom, Sai Deng:
A Recursive zk-based State Update System. 1402 - Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. 1403 - Kaizhan Lin, Weize Wang, Chang-An Zhao, Yunlei Zhao:
Π-signHD: A New Structure for the SQIsign Family with Flexible Applicability. 1404 - Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, Jihye Kim:
Lego-DLC: batching module for commit-carrying SNARK under Pedersen Engines. 1405 - Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss:
Blind Multisignatures for Anonymous Tokens with Decentralized Issuance. 1406 - Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, Thomas Schneider:
Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing. 1407 - Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:
Multiple-Tweak Differential Attack Against SCARF. 1408 - Jelle Vos, Mauro Conti, Zekeriya Erkin:
Oraqle: A Depth-Aware Secure Computation Compiler. 1409 - Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, Philipp Jovanovic:
Cryptobazaar: Private Sealed-bid Auctions at Scale. 1410 - Zhengjun Cao, Lihua Liu:
Design issues of "an anonymous authentication and key agreement protocol in smart living". 1411 - Zhengjun Cao, Lihua Liu:
The Zeros of Zeta Function Revisited. 1412 - Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Jiahui Liu:
The Black-Box Simulation Barrier Persists in a Fully Quantum World. 1413 - Ying Ouyang, Deng Tang, Yanhong Xu:
Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller. 1414 - Arad Kotzer, Ori Rottenstreich:
Privacy Comparison for Bitcoin Light Client Implementations. 1415 - Hoeteck Wee:
Circuit ABE with poly(depth, λ)-sized Ciphertexts and Keys from Lattices. 1416 - Jeffrey Champion, David J. Wu:
Distributed Broadcast Encryption from Lattices. 1417 - Robert Hines:
Public-key encryption from a trapdoor one-way embedding of SL2(ℕ). 1418 - Shuang Hu, Bingsheng Zhang, Cong Zhang, Kui Ren:
On the Relationship between Public Key Primitives via Indifferentiability. 1419 - Vincent Ehrmanntraut, Ulrike Meyer:
Privacy-Preserving Breadth-First-Search and Maximal-Flow. 1420 - Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee:
Provable Security of Linux-DRBG in the Seedless Robustness Model. 1421 - Puja Mondal, Supriya Adhikary, Suparna Kundu, Angshuman Karmakar:
ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes. 1422 - Julien Toulemont, Geoffrey Chancel, Frédérick Mailly, Philippe Maurine, Pascal Nouet:
Towards package opening detection at power-up by monitoring thermal dissipation. 1423 - Brennon Brimhall, Orion Weller, Matthew Green, Ian Miers:
A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models. 1424 - Surendra Ghentiyala, Venkatesan Guruswami:
New constructions of pseudorandom codes. 1425 - Anna M. Johnston:
Agile Asymmetric Cryptography and the Case for Finite Fields. 1426 - Carmit Hazay, David Heath, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam, Yibin Yang:
LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK. 1427 - Truong Son Nguyen, Tancrède Lepoint, Ni Trieu:
Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors. 1428 - Dongjin Park, Eunsang Lee, Joon-Woo Lee:
Powerformer: Efficient Privacy-Preserving Transformer with Batch Rectifier-Power Max Function and Optimized Homomorphic Attention. 1429 - Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, Eran Omri:
MYao: Multiparty "Yao" Garbled Circuits with Row Reduction, Half Gates, and Efficient Online Computation. 1430 - Fuchun Lin, Chaoping Xing, Yizhou Yao:
Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation. 1431 - Masayuki Fukumitsu, Shingo Hasegawa:
On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages. 1432 - Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu:
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. 1433 - Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner, Eylon Yogev:
Untangling the Security of Kilian's Protocol: Upper and Lower Bounds. 1434 - Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, Ralf Küsters:
Actively Secure Polynomial Evaluation from Shared Polynomial Encodings. 1435 - Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, Philipp Jovanovic:
Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos. 1436 - Suvadeep Hajra, Debdeep Mukhopadhyay:
HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces. 1437 - Weihao Wang, Shuai Han, Shengli Liu:
Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance. 1438 - Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, Ingrid Verbauwhede:
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms. 1439 - Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Pagliarini:
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort. 1440 - Nan Wang, Dongxi Liu:
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. 1441 - Oguz Yayla, Yunus Emre Yilmaz:
Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA. 1442 - Oguz Yayla, Yunus Emre Yilmaz:
32-bit and 64-bit CDC-7-XPUF Implementation on a Zynq-7020 SoC. 1443 - Eric R. Verheul:
Attestation Proof of Association - provability that attestation keys are bound to the same hardware and person. 1444 - Riccardo Taiello, Emre Tosun, Alberto Ibarrondo, Hervé Chabanne, Melek Önen:
Another Walk for Monchi. 1445 - Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, Ruida Zeng:
Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity. 1446 - Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Generic Differential Key Recovery Attacks and Beyond. 1447 - Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran:
Randomness in Private Sequential Stateless Protocols. 1448 - Thomas Szymkowiak, Endrit Isufi, Markku-Juhani O. Saarinen:
Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions. 1449 - Maha Allouzi, Arefeh Rahaei:
TentLogiX: 5-bit Chaos-Driven S-Boxes for Lightweight Cryptographic Systems. 1450 - Avi Mizrahi, Noam Koren, Ori Rottenstreich, Yuval Cassuto:
Traffic-aware Merkle Trees for Shortening Blockchain Transaction Proofs. 1451 - Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, Kui Ren:
On the Complexity of Cryptographic Groups and Generic Group Models. 1452 - Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, Frederik Vercauteren:
Breaking and Repairing SQIsign2D-East. 1453 - Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, Daniel Wichs:
Interval Key-Encapsulation Mechanism. 1454 - Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, Jiayu Xu:
Threshold PAKE with Security against Compromise of all Servers. 1455 - Alexander Russell, Qiang Tang, Jiadong Zhu:
Crooked Indifferentiability of the Feistel Construction. 1456 - Oguz Yayla, Yunus Emre Yilmaz:
A Combined Design of 4-PLL-TRNG and 64-bit CDC-7-XPUF on a Zynq-7020 SoC. 1457 - Francesco Berti, Itamar Levi:
Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage. 1458 - Martin R. Albrecht, Kamil Doruk Gür:
Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-ish and Thresholdisable. 1459 - Antonia Januszewicz, Daniela Medrano Gutierrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, Taeho Jung:
PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis. 1460 - Jad Silbak, Daniel Wichs:
Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions. 1461 - Ying Gao, Lin Qi, Xiang Liu, Yuanchao Luo, Longxin Wang:
Efficient Fuzzy Private Set Intersection from Fuzzy Mapping. 1462 - Junming Li, Zhi Lu, Renfei Shen, Yuanqing Feng, Songfeng Lu:
Asynchronous Verifiable Secret Sharing with Elastic Thresholds and Distributed Key Generation. 1463 - René Raab, Pascal Berrang, Paul Gerhart, Dominique Schröder:
SoK: Descriptive Statistics Under Local Differential Privacy. 1464 - Tim Beyne, Clémence Bouvier:
Linear approximations of the Flystel construction. 1465 - Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, Chenkai Weng:
Dishonest Majority Constant-Round MPC with Linear Communication from DDH. 1466 - Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:
P2C2T: Preserving the Privacy of Cross-Chain Transfer. 1467 - Wessel P. J. van Woerden:
Dense and smooth lattices in any genus. 1468 - Stefan Dziembowski, Stanislaw Jarecki, Pawel Kedzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu:
Password-Protected Threshold Signatures. 1469 - Chuhan Lu, Minglong Qin, Fang Song, Penghui Yao, Mingnan Zhao:
Quantum Pseudorandom Scramblers. 1470 - Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, Rahul Sharma:
Communication Efficient Secure and Private Multi-Party Deep Learning. 1471 - Mohammed El Baraka, Siham Ezzouak:
Isogeny-Based Secure Voting Systems for Large-Scale Elections. 1472 - Pierre Charbit, Geoffroy Couteau, Pierre Meyer, Reza Naserasr:
A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. 1473 - Parisa Amiri-Eliasi, Koustabh Ghosh, Joan Daemen:
Mystrium: Wide Block Encryption Efficient on Entry-Level Processors. 1474 - Cong Ling, Jingbo Liu, Andrew Mendelsohn:
On the Spinor Genus and the Distinguishing Lattice Isomorphism Problem. 1475 - Mihir Bellare, Rishabh Ranjan, Doreen Riepel, Ali Aldakheel:
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs. 1476 - Gennaro Avitabile, Nico Döttling, Bernardo Magri, Christos Sakkas, Stella Wohnig:
Signature-based Witness Encryption with Compact Ciphertext. 1477 - Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha:
Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs. 1478 - Amit Agarwal, Alexander Bienstock, Ivan Damgård, Daniel Escudero:
Honest Majority GOD MPC with O(depth(C)) Rounds and Low Online Communication. 1479 - Vasyl Ustimenko:
On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography. 1480 - Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada:
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort. 1481 - Katharina Boudgoust, Mark Simkin:
The Power of NAPs: Compressing OR-Proofs via Collision-Resistant Hashing. 1482 - Debrup Chakraborty, Avishek Majumder, Subhabrata Samajder:
Making Searchable Symmetric Encryption Schemes Smaller and Faster. 1483 - Claude Carlet, Irene Villa:
Quadratic-like balanced functions and permutations. 1484 - Mahdi Rahimi:
LARMix$\mathbf{++}$: Latency-Aware Routing in Mix Networks with Free Routes Topology. 1485 - Brent Waters, Daniel Wichs:
Adaptively Secure Attribute-Based Encryption from Witness Encryption. 1486 - Stefan-Lukas Gazdag, Sophia Grundner-Culemann:
The transition to post-quantum cryptography, metaphorically. 1487 - Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti:
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae. 1488 - Nishanth Chandran, Juan A. Garay, Ankit Kumar Misra, Rafail Ostrovsky, Vassilis Zikas:
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC. 1489 - Dakshita Khurana, Kabir Tomer:
Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from #P-Hardness. 1490 - Zhengjun Cao, Lihua Liu:
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud. 1491 - Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu:
Multi-Designated Detector Watermarking for Language Models. 1492 - Noor Athamnah, Eden Florentz-Konopnicki, Ron D. Rothblum:
Rate-1 Zero-Knowledge Proofs from One-Way Functions. 1493 - Gowri R. Chandran, Thomas Schneider, Maximilian Stillger, Christian Weinert:
Concretely Efficient Private Set Union via Circuit-based PSI. 1494 - Anna-Lena Horlemann, Karan Khathuria, Marc Newman, Amin Sakzad, Carlos Vela Cabello:
Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems. 1495 - Jianting Zhang, Aniket Kate:
No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains. 1496 - Andrej Bogdanov, Chris Jones, Alon Rosen, Ilias Zadik:
Low-degree Security of the Planted Random Subgraph Problem. 1497 - Federico Barbacovi, Enrique Larraia, Paul Germouty, Wei Zhang:
Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script. 1498 - Suvasree Biswas, Arkady Yerukhimovich:
Multi-Key Fully-Homomorphic Aggregate MAC for Arithmetic Circuits. 1499 - Luowen Qian, Justin Raizes, Mark Zhandry:
Hard Quantum Extrapolations in Quantum Cryptography. 1500 - Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, Kanye Ye Wang:
Exploring User Perceptions of Security Auditing in the Web3 Ecosystem. 1501 - HyunHo Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song:
TopGear 2.0: Accelerated Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing. 1502 - Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig, Mehdi Tibouchi:
Scalable Mixnets from Mercurial Signatures on Randomizable Ciphertexts. 1503 - Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". 1504 - Jeongeun Park, Barry Van Leeuwen, Oliver Zajonc:
FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE. 1505 - Daniele Micciancio, Mark Schultz-Wu:
Bit Security: optimal adversaries, equivalence results, and a toolbox for computational-statistical security analysis. 1506 - Valerio Cini, Hoeteck Wee:
Unbounded ABE for Circuits from LWE, Revisited. 1507 - Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Takanori Isobe:
Key Collisions on AES and Its Applications. 1508 - Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim:
DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group. 1509 - Giuseppe D'Alconzo, Alessio Meneghetti, Edoardo Signorini:
Group Factorisation for Smaller Signatures from Cryptographic Group Actions. 1510 - Ruchi Telang Gode:
Some Classes of Cubic Monomial Boolean Functions with Good Second-Order Nonlinearity. 1511 - Yiwen Gao, Haibin Kan, Yuan Li:
Improved Soundness Analysis of the FRI Protocol. 1512 - Oskar Goldhahn, Kristian Gjøsteen:
Depth Optimized Circuits for Lattice Based Voting with Large Candidate Sets. 1513 - Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, Akshayaram Srinivasan:
Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash. 1514 - Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç:
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}. 1515 - Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, Mingyuan Wang:
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption. 1516 - Lih-Chung Wang, Chun-Yen Chou, Jintai Ding, Yen-Liang Kuan, Jan Adriaan Leegwater, Ming-Siou Li, Bo-Shu Tseng, Po-En Tseng, Chia-Chun Wang:
A Note on the SNOVA Security. 1517 - Paul Lou, Nathan Manohar, Amit Sahai:
Witness Semantic Security. 1518 - Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, Koji Nuida:
Efficient theta-based algorithms for computing (ℓ, ℓ)-isogenies on Kummer surfaces for arbitrary odd ℓ. 1519 - Antonio Sanso:
On the rough order assumption in imaginary quadratic number fields. 1520 - Gaëtan Cassiers, Charles Momin:
The SMAesH dataset. 1521 - Yuxuan Wang, Jintong Yu, Shipei Qu, Xiaolin Zhang, Xiaowei Li, Chi Zhang, Dawu Gu:
Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices. 1522 - Nikhil Vanjani, Pratik Soni, Sri Aravinda Krishnan Thyagarajan:
Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments. 1523 - Zhenjian Lu, Noam Mazor, Igor C. Oliveira, Rafael Pass:
Lower Bounds on the Overhead of Indistinguishability Obfuscation. 1524 - Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, Amos Treiber:
Evaluating Leakage Attacks Against Relational Encrypted Search. 1525 - Brandon:
Overpass Channels: Horizontally Scalable, Privacy-Enhanced, with Independent Verification, Fluid Liquidity, and Robust Censorship Proof, Payments. 1526 - Peng Wang, Shuping Mao, Ruozhou Xu, Jiwu Jing, Yuewu Wang:
How to Recover the Full Plaintext of XCB. 1527 - Gavin Cho, Georg Fuchsbauer, Adam O'Neill:
Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption. 1528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.