


default search action
IACR Cryptology ePrint Archive, Volume 2022
Volume 2022, 2022
- Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. 1 - (Withdrawn) Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes. 2
- Rutchathon Chairattana-Apirom, Anna Lysyanskaya:
Compact Cut-and-Choose: Boosting the Security of Blind Signature Schemes, Compactly. 3 - Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Publicly verifiable anonymous tokens with private metadata bit. 4 - Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe:
Pseudorandom Bit Generation with Asymmetric Numeral Systems. 5 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon:
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures. 6 - Benedikt Wagner, Lucjan Hanzlik, Julian Loss:
PI-Cut-Choo! Parallel Instance Cut and Choose for Practical Blind Signatures. 7 - Jiahui Liu, Qipeng Liu, Luowen Qian:
Beating Classical Impossibility of Position Verification. 8 - Abhiram Kothapalli, Bryan Parno:
Algebraic Reductions of Knowledge. 9 - Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen:
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks. 10 - Alfredo Rial, Ania M. Piotrowska:
Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance. 11 - Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
Security of Identity-based Encryption Schemes from Quadratic Residues. 12 - Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak. 13 - Hyunji Kim, Sejin Lim, Yeajun Kang, Won-Woong Kim, Hwajeong Seo:
Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors. 14 - Jiaxin Pan, Benedikt Wagner:
Lattice-based Signatures with Tight Adaptive Corruptions and More. 15 - Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti:
An algebraic attack to the Bluetooth stream cipher E0. 16 - Shingo Sato, Keita Emura, Atsushi Takayasu:
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation. 17 - Ahmet Ramazan Agirtas, Oguz Yayla:
Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup. 18 - Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. 19 - Sisi Duan, Haibin Zhang:
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. 20 - Sisi Duan, Haibin Zhang, Boxin Zhao:
WaterBear: Information-Theoretic Asynchronous BFT Made Practical. 21 - Xiuju Huang, Jiashuo Song, Zichen Li:
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation. 22 - Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi:
Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits. 23 - Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation. 24 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. 25 - Andrada-Teodora Ciulei, Marian-Codrin Cretu, Emil Simion:
Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective. 26 - Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice. 27 - Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. 28 - Amit Choudhari, Sylvain Guilley, Khaled Karray
:
CRYScanner: Finding cryptographic libraries misuse. 29 - Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. 30 - Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu:
BAT: Small and Fast KEM over NTRU Lattices. 31 - Denis Firsov, Sven Laur, Ekaterina Zhuchko:
Formal Analysis of Non-Malleability for Commitments in EasyCrypt. 32 - Jonathan Godin, Philippe Lamontagne:
Deletion-Compliance in the Absence of Privacy. 33 - Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi:
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic. 34 - Vipul Goyal, Justin Raizes, Pratik Soni:
Time-Traveling Simulators Using Blockchains and Their Applications. 35 - Melissa Azouaoui
, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert:
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. 36 - Dmitrii I. Koshelev:
Subgroup membership testing on elliptic curves via the Tate pairing. 37 - Antonio de la Piedra, Marloes Venema, Greg Alpár:
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption. 38 - Ambili K. N, Jimmy Jose:
Outsourced CP-ABE with Whitebox Accountability in IoT Systems. 39 - Ambili K. N, Jimmy Jose:
Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption. 40 - Ambili K. N, Jimmy Jose:
Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack. 41 - Ambili K. N, Jimmy Jose:
Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher. 42 - Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji:
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges. 43 - Atakan Arslan, Muhammed Ali Bingöl:
Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes. 44 - Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud:
Probing Security through Input-Output Separation and Revisited Quasilinear Masking. 45 - Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake:
Membership Privacy for Asynchronous Group Messaging. 46 - Stefano Tessaro, Chenzhi Zhu:
Short Pairing-Free Blind Signatures with Exponential Security. 47 - Nadia Heninger:
RSA, DH, and DSA in the Wild. 48 - Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger:
Small MACs from Small Permutations. 49 - Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim:
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA. 50 - Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security. 51 - Sourav Das, Zhuolun Xiang, Ling Ren:
Balanced Quadratic Reliable Broadcast and Improved Asynchronous Verifiable Information Dispersal. 52 - Aron Gohr:
Brute Force Cryptanalysis. 53 - Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluderovic, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso:
SIKE Channels. 54 - Xiaokang Dai, Wenyuan Wu, Yong Feng:
Key lifting : a more efficient weak MKFHE scheme in the plain model against rational adversary. 55 - Itay Tsabary, Alex Manuskin, Ittay Eyal:
LedgerHedger: Gas Reservation for Smart-Contract Security. 56 - Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi:
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon. 57 - Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, Amber Sprenkels:
First-Order Masked Kyber on ARM Cortex-M4. 58 - Kaiyi Zhang, Hongrui Cui, Yu Yu:
SPHINCS-α: A Compact Stateless Hash-Based Signature Scheme. 59 - Paul Frixons, María Naya-Plasencia, André Schrottenloher:
Quantum Boomerang Attacks and Some Applications. 60 - Nicu Neculache, Vlad-Andrei Petcu, Emil Simion:
A remark on the NIST 800-22 Binary Matrix Rank Test. 61 - Daniel Escudero:
An Introduction to Secret-Sharing-Based Secure Multiparty Computation. 62 - Kang Yang, Xiao Wang:
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers. 63 - Françoise Levy-dit-Vehel, Maxime Roméas:
A Framework for the Design of Secure and Efficient Proofs of Retrievability. 64 - Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev:
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS. 65 - Anghel Florin, Asandoaiei David, Tabacaru Robert:
A remark on the Discrete Fourier Transform statistical test. 66 - Jakub Klemsa, Melek Önen:
Parallel Operations over TFHE-Encrypted Multi-Digit Integers. 67 - Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Updatable Public Key Encryption in the Standard Model. 68 - Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Small-Box Cryptography. 69 - Marshall Ball
, Dana Dachman-Soled, Julian Loss:
(Nondeterministic) Hardness vs. Non-Malleability. 70 - Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor:
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. 71 - Keita Emura:
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction. 72 - Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide:
Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain. 73 - Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart:
FINAL: Faster FHE instantiated with NTRU and LWE. 74 - Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate:
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. 75 - Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan:
Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security. 76 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Multiple Noisy Private Remote Source Observations for Secure Function Computation. 77 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Secure Lossy Function Computation with Multiple Private Remote Source Observations. 78 - Thijs Veugen:
Lightweight Secure Integer Comparison. 79 - Yu Long Chen, Stefano Tessaro:
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation. 80 - Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan:
Single-Server Private Information Retrieval with Sublinear Amortized Time. 81 - Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart:
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs. 82 - Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. 83 - Lucjan Hanzlik, Julian Loss, Benedikt Wagner:
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2. 84 - Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang:
Cross-Domain Identity-based Matchmaking Encryption. 85 - Luke Pearson, Joshua Brian Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia:
PlonKup: Reconciling PlonK with plookup. 86 - The DFINITY Team:
The Internet Computer for Geeks. 87 - Stefania Andries, Andrei-Daniel Miron, Andrei Cristian, Emil Simion:
A survey on the security protocols employed by mobile messaging applications. 88 - Kamil Kluczniak:
NTRU-ν-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. 89 - Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia:
Attacks on Encrypted Range Search Schemes in Multiple Dimensions. 90 - Thomas Häner, Mathias Soeken:
The multiplicative complexity of interval checking. 91 - N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor:
Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs. 92 - Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen:
Public-Key Encryption from Continuous LWE. 93 - Nir Drucker, Tomer Pelleg:
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies. 94 - Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. 95 - Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung:
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications. 96 - Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu:
Lattice Signature can be as Simple as Lattice Encryption. 97 - Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. 98 - Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha:
Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference. 99 - Funda Özdemir, Çetin Kaya Koç:
Development of Cryptography since Shannon. 100 - Mingxing Hu, Zhen Liu:
Lattice-Based Linkable Ring Signature in the Standard Model. 101 - Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner:
MPC-Friendly Commitments for Publicly Verifiable Covert Security. 102 - (Withdrawn) E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System. 103
- Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang:
Minotaur: Multi-Resource Blockchain Consensus. 104 - Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly:
Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces. 105 - Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All. 106 - Aydin Abadi, Steven J. Murdoch:
Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims. 107 - Rohon Kundu, Alessandro De Piccoli, Andrea Visconti:
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method. 108 - Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees. 109 - Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede:
Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations. 110 - Christina Boura, Rachelle Heim Boissier, Yann Rotella:
Breaking Panther. 111 - Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels:
Faster Kyber and Dilithium on the Cortex-M4. 112 - Theodore Bugnet, Alexei Zamyatin:
XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets. 113 - Ziaur Rahman, Xun Yi, Ibrahim Khalil
:
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat. 114 - Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang:
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks. 115 - Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). 116 - Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. 117 - Vitaly Kiryukhin:
Streebog compression function as PRF in secret-key settings. 118 - Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi:
Hardware Implementation of SpoC-128. 119 - Florette Martinez:
Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators. 120 - Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui
, Jovan Komatovic, Zarko Milosevic, Adi Seredinschi:
Crime and Punishment in Distributed Byzantine Decision Tasks. 121 - Alexandru Gheorghiu, Tony Metger, Alexander Poremba:
Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more. 122 - Subhra Mazumdar, Sushmita Ruj:
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. 123 - Dor Salomon, Itamar Levi:
On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case. 124 - Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem. 125 - Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion:
Storage Security in Cloud Computing: Data Auditing Protocols. 126 - Gyu-Chol Kim, Jae-Yong Sin, Yong-Bok Jong:
CCA secure ElGamal encryption over an integer group where ICDH assumption holds. 127 - Pierre Karpman, Charlotte Lefevre:
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes. 128 - Michael Gruber, Georg Sigl:
TOFU - Toggle Count Analysis made simple. 129 - Gideon Samid:
A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion. 130 - Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. 131 - Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin:
On Defeating Graph Analysis of Anonymous Transactions. 132 - Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplício Jr., Harsh Kupwade Patil, Jefferson E. Ricardini:
Faster verification of V2X BSM messages via Message Chaining. 133 - Emanuele Bellini, Rusydi H. Makarim:
Functional Cryptanalysis: Application to reduced-round Xoodoo. 134 - Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier:
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers. 135 - Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad:
Twilight: A Differentially Private Payment Channel Network. 136 - Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini:
Ten years of cube attacks. 137 - Pierre Galissant, Louis Goubin:
Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model. 138 - Christian Janson, Patrick Struck:
Sponge-based Authenticated Encryption: Security against Quantum Attackers. 139 - Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck:
On the Related-Key Attack Security of Authenticated Encryption Schemes. 140 - Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. 141 - Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications. 142 - Guangpu Gao, Weiguo Zhang, Yongjuan Wang:
Composition construction of new bent functions from known dually isomorphic bent functions. 143 - Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer:
Rainbow Differential Privacy. 144 - Yasufumi Hashimoto:
An elementary construction of QR-UOV. 145 - Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. 146 - Amar Bapic, Enes Pasalic, Fengrong Zhang, Samir Hodzic:
Constructing new superclasses of bent functions from known ones. 147 - Thomas Johansson, Willi Meier, Vu Nguyen:
Attacks on the Firekite cipher. 148 - Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler:
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping. 149 - Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography. 150 - Ling Sun, Wei Wang, Meiqin Wang:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 151 - Minjoo Sim, Siwoo Eum, Gyeongju Song, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, HyunJi Kim, Yujin Yang, Won-Woong Kim, Wai-Kong Lee, Hwajeong Seo:
K-XMSS and K-SPHINCS+: Hash based Signatures with\\Korean Cryptography Algorithms. 152 - Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez:
Faulty isogenies: a new kind of leakage. 153 - Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
Coeus: A System for Oblivious Document Ranking and Retrieval. 154 - Conor McMenamin, Vanesa Daza, Matthias Fitzi:
FairTraDEX: A Decentralised Exchange Preventing Value Extraction. 155 - Benjamin Y. Chan, Cody Freitag, Rafael Pass:
Cosmic Security. 156 - Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. 157 - Olivier Bronchain, Gaëtan Cassiers:
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs. 158 - (Withdrawn) A Note on Blockchain Authentication Methods For Mobile Devices In Healthcare. 159
- Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche:
Random primes in arithmetic progressions. 160 - Easwar Vivek Mangipudi, Aniket Kate:
D-KODE: Mechanism to Generate and Maintain a Billion Keys. 161 - Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player:
On the precision loss in approximate homomorphic encryption. 162 - James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula:
A High Performance Payment Processing System Designed for Central Bank Digital Currencies. 163 - Yunzhou Yan, Yu Xia, Srinivas Devadas:
Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees. 164 - Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
PAC Learnability of iPUF Variants. 165 - Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. 166 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority. 167 - Gal Arnon, Alessandro Chiesa, Eylon Yogev:
Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs. 168 - Markku-Juhani O. Saarinen:
NIST SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful. 169 - Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker:
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies. 170 - Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang:
Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions. 171 - Corina-Elena Bogos, Razvan Mocanu, Emil Simion:
A remark on NIST SP 800-22 serial test. 172 - Ron D. Rothblum, Prashant Nalini Vasudevan:
Collision-Resistance from Multi-Collision-Resistance. 173 - Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng:
How to Launch a Powerful Side-Channel Collision Attack? 174 - Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar:
WeRLman: To Tackle Whale (Transactions), Go Deep (RL). 175 - Minze Xu, Yuan Zhang, Sheng Zhong:
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems. 176 - Mingxun Zhou, Elaine Shi:
The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms. 177 - Iftach Haitner, Daniel Nukrai, Eylon Yogev:
Lower Bound on SNARGs in the Random Oracle Model. 178 - Rishab Goyal, Vinod Vaikuntanathan:
Locally Verifiable Signature and Key Aggregation. 179 - Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert:
Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher. 180 - Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero:
Vector Commitments over Rings and Compressed Σ-Protocols. 181 - Si Gao, Elisabeth Oswald:
A Novel Framework for Explainable Leakage Assessment. 182 - Liu Zhang, Zilong Wang, Boyang Wang:
Improving Differential-Neural Cryptanalysis with Inception Blocks. 183 - Jian Guo, Guozhen Liu, Ling Song, Yi Tu:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3. 184 - Nir Bitansky, Sapir Freizeit:
Statistically Sender-Private OT from LPN and Derandomization. 185 - Seunghwan Lee, Dong-Joon Shin:
Overflow-detectable Floating-point Fully Homomorphic Encryption. 186 - Sebastian Kolby, Divya Ravi, Sophia Yakoubov:
Towards Efficient YOSO MPC Without Setup. 187 - Thibauld Feneuil, Antoine Joux, Matthieu Rivain:
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs. 188 - André Schrottenloher, Marc Stevens:
Simplified MITM Modeling for Permutations: New (Quantum) Attacks. 189 - Arasu Arun, Joseph Bonneau, Jeremy Clark:
Short-lived zero-knowledge proofs and signatures. 190 - Andrew Park, Wei-Kai Lin, Elaine Shi:
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead. 191 - Lawrence Roy:
SoftSpokenOT: Communication-Computation Tradeoffs in OT Extension. 192 - Adithya Bhat, Aniket Kate, Kartik Nayak, Nibesh Shrestha:
OptRand: Optimistically responsive distributed random beacons. 193 - Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-round SHA3-384 in Practical Time. 194 - Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul:
Quantum and Classical Algorithms for Bounded Distance Decoding. 195 - Ariana Goh, Chu-Wee Lim, Yan Bo Ti:
Generalising Fault Attacks to Genus Two Isogeny Cryptosystems. 196 - Charles Bouillaguet:
Nice Attacks - but What is the Cost? Computational Models for Cryptanalysis. 197 - Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo:
Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption. 198 - Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo:
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing. 199 - Akshayaram Srinivasan:
Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds. 200 - Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi:
Enig: Player Replaceable Finality Layers with Optimal Validity. 201 - Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas:
Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's. 202 - Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV. 203 - Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu:
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library. 204 - Dipayan Das, Antoine Joux, Anand Kumar Narayanan:
Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions. 205 - Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang:
Proving UNSAT in Zero Knowledge. 206 - Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding:
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. 207 - Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. 208 - ZiXi Hee, Iftekhar Salam:
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection. 209 - Jonathan Katz, Cong Zhang, Hong-Sheng Zhou:
An Analysis of the Algebraic Group Model. 210 - Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts. 211 - Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decrypton Failure Probability of Kyber in Reality. 212 - Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin:
Issuer-Hiding Attribute-Based Credentials. 213 - Ward Beullens:
Breaking Rainbow Takes a Weekend on a Laptop. 214 - Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Fine-Grained Access Control. 215 - Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Short Leakage Resilient and Non-malleable Secret Sharing Schemes. 216 - Luke Beckwith, Duc Tri Nguyen, Kris Gaj:
High-Performance Hardware Implementation of Lattice-Based Digital Signatures. 217 - Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody:
On the Impossibility of Key Agreements from Quantum Random Oracles. 218 - Hanyu Jia, Xiangxue Li:
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication. 219 - Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi:
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security. 220 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Joint Communication and Sensing. 221 - Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. 222 - Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud:
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection. 223 - Daniel Rausch, Ralf Küsters, Céline Chevalier:
Embedding the UC Model into the IITM Model. 224 - Monika Henzinger, Jalaj Upadhyay:
Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms. 225 - Mark Zhandry:
To Label, or Not To Label (in Generic Groups). 226 - Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. 227 - Omri Shmueli:
Semi-Quantum Tokenized Signatures. 228 - Markku-Juhani O. Saarinen:
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography. 229 - Gregor Haas, Aydin Aysu:
Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto. 230 - Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang:
Towards Low-Latency Implementation of Linear Layers. 231 - Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli:
Conditional Variational AutoEncoder based on Stochastic Attack. 232 - Martin R. Albrecht, Milos Prokop, Yixin Shen, Petros Wallden:
Variational quantum solutions to the Shortest Vector Problem. 233 - Luca De Feo, Antonin Leroux, Benjamin Wesolowski:
New algorithms for the Deuring correspondence: SQISign twice as fast. 234 - Giuseppe Persiano, Kevin Yeo:
Limits of Preprocessing for Single-Server PIR. 235 - Tristan Nemoz, Zoé Amblard, Aurélien Dupin:
Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation. 236 - Jesper Buus Nielsen, João Ribeiro, Maciej Obremski:
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions. 237 - Lijing Zhou, Ziyu Wang, Xiao Zhang, Yu Yu:
HEAD: an FHE-based Outsourced Computation Protocol with Compact Storage and Efficient Computation. 238 - Ziyu Zhao, Jintai Ding:
Several Improvements on BKZ Algorithm. 239 - Hamza Abusalah, Georg Fuchsbauer, Peter Gazi, Karen Klein:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. 240 - John Kelsey, Stefan Lucks:
Coalition and Threshold Hash-Based Signatures. 241 - Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring:
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. 242 - Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis. 243 - Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi:
Universally Composable Subversion-Resilient Cryptography. 244 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
Entropic Hardness of Module-LWE from Module-NTRU. 245 - Hannah Davis, Denis Diemert, Felix Günther, Tibor Jager:
On the Concrete Security of TLS 1.3 PSK Mode. 246 - Aldo Gunsing, Joan Daemen, Bart Mennink:
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model. 247 - Aldo Gunsing, Bart Mennink:
Collapseability of Tree Hashes. 248 - Aldo Gunsing, Bart Mennink:
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free. 249 - Vipul Goyal, Yuval Ishai, Yifan Song:
Private Circuits with Quasilinear Randomness. 250 - Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter:
CoCoA: Concurrent Continuous Group Key Agreement. 251 - Charles Momin, Gaëtan Cassiers, François-Xavier Standaert:
Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations. 252 - Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui
, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic:
The Side-Channel Metric Cheat Sheet. 253 - Charles Momin, Gaëtan Cassiers, François-Xavier Standaert:
Unprotected and Masked Hardware Implementations of Spook v2. 254 - Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang:
Round-Optimal Byzantine Agreement. 255 - Ueli Maurer, Christopher Portmann, Guilherme Rito:
Multi-Designated Receiver Signed Public Key Encryption. 256 - Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols. 257 - Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark M. Tehranipoor, Fahim Rahman:
Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications. 258 - Andre Esser, Alexander May, Javier A. Verbel, Weiqiang Wen:
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. 259 - Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark M. Tehranipoor:
Advances in Logic Locking: Past, Present, and Prospects. 260 - Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof:
Sublinear GMW-Style Compiler for MPC with Preprocessing. 261 - Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan:
Secure Non-Interactive Reduction and Spectral Analysis of Correlations. 262 - Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov:
Rethinking Modular Multi-Exponentiation in Real-World Applications. 263 - Ittai Abraham, Gilad Asharov:
Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security. 264 - Georg Fuchsbauer, Michele Orrù:
Non-interactive Mimblewimble transactions, revisited. 265 - Likang Lu, Jianzhu Lu:
Verifiably Distributed Multi-User Secret Sharing schemes. 266 - Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. 267 - Mihir Bellare, Viet Tung Hoang:
Efficient Schemes for Committing Authenticated Encryption. 268 - Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard:
ON CODES AND LEARNING WITH ERRORS OVER FUNCTION FIELDS. 269 - Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM. 270 - Alexander May, Julian Nowakowski, Santanu Sarkar:
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents. 271 - Shingo Sato, Junji Shikata:
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality. 272 - Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald:
Compact Storage for Homomorphic Encryption. 273 - Thomas Pornin:
EcGFp5: a Specialized Elliptic Curve. 274 - Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha:
Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction. 275 - Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Hardness estimates of the Code Equivalence Problem in the Rank Metric. 276 - Robin Salen, Vijaykumar Singh, Vladimir Soukharev:
Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields. 277 - Iftach Haitner, Noam Mazor, Jad Silbak:
Incompressiblity and Next-Block Pseudoentropy. 278 - Tron Omland, Pantelimon Stanica:
Permutation rotation-symmetric Sboxes, liftings and affine equivalence. 279 - Jung Hee Cheon, Wootae Kim, Jai Hyun Park:
Efficient Homomorphic Evaluation on Large Interval. 280 - Shafik Nassar, Ron D. Rothblum:
Succinct Interactive Oracle Proofs: Applications and Limitations. 281 - Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald:
Achievable CCA2 Relaxation for Homomorphic Encryption. 282 - Aldo Gunsing:
Block-Cipher-Based Tree Hashing. 283 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon:
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General. 284 - Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions. 285 - Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh:
Provably Secure Identity-Based Remote Password Registration. 286 - Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
User-Perceived Privacy in Blockchain. 287 - Aaron Feickert, Aram Jivanyan:
Spats: user-defined confidential assets for the Spark transaction protocol. 288 - Joachim Neu, Ertem Nusret Tas, David Tse:
Two Attacks On Proof-of-Stake GHOST/Ethereum. 289 - Anna Lysyanskaya, Leah Namisa Rosenbloom:
Universally Composable Sigma-protocols in the Global Random-Oracle Model. 290 - Vadim Tsypyschev, Iliya Morgasov:
Provable security of CFB mode of operation with external re-keying. 291 - Michael Amar, Amit Kama, Kang Wang, Yossi Oren:
Comment on "SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices". 292 - Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Minimizing Setup in Broadcast-Optimal Two Round MPC. 293 - Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu:
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets. 294 - Alexander Poremba:
Quantum Proofs of Deletion for Learning with Errors. 295 - Vasyl Ustimenko:
On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory. 296 - Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie:
Promise Σ-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. 297 - Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai:
Constructive Post-Quantum Reductions. 298 - Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. 299 - Irem Keskinkurt Paksoy, Murat Cenk:
Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication. 300 - Jakub Breier, Xiaolu Hou:
How Practical are Fault Injection Attacks, Really? 301 - Sílvia Casacuberta, Julia Hesse, Anja Lehmann:
SoK: Oblivious Pseudorandom Functions. 302 - Nick Frymann, Daniel Gardham, Mark Manulis:
Unlinkable Delegation of WebAuthn Credentials. 303 - Yu Long Chen, Avijit Dutta, Mridul Nandi:
Multi-User BBB Security of Public Permutations Based MAC. 304 - Ben Smyth, Michael R. Clarkson:
Surveying definitions of election verifiability. 305 - Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. 306 - Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé:
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. 307 - Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern:
Colordag: An Incentive-Compatible Blockchain. 308 - Ashrujit Ghoshal, Ilan Komargodski:
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgard Hashing. 309 - Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. 310 - Peihan Miao, Sikhar Patranabis, Gaven J. Watson:
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE. 311 - Shahar P. Cohen, Moni Naor:
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols. 312 - Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede:
Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System. 313 - Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu:
Batch-OT with Optimal Rate. 314 - Damiano Abram, Peter Scholl:
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN. 315 - Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. 316 - Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei:
Thora: Atomic And Privacy-Preserving Multi-Channel Updates. 317 - Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. 318 - Long Meng, Liqun Chen:
A Blockchain-based Long-term Time-Stamping Scheme. 319 - Peter Rindal, Srinivasan Raghuraman:
Blazing Fast PSI from Improved OKVS and Subfield VOLE. 320 - Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb:
zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance. 321 - Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. 322 - Joppe W. Bos, Joost Renes, Amber Sprenkels:
Dilithium for Memory Constrained Devices. 323 - Yao Jiang Galteland, Jiaxin Pan:
Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption. 324 - Michail Moraitis, Elena Dubrova:
FPGA Design Deobfuscation by Iterative LUT Modifications at Bitstream Level. 325 - Pierre Civit, Maria Potop-Butucaru:
Composable Dynamic Secure Emulation. 326 - Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Provable Secure Software Masking in the Real-World. 327 - Lennert Wouters, Benedikt Gierlichs, Bart Preneel:
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks. 328 - Daniel R. L. Brown:
Rolling up lattice cryptography primes. 329 - Rachit Garg, Rishab Goyal, George Lu:
A Simple and Generic Approach to Dynamic Collusion Model. 330 - Akiko Inoue, Kazuhiko Minematsu:
Parallelizable Authenticated Encryption with Small State Size. 331 - Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa:
CostCO: An automatic cost modeling framework for secure multi-party computation. 332 - Dandan Yuan, Shujie Cui, Giovanni Russello:
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption. 333 - Dung Bui, Geoffroy Couteau:
Private Set Intersection from Pseudorandom Correlation Generators. 334 - Tuan-Hong Chua, Iftekhar Salam:
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System. 335 - Brent Waters, David J. Wu:
Batch Arguments for NP and More from Standard Bilinear Group Assumptions. 336 - Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. 337 - Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida:
Private Intersection-Weighted-Sum. 338 - Igor Semaev:
New Digital Signature Algorithm EHT. 339 - Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA. 340 - Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. 341 - Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch:
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications. 342 - Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai:
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. 343 - William Wang:
Shorter Signatures from MQ. 344 - Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski:
On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves. 345 - Andreas Hülsing, Mikhail A. Kudinov:
Recovering the tight security proof of SPHINCS+. 346 - Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. 347 - Yu Dai, Kaizhan Lin, Zijian Zhou, Chang-An Zhao:
Fast Subgroup Membership Testings for $\G_1$, $\G_2$ and $\G_T$ on Pairing-friendly Curves. 348 - Antoine Leudière, Pierre-Jean Spaenlehauer:
Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields. 349 - Bruno Mazorra, Victor Adan, Vanesa Daza:
Do not rug on me: zero-dimensional scam detection. 350 - Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub:
Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt. 351 - Youssef El Housni, Aurore Guillevic, Thomas Piellard:
Co-factor clearing and subgroup membership testing on pairing-friendly curves. 352 - James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan:
SNARGs for P from Sub-exponential DDH and QR. 353 - Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer:
Optimal Synchronous Approximate Agreement with Asynchronous Fallback. 354 - Alexander Bienstock, Jaiden Fairoze, Sanjam Garg
, Pratyay Mukherjee, Srinivasan Raghuraman:
A More Complete Analysis of the Signal Double Ratchet Algorithm. 355 - Mustain Billah, Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Rafiqul Islam:
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles. 356 - Antonin Leroux:
An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves. 357 - Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Optimal Private Set Union from Multi-Query Reverse Private Membership Test. 358 - Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. 359 - Thijs Veugen, Bart Kamphorst, Michiel Marcus:
Privacy-Preserving Contrastive Explanations with Local Foil Trees. 360 - Panagiotis Chatzigiannis, Konstantinos Chalkias:
Base64 Malleability in Practice. 361 - Alexander May, Carl Richard Theodor Schneider
:
How to Backdoor (Classical) McEliece and How to Guard Against Backdoors. 362 - Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl:
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security. 363 - Aymeric Genêt, Novak Kaluderovic:
Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE. 364 - Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz:
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform. 365 - Clémence Bouvier, Anne Canteaut, Léo Perrin:
On the Algebraic Degree of Iterated Power Functions. 366 - Patrick Longa:
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings and Supersingular Isogeny-Based Protocols. 367 - Samir Jordan Menon, David J. Wu:
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition. 368 - Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching Attacks on Romulus-M. 369 - Riddhi Ghosal, Paul Lou, Amit Sahai:
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head". 370 - Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim:
A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier. 371 - Vadym Kliuchnikov, Kristin E. Lauter, Romy M. Minko, Christophe Petit, Adam Paetznick:
Shorter quantum circuits. 372 - Sergey Agievich:
Blind accumulators for e-voting. 373 - Yehuda Lindell:
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. 374 - Tingting Guo, Peng Wang:
A Note on the Security Framework of Two-key DbHtS MACs. 375 - Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia:
Universally Composable End-to-End Secure Messaging. 376 - Hamidreza Khoshakhlagh:
(Commit-and-Prove) Predictable Arguments with Privacy. 377 - Antoine Urban, Matthieu Rambaud:
Share & Shrink: Ad-Hoc Threshold FHE with Short Ciphertexts and its Application to Almost-Asynchronous MPC. 378 - S. Dov Gordon, Carmit Hazay, Phi Hung Le:
Fully Secure PSI via MPC-in-the-Head. 379 - Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky:
A Linear-Time 2-Party Secure Merge Protocol. 380 - Hirotomo Shinoki, Koji Nuida:
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. 381 - Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo:
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups. 382 - Megan Chen, Alessandro Chiesa, Nicholas Spooner:
On Succinct Non-Interactive Arguments in Relativized Worlds. 383 - Ertem Nusret Tas, Dionysis Zindros, Lei Yang, David Tse:
Light Clients for Lazy Blockchains. 384 - Guillaume Barbu
, Ward Beullens, Emmanuelle Dottax
, Christophe Giraud, Agathe Houzelot
, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie:
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest. 385 - Lin You, Yan Wang, Liang Li, Gengran Hu:
Secure Two-party Computation Approach for NTRUEncrypt. 386 - Hridya P. R, Jimmy Jose:
Phase-shift Fault Analysis of Grain-128. 387 - Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. 388 - Suparna Kundu, Jan-Pieter D'Anvers, Michiel Van Beirendonck, Angshuman Karmakar, Ingrid Verbauwhede:
Higher-order masked Saber. 389 - (Withdrawn) An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. 390
- (Withdrawn) An Improved Model on the Vague Sets-Based DPoSâs Voting Phase in Blockchain. 391
- Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin:
Poly Onions: Achieving Anonymity in the Presence of Churn. 392 - Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation. 393 - Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh
, Nurun N. Mondol, Fahim Rahman, Mark M. Tehranipoor, Farimah Farahmandi:
Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions. 394 - Likang Lu, Jianzhu Lu:
A lightweight verifiable secret sharing scheme in IoTs. 395 - (Withdrawn) Side-channel attacks based on power trace decomposition. 396
- Daniel Gardham, Mark Manulis:
Revocable Hierarchical Attribute-based Signatures from Lattices. 397 - Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas D. Pattengale:
Auditable, Available and Resilient Private Computation on the Blockchain via MPC. 398 - Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-like Ciphers. 399 - Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang:
Quantum Advantage from Any Non-Local Game. 400 - Cas Cremers, Caroline Fontaine, Charlie Jacomme:
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols. 401 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. 402 - Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. 403 - Atsuki Momose, Ling Ren:
Constant Latency in Sleepy Consensus. 404 - James Howe, Bas Westerbaan:
Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7. 405 - Helger Lipmaa, Janno Siim, Michal Zajac:
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK. 406 - Edward Eaton, Sajin Sasy, Ian Goldberg:
Improving the Privacy of Tor Onion Services. 407 - Agnese Gini, Pierrick Méaux:
On the weightwise nonlinearity of weightwise perfecty balanced functions. 408 - Vicent Sus:
Proof-of-Stake Is a Defective Mechanism. 409 - Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Akter Sumi, Adnan Anwar:
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. 410 - Aurélien Greuet, Simon Montoya
, Clémence Vermeersch:
Quotient Approximation Modular Reduction. 411 - Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. 412 - Mustafa Safa Özdayi, Yue Guo, Mahdi Zamani:
Instachain: Breaking the Sharding Limits via Adjustable Quorums. 413 - Mila Anastasova, Panos Kampanakis, Jake Massimo:
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption. 414 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee:
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security. 415 - Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives. 416 - Emmanuela Orsini:
Efficient, Actively Secure MPC with a Dishonest Majority: a Survey. 417 - Victor Arribas, Zhenda Zhang, Svetla Nikova:
LLTI: Low-Latency Threshold Implementations. 418 - Arasu Arun, Chaya Ganesh, Satya V. Lokam, Tushar Mopuri, Sriram Sridhar
:
Dew: Transparent Constant-sized zkSNARKs. 419 - Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù:
Gemini: Elastic SNARKs for Diverse Environments. 420 - Aritra Banerjee, Hitesh Tewari:
Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant. 421 - Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. 422 - Samanvaya Panda:
Polynomial Approximation of Inverse sqrt Function for FHE. 423 - Dor Amzaleg, Itai Dinur:
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2. 424 - Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos:
New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks. 425 - Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:
Spectre Declassified: Reading from the Right Place at the Wrong Time. 426 - Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras:
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications. 427 - Adrián Ranea, Joachim Vandersmissen, Bart Preneel:
Implicit White-Box Implementations: White-Boxing ARX Ciphers. 428 - Danny Niu Jianfang:
Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt. 429 - Véronique Cortier, Pierrick Gaudry, Quentin Yang:
Is the JCJ voting system really coercion-resistant? 430 - Xinyu Mao, Noam Mazor, Jiapeng Zhang:
Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions. 431 - Jiayu Zhang:
Classical Verification of Quantum Computations in Linear Time. 432 - Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig:
McFly: Verifiable Encryption to the Future Made Practical. 433 - Takashi Yamakawa, Mark Zhandry:
Verifiable Quantum Advantage without Structure. 434 - Frédéric Dupuis, Philippe Lamontagne, Louis Salvail:
Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement. 435 - Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters:
Publicly Accountable Robust Multi-Party Computation. 436 - Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan:
Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures. 437 - Benjamin Wesolowski:
Computing isogenies between finite Drinfeld modules. 438 - Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang:
Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms. 439 - Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó:
A Security Model for Randomization-based Protected Caches. 440 - Paola de Perthuis, David Pointcheval:
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection. 441 - Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Quantum Attacks on PRFs Based on Public Random Permutations. 442 - Steven D. Galbraith, Yi-Fu Lai:
Attack on SHealS and HealS: the Second Wave of GPST. 443 - Joachim Vandersmissen, Adrián Ranea, Bart Preneel:
A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version). 444 - Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer:
TWAP Oracle Attacks: Easier Done than Said? 445 - Louis Vialar:
Fast Side-Channel Key-Recovery Attack against Elephant Dumbo. 446 - Vanesa Daza, Paz Morillo, Sergi Rovira:
Leveled Multikey FHE with constant-size ciphertexts from RLWE. 447 - Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann:
Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021. 448 - Britta Hale, Chelsea Komlo:
On End-to-End Encryption. 449 - Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:
Astrape: Anonymous Payment Channels with Boring Cryptography. 450 - Charanjit S. Jutla, Barry Mishra:
Improved Stock Market Structure Using Cryptography. 451 - Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai:
UTT: Decentralized Ecash with Accountable Privacy. 452 - (Withdrawn) Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach. 453
- Thomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp:
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. 454 - Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Shir Cohen, Alexander Spiegelman:
Proof of Availability & Retrieval in a Modular Blockchain Architecture. 455 - Anis Bkakria:
Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption. 456 - Liu Zhang, Zilong Wang:
Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT. 457 - Benedikt Bünz, Ben Fisch:
Schwartz-Zippel for multilinear polynomials mod N. 458 - Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. 459 - (Withdrawn) A Novel NIZK-based Privacy Preserving Biometric Identification Scheme for Internet of Things. 460
- Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. 461 - Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems:
New optimization techniques for PlonKâs arithmetization. 462 - Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim:
Reducing the Depth of Quantum FLT-Based Inversion Circuit. 463 - (Withdrawn) Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations. 464
- (Withdrawn) BÄhÄ"m: A Provably Secure Symmetric Cipher. 465
- Nicolas David, Thomas Espitau, Akinori Hosoyamada:
Quantum binary quadratic form reduction. 466 - Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier:
Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification. 467 - Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu:
Improved Pump and Jump BKZ by Sharp Simulator. 468 - Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
:
Efficient ASIC Architectures for Low Latency Niederreiter Decryption. 469 - Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou:
Designated-Verifier Linkable Ring Signatures. 470 - Aron Gohr, Friederike Laus, Werner Schindler:
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020. 471 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
On the Hardness of Module Learning With Errors with Short Distributions. 472 - Daniel J. Bernstein:
Understanding binary-Goppa decoding. 473 - Catinca Mujdei, Arthur Beckers, Jose Bermundo, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede:
Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication. 474 - Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin:
SIDH-sign: an efficient SIDH PoK-based signature. 475 - Debrup Chakraborty, Samir Kundu:
{\sf TrCBC} is Insecure. 476 - Pratyush Ranjan Tiwari, Matthew Green:
Algorithm-Substitution Attacks on Cryptographic Puzzles. 477 - Kazuhiko Minematsu:
Property-Preserving Hash Functions and Combinatorial Group Testing. 478 - Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi:
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption. 479 - Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy:
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data. 480 - Pratyush Ranjan Tiwari, Dhruv Agarwal
, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta:
India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities. 481 - KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang:
cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption. 482 - Nina Bindel, Sarah McCarthy, Geoff Twardokus, Hanif Rahbari:
Drive (Quantum) Safe! â" Towards Post-Quantum Security for V2V Communications. 483 - Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering. 484 - Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang:
Two new classes of permutation trinomials over 픽q3 with odd characteristic. 485 - Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete
, Léo Robert:
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing. 486 - Navid Ghaedi Bardeh, Vincent Rijmen:
New Key Recovery Attack on Reduced-Round AES. 487 - Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate:
OrgAn: Organizational Anonymity with Low Latency. 488 - Tarun Yadav, Manoj Kumar, Amit Kumar, Saibal K. Pal:
A Practical-Quantum Differential Attack on Block Ciphers. 489 - Loïc Masure, Gaëtan Cassiers, Julien M. Hendrickx, François-Xavier Standaert:
Information Bounds and Convergence Rates for Side-Channel Security Evaluators. 490 - Lukas Helminger, Christian Rechberger:
Multi-Party Computation in the GDPR. 491 - Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch:
Towards Smart Contract-based Verification of Anonymous Credentials. 492 - Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert:
Donât Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking. 493 - Emre Karabulut, Erdem Alkim, Aydin Aysu:
Single-Trace Side-Channel Attacks on Ï-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM. 494 - Nico Döttling, Jesko Dujmovic:
Maliciously Circuit-Private FHE from Information-Theoretic Principles. 495 - Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha:
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium. 496 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More. 497 - Petr Sedlácek:
Limitations of Information-theoretic Incompressible Encodings. 498 - Varun Madathil, Sri Aravinda Krishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez:
Practical Decentralized Oracle Contracts for Cryptocurrencies. 499 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Multi-Server PIR with Full Error Detection and Limited Error Correction. 500 - Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim:
Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves. 501 - Vlastimil Klíma:
Fast Diffusion Block for Secret Key Cryptography. 502 - Peter A. Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo:
Towards a Formal Treatment of Logic Locking. 503 - Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. 504 - Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard:
Riding the Waves Towards Generic Single-Cycle Masking in Hardware. 505 - Jens Groth, Victor Shoup:
Design and analysis of a distributed ECDSA signing service. 506 - David Knichel, Amir Moradi:
Low-Latency Hardware Private Circuits. 507 - Lorenzo Grassi, Bart Mennink:
Security of Truncated Permutation Without Initial Value. 508 - Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders:
Lattice-Based Signature with Efficient Protocols, Revisited. 509 - Liam Eagen, Sanket Kanjalkar, Tim Ruffing, Jonas Nick:
Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments. 510 - (Withdrawn) OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels. 511
- Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen:
A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis. 512 - Adrián Ranea, Vincent Rijmen:
CASCADA: Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks. 513 - Qian Guo, Andreas Johansson, Thomas Johansson:
A Key-Recovery Side-Channel Attack on Classic McEliece. 514 - Antonio Guimarães, Edson Borin, Diego F. Aranha:
MOSFHET: Optimized Software for FHE over the Torus. 515 - Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos:
zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge. 516 - Jaime Gutierrez, Jorge Jiménez Urroz:
Local permutation polynomials and the action of e-Klenian groups. 517 - Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to hash into supersingular isogeny graphs. 518 - Md Rasid Ali, Debranjan Pal
, Abhijit Das, Dipanwita Roy Chowdhury:
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest. 519 - Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov:
Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments. 520 - Pavel Hubácek, L'ubica Jancová, Veronika Králová:
On The Distributed Discrete Logarithm Problem with Preprocessing. 521 - George Teseleanu:
The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem. 522 - Jurian van Geest, Ileana Buhan:
A side-channel based disassembler for the ARM-Cortex M0. 523 - Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder:
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings. 524 - Elena Kirshanova, Alexander May:
Decoding McEliece with a Hint - Secret Goppa Key Parts Reveal Everything. 525 - Fuchun Guo, Willy Susilo:
Optimal Tightness for Chain-Based Unique Signatures. 526 - Jungmin Park, N. Nalla Anandakumar, Dipayan Saha
, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor:
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms. 527 - Marzio Mula, Nadir Murru, Federico Pintore:
Random sampling of supersingular elliptic curves. 528 - Diego F. Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin:
Laconic Private Set-Intersection From Pairings. 529 - Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS. 530 - Norica Bacuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer:
Jammin' on the deck. 531 - Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No:
Hierarchical Galois Key Management Systems for Privacy Preserving AIaaS with Homomorphic Encryption. 532 - M. Rajululkahf:
BÄhÄ"m: A Symmetric Cipher with Provable 128-bit Security. 533 - Renas Bacho, Julian Loss:
On the Adaptive Security of the Threshold BLS Signature Scheme. 534 - Damiano Abram, Peter Scholl, Sophia Yakoubov:
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round. 535 - Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma:
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha. 536 - Jincheol Ha, Seongkwang Kim, ByeongHak Lee, Jooyoung Lee, Mincheol Son:
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version). 537 - Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl:
Post-Quantum Signatures on RISC-V with Hardware Acceleration. 538 - Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber:
Post Quantum Noise. 539 - Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello:
On the revision of NIST 800-22 Test Suites. 540 - Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell:
The Generalsâ Scuttlebutt: Byzantine-Resilient Gossip Protocols. 541 - Mathias Hall-Andersen, Jesper Buus Nielsen:
On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles. 542 - Aram Jivanyan, Aaron Feickert:
Aura: private voting with reduced trust on tallying authorities. 543 - Donghoon Chang, Deukjo Hong, Jinkeon Kang:
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting. 544 - Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence T. Pileggi, Vipul Goyal, Bryan Parno:
Logic Locking - Connecting Theory and Practice. 545 - Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak:
He-HTLC: Revisiting Incentives in HTLC. 546 - Gyu-Chol Kim, Yong-Bok Jong:
Fast signing method in RSA with high speed verification. 547 - Yuyu Wang, Jiaxin Pan:
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security. 548 - Sora Suegami:
Smart Contracts Obfuscation from Blockchain-based One-time Program. 549 - Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder:
ROAST: Robust Asynchronous Schnorr Threshold Signatures. 550 - Xiao Sui, Sisi Duan, Haibin Zhang:
Marlin: Two-Phase BFT with Linearity. 551 - Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky:
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One. 552 - John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla:
Secure Storage with Deduplication. 553 - Sisi Duan, Haibin Zhang:
Byzantine Reliable Broadcast with O(nL+kn+n2 log n) Communication. 554 - Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme:
Adapting Belief Propagation to Counter Shuffling of NTTs. 555 - Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu:
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. 556 - Alexander R. Block
, Christina Garman:
Honest Majority Multi-Prover Interactive Arguments. 557 - Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. 558 - Joël Alwen, Benedikt Auerbach
, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak:
Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging. 559 - Kasper Green Larsen, Maciej Obremski, Mark Simkin:
Distributed Shuffling in Adversarial Environments. 560 - Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim:
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes. 561 - Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. 562 - Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang:
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles â" A case study of Kyber. 563 - Christopher van der Beets, Raine Nieminen, Thomas Schneider:
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization. 564 - Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard, Robert Primas:
Power Contracts: Provably Complete Power Leakage Models for Processors. 565 - Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang:
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. 566 - Michele Fabbrini:
FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher. 567 - Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. 568 - Marloes Venema, Greg Alpár:
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks. 569 - Onur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor:
Secure and Private Source Coding with Private Key and Decoder Side Information. 570 - Boris Ryabko:
Entropically secure cipher for messages generated by Markov chains with unknown statistics. 571 - Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira:
Homomorphically counting elements with the same property. 572 - Tyler Beauregard, Janabel Xia, Mike Rosulek:
Finding One Common Item, Privately. 573 - Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider:
Comparison-Based MPC in Star Topology (Full Version). 574 - Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos:
Optimizing Homomorphic Encryption Parameters for Arbitrary Applications. 575 - Akira Ito, Rei Ueno, Naofumi Homma:
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. 576 - Xuting Zhou, Tianshuo Cong:
Construction of generalized-involutory MDS matrices. 577 - Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. 578 - Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao:
Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression. 579 - Samuel Sousa, Roman Kern:
How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing. 580 - Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian:
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage. 581 - Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Ponyta: Foundations of Side-Contract-Resilient Fair Exchange. 582 - Lior Rotem, Gil Segev:
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff. 583 - Lior Rotem:
Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups. 584 - Yi Liu, Qi Wang, Siu-Ming Yiu:
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability. 585 - Diego F. Aranha, Youssef El Housni, Aurore Guillevic:
A survey of elliptic curves for proof systems. 586 - Eduardo Soria-Vazquez:
Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings. 587 - Daniel Kales, Greg Zaverucha
:
Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures. 588 - Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
Unnecessary Input Heuristics & PayJoin Transactions. 589 - Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, Rafail Ostrovsky:
Secure Merge in Linear Time and O(log log N) Rounds. 590 - Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama:
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography. 591 - Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar:
Chaghri - an FHE-friendly Block Cipher. 592 - (Withdrawn) On the Security Proof of CKO+21 Secret Sharing Scheme. 593
- (Withdrawn) A CONCRETE approach to torus fully homomorphic encryption. 594
- Theo von Arx, Kenneth G. Paterson:
On the Cryptographic Fragility of the Telegram Ecosystem. 595 - Liam Eagen:
Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity. 596 - Sisi Duan, Haibin Zhang:
Foundations of Dynamic BFT. 597 - Laltu Sardar, Sushmita Ruj:
Verifiable and forward private conjunctive keyword search from DIA tree. 598 - Lionel Beltrando, Maria Potop-Butucaru, José Alfaro:
TenderTee: Secure Tendermint. 599 - Loïc Masure, Olivier Rioul, François-Xavier Standaert:
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations. 600 - Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. 601 - Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin:
Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip. 602 - Léonard Lys, Maria Potop-Butucaru:
Distributed Blockchain Price Oracle. 603 - Marcel Armour, Bertram Poettering:
Algorithm Substitution Attacks against Receivers. 604 - Alexandru Ionita:
Weighted Attribute-Based Encryption with Parallelized Decryption. 605 - Li Duan, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp:
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability. 606 - Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan:
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version). 607 - Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen:
Practical Provably Secure Flooding for Blockchains. 608 - Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi:
Optimal Single-Server Private Information Retrieval. 609 - Tingting Pang, Nian Li, Xiangyong Zeng:
On the Differential Spectrum of a Differentially 3-Uniform Power Function. 610 - Gongyu Shi, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. 611 - Raghvendra Rohit, Santanu Sarkar:
Cryptanalysis of Reduced Round SPEEDY. 612 - Marloes Venema, Greg Alpár:
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs. 613 - Yu Zhang, Zongbin Wang, Tihong Qin:
PPRKS: A Privacy Preserving Range Keyword Search Scheme. 614 - Thomas Debris-Alazard, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich:
Smoothing Codes and Lattices: Systematic Study and New Bounds. 615 - Ren Ishibashi, Kazuki Yoneyama:
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles. 616 - Shingo Sato, Junji Shikata:
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. 617 - Adriano Koleci:
A simple proof of ARX completeness. 618 - Matthieu Rambaud, Antoine Urban:
Asynchronous Dynamic Proactive Secret Sharing under Honest Majority: Refreshing Without a Consistent View on Shares. 619 - Zhenyu Huang, Siwei Sun:
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. 620 - Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin:
Caulk: Lookup Arguments in Sublinear Time. 621 - Olive Chakraborty, Martin Zuber:
Efficient and Accurate homomorphic comparisons. 622 - Anders P. K. Dalskov, Daniel Escudero, Ariel Nof:
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority. 623 - Andriyan Bilyk, Javad Doliskani, Zhiyong Gong:
Cryptanalysis of Three Quantum Money Schemes. 624 - Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang:
Byzantine Fault Tolerance from Weak Certificates. 625 - Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi, Kai Zhang:
The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method. 626 - Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. 627 - Elizabeth Carter, Pengzhou He, Jiafeng Xie:
High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU. 628 - Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad:
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)? 629 - Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya:
Enforcing fine-grained constant-time policies. 630 - Fuyuki Kitagawa, Ryo Nishimaki:
Watermarking PRFs against Quantum Adversaries. 631 - Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui:
Recovering Rainbow's Secret Key with a First-Order Fault Attack. 632 - Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao:
CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes. 633 - Shweta Agrawal, Damien Stehlé, Anshu Yadav:
Round-Optimal Lattice-Based Threshold Signatures, Revisited. 634 - Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Amber Sprenkels, Geoffrey P. Waters:
Post-Quantum Secure Boot on Vehicle Network Processors. 635 - Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. 636 - Lisha Yao, Jian Weng, Bimei Wang:
Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation. 637 - Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, Janno Siim:
Impossibilities in Succinct Arguments: Black-box Extraction and More. 638 - Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Anamorphic Encryption: Private Communication against a Dictator. 639 - Tadas Vaitiekunas:
Dialektos: Privacy-preserving Smart Contracts. 640 - Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad:
Self-Timed Masking: Implementing First-Order Masked S-Boxes Without Registers. 641 - Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The other Side of the Coin. 642 - Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Accelerating the Best Trail Search on AES-Like Ciphers. 643 - Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk:
DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium. 644 - Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner:
Round-Optimal Multi-Party Computation with Identifiable Abort. 645 - (Withdrawn) Faster Non-interactive Verifiable Computing. 646
- Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Implementation and Analysis of DEFAULT. 647 - Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
:
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions. 648 - Nico Döttling, Sanjam Garg
, Sruthi Sekar, Mingyuan Wang:
IBE with Incompressible Master Secret and Small Identity Secrets. 649 - Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
Supersingular Non-Superspecial Abelian Surfaces in Cryptography. 650 - Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries. 651 - Yu Chen, Min Zhang, Cong Zhang, Minglang Dong:
Private Set Operations from Multi-Query Reverse Private Membership Test. 652 - Binbin Tu, Yu Chen, Qi Liu, Cong Zhang:
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption. 653 - Péter Kutas, Christophe Petit:
Torsion point attacks on "SIDH-like" cryptosystems. 654 - Keewoo Lee:
Bit Security as Cost to Observe Advantage: Towards the Definition from THE BOOK. 655 - Martin R. Albrecht, Yixin Shen:
Quantum Augmented Dual Attack. 656 - Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios D. Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer:
BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption. 657 - Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer:
Unclonable Polymers and Their Cryptographic Applications. 658 - Hanjun Li, Huijia Lin, Ji Luo:
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security. 659 - Dana Dachman-Soled, Seung Geol Choi, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Secure Sampling with Sublinear Communication. 660 - Aisling Connolly, Jérôme Deschamps, Pascal Lafourcade, Octavio Perez-Kempner:
Protego: A Credential Scheme for Permissioned Blockchains (Extended Version). 661 - Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal:
SHORTSTACK : Distributed, Fault-tolerant, Oblivious Data Access. 662 - Harsh Chaudhari, Matthew Jagielski, Alina Oprea:
SafeNet: Mitigating Data Poisoning Attacks on Private Machine Learning. 663 - Qian Liu, Zhiwei Huang, Jianrui Xie
, Ximeng Liu, Jian Zou:
The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽2n. 664 - Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou:
NOVA, a Noncommutative-ring Based Unbalanced Oil and Vinegar Signature Scheme with Key-randomness Alignment. 665 - Ivana Ivkovic, Nikolay S. Kaleyski:
Deciding and reconstructing linear equivalence of uniformly distributed functions. 666 - Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters:
Arithmetic Tuples for MPC. 667 - Yaobin Shen, Ferdinand Sibleyras:
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security. 668 - Claude Carlet, Serge Feukoua:
On those Boolean functions that are coset leaders of first order Reed-Muller codes. 669 - Jayamine Alupotha, Xavier Boyen:
Practical UC-Secure Zero-Knowledge Smart Contracts. 670 - Shujiao Cao, Rui Xue:
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions. 671 - Tassos Dimitriou, Khazam Alhamdan:
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. 672 - Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. 673 - Cezary Glowacz:
A Note on Key Ranking for Optimal Collision Side-Channel Attacks. 674 - Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. 675 - Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen:
Finding many Collisions via Reusable Quantum Walks. 676 - Leon Mächler, David Naccache:
A Conjecture on Hermite Constants. 677 - Mark Zhandry:
New Constructions of Collapsing Hashes. 678 - Katharina Boudgoust, Amin Sakzad, Ron Steinfeld:
Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems. 679 - Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer:
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures. 680 - Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. 681 - Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr:
Secure Federated Clustering. 682 - Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Analysis of AES. 683 - Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini:
RSK: A Bitcoin sidechain with stateful smart-contracts. 684 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. 685 - Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha:
Proof of Mirror Theory for any $\xi_{\max}$. 686 - Dario Catalano, Dario Fiore, Emanuele Giunta:
Adaptively Secure Single Secret Leader Election from DDH. 687 - Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay:
Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets. 688 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Tight Multi-User Security Bound of sfDbHtS. 689 - Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. 690 - Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary:
QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore. 691 - (Withdrawn) LIKE - Lattice Isomorphism-based Non-Interactive Key Exchange via Group Actions. 692
- Shun Watanabe, Kenji Yasunaga:
Unified View for Notions of Bit Security. 693 - Nils Fleischhacker, Mark Simkin, Zhenfei Zhang:
Squirrel: Efficient Synchronized Multi-Signatures from Lattices. 694 - Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. 695 - Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. 696 - Pedro Branco, Nico Döttling, Jesko Dujmovic:
Rate-1 Incompressible Encryption from Standard Assumptions. 697 - Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss:
State Machine Replication under Changing Network Conditions. 698 - Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman:
On the Quantum Security of OCB. 699 - Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer:
Grief-free Atomic Swaps. 700 - Augustin Bariant, Gaëtan Leurent:
Truncated Boomerang Attacks and Application to AES-based Ciphers. 701 - (Withdrawn) Kevlar: Transparent, Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs on Efficient Groups. 702
- Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
:
Proof-of-possession for KEM certificates using verifiable generation. 703 - Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:
Parameter Optimization & Larger Precision for (T)FHE. 704 - Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico:
Linear-map Vector Commitments and their Practical Applications. 705 - Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. 706 - Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
Efficiently Masking Polynomial Inversion at Arbitrary Order. 707 - Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier A. Verbel:
An Estimator for the Hardness of the MQ Problem. 708 - Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary:
Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem. 709 - Alessandro Barenghi, Jean-François Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini:
Advanced Signature Functionalities from the Code Equivalence Problem. 710 - Ittai Abraham, Naama Ben-David, Sravya Yandamuri:
Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement. 711 - Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu:
The Hardness of LPN over Any Integer Ring and Field for PCG Applications. 712 - S. Dov Gordon, Carmit Hazay, Phi Hung Le, Mingyu Liang:
More Efficient (Reusable) Private Set Union. 713 - Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:
MicroFedML: Privacy Preserving Federated Learning for Small Weights. 714 - Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom:
Breaking and Fixing Speculative Load Hardening. 715 - Emmanuel Fouotsa, Laurian Azebaze Guimagang, Raoul Ayissi:
x-Superoptimal Pairings on some Elliptic Curves with Odd Prime Embedding Degrees. 716 - Yacov Manevich, Adi Akavia:
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments. 717 - Reza Ghasemi, Alptekin Küpçü:
A Post-Quantum Four-Party Outsourced Authentication. 718 - Sergiu Bursuc, Sjouke Mauw:
Contingent payments from two-party signing and verification for abelian groups. 719 - Huawei Liu, Zilong Wang, Liu Zhang:
A More Accurate Automatic Search Model for Characterizing Division Property. 720 - Jelle Vos, Mauro Conti, Zekeriya Erkin:
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs. 721 - Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie:
Speedy Error Reconciliation. 722 - Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. 723 - Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl:
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem. 724 - Patrick Derbez
, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen:
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool. 725 - Chenar Abdulla Hassan, Oguz Yayla:
Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography. 726 - Parker Newton, Silas Richelson
:
A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus. 727 - Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam:
Snowball: Another View on Side-Channel Key Recovery Tools. 728 - Hosein Hadipour, Maria Eichlseder:
Integral Cryptanalysis of WARP based on Monomial Prediction. 729 - Gilad Stern, Ittai Abraham:
New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks. 730 - Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham:
Triangulating Rebound Attack on AES-like Hashing. 731 - Matteo Campanelli, Danilo Francati, Claudio Orlandi:
Structure-Preserving Compilers from New Notions of Obfuscations. 732 - Vincent Ulitzsch, Jean-Pierre Seifert:
Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications' cryptographic backbone. 733 - Charlotte Lefevre, Bart Mennink:
Tight Preimage Resistance of the Sponge Construction. 734 - Ni Trieu, Avishay Yanai, Jiahui Gao:
Multiparty Private Set Intersection Cardinality and Its Applications. 735 - Phil Hebborn, Gregor Leander, Aleksei Udovenko:
Mathematical Aspects of Division Property. 736 - Prasanna Ravi, Anupam Chattopadhyay, Anubhab Baksi:
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results. 737 - Buvana Ganesh, Paolo Palmieri:
Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields. 738 - Antonin Leroux, Maxime Roméas:
Updatable Encryption from Group Actions. 739 - Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek:
Practical Privacy-Preserving Authentication for SSH. 740 - Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann:
Sapic+: protocol verifiers of the world, unite! 741 - Samed Düzlü, Juliane Krämer:
Application of Automorphic Forms to Lattice Problems. 742 - David Mestel, Johannes Müller, Pascal Reisert:
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis. 743 - Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin:
MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero. 744 - Hosein Hadipour, Marcel Nageler, Maria Eichlseder:
Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. 745 - Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti:
Efficient Proofs of Knowledge for Threshold Relations. 746 - Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang:
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. 747 - Marius A. Aardal, Diego F. Aranha:
2DT-GLS: Faster and exception-free scalar multiplication in the GLS254 binary curve. 748 - Subhadeep Banik:
Cryptanalysis of Draco. 749 - Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
The Ideal Functionalities for Private Set Union, Revisited. 750 - Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran:
SCALES: MPC with Small Clients and Larger Ephemeral Servers. 751 - Akram Khalesi, Zahra Ahmadian:
Provably Minimum Data Complexity Integral Distinguisher Based on Conventional Division Property. 752 - Patrick Derbez
, Baptiste Lambin:
Fast MILP Models for Division Property. 753 - Nicolas David, María Naya-Plasencia, André Schrottenloher:
Quantum impossible differential attacks: Applications to AES and SKINNY. 754 - Danyang Zhu, Jing Tian, Minghao Li, Zhongfeng Wang:
Low-latency Hardware Architecture for VDF Evaluation in Class Groups. 755 - Matteo Campanelli, Mathias Hall-Andersen:
Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. 756 - Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira:
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering. 757 - Gilad Asharov, Ran Cohen, Oren Shochat:
Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW. 758 - Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves. 759 - Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos:
Privacy Preserving Opinion Aggregation. 760 - André Schrottenloher, Marc Stevens:
A Quantum Analysis of Nested Search Problems with Applications in Cryptanalysis. 761 - Nicholas Brandt, Dennis Hofheinz, Julia Kastner, Akin Ünal:
The Price of Verifiability: Lower Bounds for Verifiable Random Functions. 762 - Dominic Deuber, Viktoria Ronge, Christian Rückert:
SoK: Assumptions Underlying Cryptocurrency Deanonymizations - A Taxonomy for Scientific Experts and Legal Practitioners. 763 - Françoise Levy-dit-Vehel, Maxime Roméas:
Efficient Proofs of Retrievability using Expander Codes. 764 - Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li:
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks. 765 - Cody Freitag, Ilan Komargodski:
The Cost of Statistical Security in Interactive Proofs for Repeated Squaring. 766 - Allen Kim, Xiao Liang, Omkant Pandey:
A New Approach to Efficient Non-Malleable Zero-Knowledge. 767 - Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo:
Public-Key Watermarking Schemes for Pseudorandom Functions. 768 - Laurian Azebaze Guimagang, Emmanuel Fouotsa, Nadia El Mrabet, Aminatou Pecha:
Faster Beta Weil Pairing on BLS Pairing Friendly Curves with Odd Embedding Degree. 769 - Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. 770 - Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. 771 - Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou:
Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation. 772 - Jelle Don, Serge Fehr, Yu-Hsuan Huang:
Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF. 773 - (Withdrawn) Complexity Analysis of the SAT Attack on Logic Locking. 774
- Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang:
Asynchronous Verifiable Information Dispersal with Near-Optimal Communication. 775 - Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang:
Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation. 776 - Morgan Thomas:
Arithmetization of Σ¹₁ relations in Halo 2. 777 - Mikhail A. Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev:
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost. 778 - Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. 779 - Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux:
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption. 780 - S. Dov Gordon, Phi Hung Le, Daniel McVicker:
Linear Communication in Malicious Majority MPC. 781 - Federico Canale, Gregor Leander, Lukas Stennes:
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications. 782 - Mark Zhandry:
Augmented Random Oracles. 783 - Jiaxiang Tang, Jinbao Zhu, Songze Li, Kai Zhang, Lichao Sun
:
Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation. 784 - Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Shorter Hash-and-Sign Lattice-Based Signatures. 785 - Marcel Dall'Agnol, Nicholas Spooner:
On the necessity of collapsing. 786 - Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain. 787 - Le He, Xiaoen Lin, Hongbo Yu:
Improved Preimage Attacks on Round-Reduced Keccak-384/512 via Restricted Linear Structures. 788 - Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. 789 - Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev:
A Toolbox for Barriers on Interactive Oracle Proofs. 790 - Ilan Komargodski, Shin'ichiro Matsuo, Elaine Shi, Ke Wu:
log*-Round Game-Theoretically-Fair Leader Election. 791 - Chunfu Jia, Shaoqiang Wu, Ding Wang:
Reliable Password Hardening Service with Opt-Out. 792 - Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta:
LLAMA: A Low Latency Math Library for Secure Inference. 793 - Dmitrii I. Koshelev:
Generation of "independent" points on elliptic curves by means of Mordell-Weil lattices. 794 - David Heath, Vladimir Kolesnikov, Jiahui Lu:
Efficient Generic Arithmetic for KKW Practical Linear: MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup. 795 - Youer Pu, Lorenzo Alvisi, Ittay Eyal:
Safe Permissionless Consensus. 796 - Abida Haque, David Heath, Vladimir Kolesnikov, Steve Lu, Rafail Ostrovsky, Akash Shah:
Garbled Circuits With Sublinear Evaluator. 797 - David Heath, Vladimir Kolesnikov:
One Hot Garbling. 798 - Vipul Goyal, Yuval Ishai, Yifan Song:
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation. 799 - Sameer Wagh:
BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators. 800 - Hadi Mardani Kamali:
Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic. 801 - Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho:
VERI-ZEXE: Decentralized Private Computation with Universal Setup. 802 - Xavier Arnal, Tamara Finogina, Javier Herranz:
Lattice-based Interactive Zero-Knowledge without Aborts. 803 - Alex Charlès, Chloé Gravouil:
Review of the White-Box Encodability of NIST Lightweight Finalists. 804 - Ittai Abraham, Danny Dolev, Alon Kagan, Gilad Stern:
Authenticated Consensus in Synchronous Systems with Mixed Faults. 805 - Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi:
Multi-key and Multi-input Predicate Encryption from Learning with Errors. 806 - Ruize Wang, Kalle Ngo, Elena Dubrova:
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations. 807 - Laura Luzzi, Cong Ling, Matthieu R. Bloch:
Secret key generation from Gaussian sources using lattice-based extractors. 808 - David Heath, Vladimir Kolesnikov:
A 2.1 KHz Zero-Knowledge Processor with BubbleRAM. 809 - David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov:
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached RAM for ANSI C Programs. 810 - Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery:
EZEE: Epoch Parallel Zero Knowledge for ANSI C. 811 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. 812 - Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra:
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications. 813 - Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos:
Suborn Channels: Incentives Against Timelock Bribes. 814 - Daniel Escudero, Chaoping Xing, Chen Yuan:
More Efficient Dishonest Majority Secure Computation over ℤ2k via Galois Rings. 815 - Baiyu Li, Daniele Micciancio, Mark Schultz, Jessica Sorrell:
Securing Approximate Homomorphic Encryption Using Differential Privacy. 816 - Jean Paul Degabriele, Vukasin Karadzic:
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. 817 - Tim Beyne, Yu Long Chen:
Provably Secure Reflection Ciphers. 818 - Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl:
Mozℤ2karella: Efficient Vector-OLE and Zero-Knowledge Proofs Over ℤ2k. 819 - Susumu Kiyoshima:
Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash. 820 - Lúcás Críostóir Meier:
MPC for Group Reconstruction Circuits. 821 - Henri Devillez, Olivier Pereira, Thomas Peters:
Traceable Receipt-Free Encryption. 822 - Poulami Das, Lisa Eckey, Sebastian Faust, Julian Loss, Monosij Maitra:
Round Efficient Byzantine Agreement from VDFs. 823 - Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay:
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. 824 - Charles Gouert, Nektarios Georgios Tsoutsos:
Romeo: Conversion and Evaluation of HDL Designs in the Encrypted Domain. 825 - Sameer Wagh:
Pika: Secure Computation using Function Secret Sharing over Rings. 826 - Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos:
Privacy-Preserving IP Verification. 827 - Kevin Yeo:
Lower Bounds for (Batch) PIR with Private Preprocessing. 828 - Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung:
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. 829 - Arthur Lazzaretti, Charalampos Papamanthou:
Single Server PIR with Sublinear Amortized Time and Polylogarithmic Bandwidth. 830 - Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing. 831 - Jeremiah Blocki, Blake Holman:
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions. 832 - Mihir Bellare, Stefano Tessaro, Chenzhi Zhu:
Stronger Security for Non-Interactive Threshold Signatures: BLS and FROST. 833 - Rafaël del Pino, Shuichi Katsumata:
A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling. 834 - Rajendra Kumar, Khoa Nguyen:
Covert Authentication from Lattices. 835 - Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky:
Authenticated Garbling from Simple Correlations. 836 - Tim Beyne, Vincent Rijmen:
Differential Cryptanalysis in the Fixed-Key Model. 837 - Francesca Falzon, Kenneth G. Paterson:
An Efficient Query Recovery Attack Against a Graph Encryption Scheme. 838 - Mahdi Sedaghat, Daniel Slamanig, Markulf Kohlweiss, Bart Preneel:
Structure-Preserving Threshold Signatures. 839 - Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Vesselin Velichkov:
Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence. 840 - Viet Tung Hoang, Cong Wu, Xin Yuan:
Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. 841 - Justin Holmgren
, Minghao Liu, LaKyah Tyner, Daniel Wichs:
Nearly Optimal Property Preserving Hashing. 842 - (Withdrawn) Predicting BKZ Z-Shapes on q-ary Lattices. 843
- Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, Son-Gyong Kim:
Security Analysis of a Recent Pairing-based Certificateless Authenticated Key Agreement Protocol for Blockchain-based WBANs. 844 - Jian Guo, Ling Song, Haoyang Wang:
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256. 845 - Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin:
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. 846 - Antonio Sanso:
A note on key control in CSIDH. 847 - Alexandros Bakas, Eugene Frimpong, Antonis Michalas:
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version). 848 - Barbara Gigerl, Robert Primas, Stefan Mangard:
Formal Verification of Arithmetic Masking in Hardware and Software. 849 - Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling:
Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication. 850 - Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella:
NIWI and New Notions of Extraction for Algebraic Languages. 851 - Ruize Wang, Kalle Ngo, Elena Dubrova:
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations. 852 - Thomas Groß:
Hashing to Prime in Zero-Knowledge. 853 - Cecilia Boschini, Ivan Damgård, Claudio Orlandi:
On Access Control Encryption without Sanitization. 854 - Hans Heum, Martijn Stam:
Tightness Subtleties for Multi-user PKE Notions. 855 - Antonio Faonio, Luigi Russo:
Mix-Nets from Re-Randomizable and Replayable CCA-secure Public-Key Encryption. 856 - James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang:
Succinct Classical Verification of Quantum Computation. 857 - Yang Du, Daniel Genkin, Paul Grubbs:
Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts. 858 - Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li:
Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM. 859 - Chunya Hu, Yongbo Hu, Wenfeng Zhu, Zixin Tan, Qi Zhang, Zichao Gong, Yanhao Gong, Luyao Jin, Pengwei Feng:
AB-SIFA: SIFA with Adjacent-Byte Model. 860 - Peter J. Bruin, Léo Ducas, Shane Gibbons:
Genus Distribution of Random q-ary Lattices. 861 - Ilaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel P. Smart, Barry Van Leeuwen:
Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on FHE. 862 - Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert:
Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers. 863 - Weijie Wang, Annie Ulichney, Charalampos Papamanthou:
BalanceProofs: Maintainable Vector Commitments with Fast Aggregation. 864 - Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour:
Linked Fault Analysis. 865 - Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Communication Efficient Secure Logistic Regression. 866 - Diego F. Aranha, Felix Engelmann, Sebastian Kolby, Sophia Yakoubov:
The State of the Union: Union-Only Signatures for Data Aggregation. 867 - Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. 868 - Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs:
Post-Quantum Insecurity from LWE. 869 - Jesse Elliott, Aaron Hutchinson:
Supersingular Isogeny Diffie-Hellman with Legendre Form. 870 - Shashank Agrawal:
Secure Plot Transfer for the Chia Blockchain. 871 - Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel:
Nirvana: Instant and Anonymous Payment-Guarantees. 872 - Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert:
Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption. 873 - Shanxiang Lyu, Ling Liu, Junzuo Lai, Cong Ling, Hao Chen:
Lattice Codes for Lattice-Based PKE. 874 - Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. 875 - Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:
Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions. 876 - Myungsun Kim:
A New Approach to the Constant-Round Re-encryption Mix-Net. 877 - Michael Rosenberg
, Jacob D. White, Christina Garman, Ian Miers:
ttzk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure. 878 - Aurélien Greuet, Simon Montoya, Clémence Vermeersch:
Modular Polynomial Multiplication Using RSA/ECC coprocessor. 879 - Gustavo Banegas, Valerie Gilchrist, Benjamin Smith:
Efficient supersingularity testing over 픽p and CSIDH key validation. 880 - Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang:
A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator. 881 - Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Randomness Optimization for Gadget Compositions in Higher-Order Masking. 882 - Ilan Komargodski, Elaine Shi:
Differentially Oblivious Turing Machines. 883 - Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry:
On the Feasibility of Unclonable Encryption, and More. 884 - Akshima, Siyao Guo, Qipeng Liu:
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions. 885 - Hyunji Kim, Sejin Lim, Yeajun Kang, Won-Woong Kim, Hwajeong Seo:
Deep Learning based Cryptanalysis of Lightweight Block Ciphers, Revisited. 886 - Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box Protocol Compilers. 887 - David Chaum, Mario Larangeira, Mario Yaksetig:
Tweakable Sleeve: A Novel Sleeve Construction based on Tweakable Hash Functions. 888 - Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner:
Quantum Rewinding for Many-Round Protocols. 889 - Cristian-Alexandru Botocan:
One Network to rule them all. An autoencoder approach to encode datasets. 890 - Sukanta Dey, Jungmin Park, Nitin Pundir, Dipayan Saha
, Amit Mazumder Shuvo, Dhwani Mehta, Navid Asadi, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor:
Secure Physical Design. 891 - Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa:
Piranha: A GPU Platform for Secure Computation. 892 - Edimar Veríssimo da Silva:
NJS: Database Protection Algorithm. 893 - Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. 894 - Anna Lysyanskaya:
Security Analysis of RSA-BSSA. 895 - Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, Delaram Kahrobaei:
Post-quantum hash functions using SLn𝔽p. 896 - Zachary A. Kissel:
Constrained Pseudorandom Functions from Pseudorandom Synthesizers. 897 - Joseph Bebel, Dev Ojha:
Ferveo: Threshold Decryption for Mempool Privacy in BFT networks. 898 - Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization. 899 - Hiroshi Onuki:
On the key generation in SQISign. 900 - Itamar Levi, Carmit Hazay:
Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . . 901 - Bar Alon, Moni Naor, Eran Omri, Uri Stemmer:
MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably. 902 - Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling. 903 - Fabio Campos
, Michael Meyer, Krijn Reijnders, Marc Stöttinger:
Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE. 904 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Tight Security Analysis of the Public Permutation-Based PMAC_Plus. 905 - Marc Fischlin, Felix Rohrbach, Tobias Schmalz:
A Random Oracle for All of Us. 906 - Xiao Liang, Omkant Pandey, Takashi Yamakawa:
A New Approach to Post-Quantum Non-Malleability. 907 - Tymoteusz Chojecki, Vasyl Ustimenko:
On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files. 908 - Carlo Brunetta, Hans Heum, Martijn Stam:
Multi-Instance Secure Public-Key Encryption. 909 - (Withdrawn) Round Optimal Blind Signatures: Short Signatures with Post-Quantum Blindness. 910
- Danny Niu Jianfang:
Some Security Arguments For Xifrat1. 911 - Haetham Al Aswad, Cécile Pierrot:
Individual Discrete Logarithm with Sublattice Reduction. 912 - Ashish Choudhury, Arpita Patra:
On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience. 913 - Keegan Ryan, Nadia Heninger:
Cryptanalyzing MEGA in Six Queries. 914 - Ahmad Al Badawi, Jack Bates, Flávio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah
, Yuriy Polyakov, R. V. Saraswathy, Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca:
OpenFHE: Open-Source Fully Homomorphic Encryption Library. 915 - Melissa Azouaoui
, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal:
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. 916 - Ashish Choudhury:
Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience. 917 - Wonseok Choi, Jooyoung Lee, Yeongmin Lee:
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds. 918 - Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud:
Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking. 919 - James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann:
Distributed, Private, Sparse Histograms in the Two-Server Model. 920 - Haining Fan:
Low-Delay 4, 5 and 6-Term Karatsuba Formulae in 픽2[x] Using Overlap-free Splitting. 921 - Léo Ducas:
Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm. 922 - Mariana Botelho da Gama, John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui:
All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation. 923 - Dhwani Mehta, John True, Olivia P. Dizon-Paradis, Nathan Jessurun, Damon L. Woodard, Navid Asadizanjani, Mark M. Tehranipoor:
FICS PCB X-ray: A dataset for automated printed circuit board inter-layers inspection. 924 - Ji Luo:
Ad Hoc (Decentralized) Broadcast, Trace, and Revoke. 925 - Denis Firsov, Dominique Unruh:
Zero-Knowledge in EasyCrypt. 926 - Valence Cristiani, Maxime Lecomte, Thomas Hiscock, Philippe Maurine:
Fit The Joint Moments. 927 - Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian Elimination Hardware for Cryptographic Purposes. 928 - Valerii Sopin:
PH = PSPACE. 929 - Erdem Alkim, Vincent Hwang, Bo-Yin Yang:
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4. 930 - Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay:
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond. 931 - Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu:
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. 932 - Marcel Keller, Ke Sun:
Secure Quantized Training for Deep Learning. 933 - Bar Alon, Eran Omri:
On Secure Computation of Solitary Output Functionalities With and Without Broadcast. 934 - Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. 935 - Sofiane Azogagh, Victor Delfour, Sébastien Gambs, Marc-Olivier Killijian:
PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree Evaluation. 936 - Ehsan Ebrahimi, Jeroen van Wier:
Post-quantum Plaintext-awareness. 937 - Thomas Pornin:
Truncated EdDSA/ECDSA Signatures. 938 - Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren:
Multi-party Private Function Evaluation for RAM. 939 - Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma:
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. 940 - Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan:
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable. 941 - Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan:
Foundations of Coin Mixing Services. 942 - Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sýs, Vashek Matyas:
DiSSECT: Distinguisher of Standard & Simulated Elliptic Curves via Traits. 943 - Huijia Lin, Tianren Liu:
Two-Round MPC without Round Collapsing Revisited - Towards Efficient Malicious Protocols. 944 - Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa:
Searchable Encryption with randomized ciphertext and randomized keyword search. 945 - Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik:
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. 946 - Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang:
Volume and Access Pattern Leakage-abuse Attack with Leaked Documents. 947 - (Withdrawn) A quantum polynomial time search algorithm for certain unsorted finite lists. 948
- Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan:
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. 949 - Birenjith Sasidharan, Emanuele Viterbo:
Private Balance-Checking on Blockchain Accounts Using Private Integer Addition. 950 - Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. 951 - Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. 952 - Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look At Backdoor Construction. 953 - Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay:
XOR Compositions of Physically Related Functions. 954 - Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni:
A Small GIFT-COFB: Lightweight Bit-Serial Architectures. 955 - Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. 956 - Jim Posen, Assimakis A. Kattis:
Caulk+: Table-independent lookup arguments. 957 - Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos:
Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol. 958 - Matilda Backendal, Miro Haller, Kenneth G. Paterson:
MEGA: Malleable Encryption Goes Awry. 959 - Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon:
Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners. 960 - Zhaokang Lu, Jianzhu Lu:
Secure and Efficient Implicit Certificates: Improving the Performance for Host Identity Protocol in IoT. 961 - Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa:
Group Signatures with Designated Traceability over Openers' Attributes. 962 - Sengim Karayalcin, Stjepan Picek:
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis. 963 - Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José Ignacio Latorre, Marc Manzano:
Hybrid Decoding - Classical-Quantum Trade-Offs for Information Set Decoding. 964 - Nicolai Müller, Amir Moradi:
PROLEAD - A Probing-Based Hardware Leakage Detection Tool. 965 - Edoardo Persichetti, Tovohery Randrianarisoa:
On Linear Complexity of Finite Sequences : Coding Theory and Applications to Cryptography. 966 - Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
On the Computational Hardness of the Code Equivalence Problem in Cryptography. 967 - (Withdrawn) Code Equivalence in the Sum-Rank Metric: Hardness and Completeness. 968
- Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa:
Certified Everlasting Functional Encryption. 969 - Vitaly Kiryukhin:
Related-key attacks on the compression function of Streebog. 970 - Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller:
Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications. 971 - Vitaly Kiryukhin:
Keyed Streebog is a secure PRF and MAC. 972 - Emanuele Bellini, Andre Esser, Carlo Sanna, Javier A. Verbel:
MR-DSS - Smaller MinRank-based (Ring-)Signatures. 973 - Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh:
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies. 974 - Wouter Castryck, Thomas Decru
:
An efficient key recovery attack on SIDH (preliminary version). 975 - Vanishree Rao:
Paras - A Private NFT Protocol. 976 - Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting. 977 - Fuchun Lin:
Non-Malleable Multi-Party Computation. 978 - (Withdrawn) Secure and Lightweight User Authentication Scheme for Cloud-Aided Internet of Things. 979
- Daniel J. Bernstein:
Fast norm computation in smooth-degree Abelian number fields. 980 - Alex Davidson, Gonçalo Pestana, Sofía Celi:
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval. 981 - Shai Halevi, Eyal Kushilevitz:
Random-Index Oblivious RAM. 982 - Qian Guo, Erik Mårtensson:
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber. 983 - Nidish Vashistha, Md Latifur Rahman, Md. Saad Ul Haque, Azim Uddin, Md Sami Ul Islam Sami
, Amit Mazumder Shuo, Paul Calzada
, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, Mark M. Tehranipoor:
ToSHI - Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance. 984 - Roy Rinberg, Nilaksh Agarwal:
Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain. 985 - Shuping Mao, Tingting Guo, Peng Wang, Lei Hu:
Quantum Attacks on Lai-Massey Structure. 986 - Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger:
A Signature-Based Gröbner Basis Algorithm with Tail-Reduced Reductors (M5GB). 987 - Qian Guo, Erik Mårtensson, Paul Stankovski Wagner:
Modeling and Simulating the Sample Complexity of solving LWE using BKW-Style Algorithms. 988 - Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen:
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key. 989 - Sabrina Kunzweiler:
Efficient Computation of (2n, 2n)-Isogenies. 990 - Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. 991 - Fukang Liu:
An 풪(n) Algorithm for Coefficient Grouping. 992 - Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta
, Julian Loss, Amin Sakzad, Ron Steinfeld, Wayne Yang, Raymond K. Zhao:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. 993 - Justin Holmgren
, Ron Rothblum:
Faster Sounder Succinct Arguments and IOPs. 994 - Bertram Poettering, Simon Rastikian:
Sequential Digital Signatures for Cryptographic Software-Update Authentication. 995 - Yu Dai, Fangguo Zhang, Chang-An Zhao:
Fast Hashing to G2 in Direct Anonymous Attestation. 996 - Ling Sun, Wei Wang, Meiqin Wang:
Key-Recovery Attacks on CRAFT and WARP (Full Version). 997 - Dipayan Das, Antoine Joux:
On the Hardness of the Finite Field Isomorphism Problem. 998 - Charles F. Xavier:
PipeMSM: Hardware Acceleration for Multi-Scalar Multiplication. 999 - Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich:
Statistical Decoding 2.0: Reducing Decoding to LPN. 1000 - Amit Kumar Chauhan, Somitra Sanadhya:
Quantum Security of FOX Construction based on Lai-Massey Scheme. 1001 - Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov:
Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps. 1002 - Morgan Thomas:
Orbis Specification Language: a type theory for zk-SNARK programming. 1003 - Nils Fleischhacker, Suparno Ghoshal, Mark Simkin:
Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting. 1004 - Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay:
PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement. 1005 - Steven J. Murdoch, Aydin Abadi:
A Forward-secure Efficient Two-factor Authentication Protocol. 1006 - Zachary DeStefano, Dani Barrack
, Michael Dixon
:
zkQMC: Zero-Knowledge Proofs For (Some) Probabilistic Computations Using Quasi-Randomness. 1007 - Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. 1008 - Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski:
Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions. 1009 - Tiancheng Xie, Yupeng Zhang, Dawn Song:
Orion: Zero Knowledge Proof with Linear Prover Time. 1010 - Gayathri Garimella, Mike Rosulek, Jaspal Singh:
Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching. 1011 - Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
Nonce-Misuse Resilience of Romulus-N and GIFT-COFB. 1012 - Brice Minaud, Michael Reichle:
Dynamic Local Searchable Symmetric Encryption. 1013 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl:
Correlated Pseudorandomness from Expand-Accumulate Codes. 1014 - Maya Chartouny, Jacques Patarin, Ambre Toulemonde:
Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes. 1015 - Leixiao Cheng, Fei Meng:
Public Key Authenticated Encryption with Keyword Search from LWE. 1016 - Gareth T. Davies, Jeroen Pijnenburg:
PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords. 1017 - Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari:
Time-Deniable Signatures. 1018 - Tomoki Moriya:
Masked-degree SIDH. 1019 - Aviv Yaish, Gilad Stern, Aviv Zohar:
Uncle Maker: (Time)Stamping Out The Competition in Ethereum. 1020 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Practical Statistically-Sound Proofs of Exponentiation in any Group. 1021 - Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. 1022 - Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji:
SIM: Secure Interval Membership Testing and Applications to Secure Comparison. 1023 - Shweta Agrawal, Anshu Yadav, Shota Yamada:
Multi-Input Attribute Based Encryption and Predicate Encryption. 1024 - Cody Freitag, Rafael Pass, Naomi Sirkin:
Parallelizable Delegation from LWE. 1025 - Luciano Maino, Chloe Martindale:
An attack on SIDH with arbitrary starting curve. 1026 - Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi:
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions. 1027 - Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. 1028 - Nina Bindel, Cas Cremers, Mang Zhao:
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. 1029 - Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian:
Oblivious Extractors and Improved Security in Biometric-based Authentication Systems. 1030 - Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich:
Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem. 1031 - Rachit Garg, Dakshita Khurana, George Lu, Brent Waters:
On Non-uniform Security for Black-box Non-Interactive CCA Commitments. 1032 - Tommy Hollenberg, Mike Rosulek, Lawrence Roy:
A Complete Characterization of Security for Linicrypt Block Cipher Modes. 1033 - Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. 1034 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl:
Efficient Pseudorandom Correlation Generators from Ring-LPN. 1035 - Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi:
MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase. 1036 - Donghang Lu, Aniket Kate:
RPM: Robust Anonymity at Scale. 1037 - Damien Robert:
Breaking SIDH in polynomial time. 1038 - Ari Karchmer:
The Limits of Provable Security Against Model Extraction. 1039 - Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:
A framework for constructing Single Secret Leader Election from MPC. 1040 - Alan Szepieniec, Frederik Vercauteren:
Lattice-Based Cryptography in Miden VM. 1041 - Daniël Kuijsters, Denise Verbakel, Joan Daemen:
Weak Subtweakeys in SKINNY. 1042 - Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray A. Perlner, Angela Robinson:
A Study of Error Floor Behavior in QC-MDPC Codes. 1043 - Kevin Lewi, Jon Millican, Ananth Raghunathan, Arnab Roy:
Oblivious Revocable Functions and Encrypted Indexing. 1044 - Christian Badertscher, Peter Gazi, Iñigo Querejeta-Azurmendi, Alexander Russell:
On UC-Secure Range Extension and Batch Verification for ECVRF. 1045 - Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe:
Post-Quantum Multi-Recipient Public Key Encryption. 1046 - Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries. 1047 - Ngoc Khanh Nguyen, Gregor Seiler:
Practical Sublinear Proofs for R1CS from Lattices. 1048 - Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer
:
Post Quantum Design in SPDM for Device Authentication and Key Establishment. 1049 - Héctor Masip Ardevol, Jordi Baylina Melé, Daniel Lubarov, Jose L. Muñoz-Tapia:
RapidUp: Multi-Domain Permutation Protocol for Lookup Tables. 1050 - Henri Devillez, Olivier Pereira, Thomas Peters:
How to Verifiably Encrypt Many Bits for an Election? 1051 - Thomas Pornin:
Double-Odd Jacobi Quartic. 1052 - Onur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor:
Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information. 1053 - Tako Boris Fouotsa:
SIDH with masked torsion point images. 1054 - Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. 1055 - Jonathan Bootle, Alessandro Chiesa, Ziyi Guan, Siqi Liu:
Linear-Time Probabilistic Proofs with Sublinear Verification for Algebraic Automata Over Every Field. 1056 - Jian Guo, Shun Li, Guozhen Liu, Phuong Pham:
Rebound Attacks on SKINNY Hashing with Automatic Tools. 1057 - Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. 1058 - Diana Davidova, Nikolay S. Kaleyski:
Classification of all DO planar polynomials with prime field coefficients over GF(3^n) for n up to 7. 1059 - Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov:
Programmable Distributed Point Functions. 1060 - Ray A. Perlner, John Kelsey, David A. Cooper:
Breaking Category Five SPHINCS+ with SHA-256. 1061 - Haiyan Wang, Penghui (Owen) Liu, Xiaoxiong Zhong, Weizhe Zhang:
A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization. 1062 - Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Rapidash: Improved Constructions for Side-Contract-Resilient Fair Exchange. 1063 - Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang:
Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs. 1064 - Öznur Mut Sagdiçoglu, Serhat Sagdiçoglu, Ebru Küçükkubas:
A Note on the Theoretical and Practical Security of Block Ciphers. 1065 - Peyman Momeni, Sergey Gorbunov, Bohan Zhang:
FairBlock: Preventing Blockchain Front-running with Minimal Overheads. 1066 - Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi:
Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters. 1067 - Damien Robert:
Evaluating isogenies in polylogarithmic time. 1068 - Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model. 1069 - Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. 1070 - Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida:
Performance Evaluation of NIST LWC Finalists on AVR ATmega and ARM Cortex-M3 Microcontrollers. 1071 - Alexandre Belling, Azam Soleimanian, Olivier Bégassat:
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification. 1072 - Xiaojie Guo:
Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in "VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning". 1073 - Juliane Krämer, Patrick Struck:
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP. 1074 - Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram:
Secure Branching Program Evaluation. 1075 - Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia:
Range Search over Encrypted Multi-Attribute Data. 1076 - Meltem Sönmez Turan:
New Bounds on the Multiplicative Complexity of Boolean Functions. 1077 - Brooklyn Zelenka:
Skip Ratchet: A Hierarchical Hash System. 1078 - Huachuang Sun, Haifeng Sun, Kevin Singh, Akhil Sai Peddireddy, Harshad Patil, Jianwei Liu, Weikeng Chen:
The inspection model for zero-knowledge proofs and efficient Zerocash with secp256k1 keys. 1079 - (Withdrawn) A Lightweight, Secure Big data-based Authentication and Key-agreement Scheme for IoT with Revocability. 1080
- Xavier Bultel, Cristina Onete
:
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception. 1081 - Natnatee Dokmai, L. Jean Camp, Ryan Henry:
A Proposal for Assisted Private Information Retrieval. 1082 - Afonso Tinoco, Sixiang Gao, Elaine Shi:
EnigMap: Signal Should Use Oblivious Algorithms for Private Contact Discovery. 1083 - Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win:
Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform. 1084 - (Withdrawn) Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. 1085
- Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy:
KaLi: A Crystal for Post-Quantum Security. 1086 - Guilherme Perin, Lichao Wu, Stjepan Picek:
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. 1087 - Joan Daemen, Silvia Mella, Gilles Van Assche:
Tighter trail bounds for Xoodoo. 1088 - (Withdrawn) Pirmission: Single-server PIR with Access Control. 1089
- Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete
, Léo Robert:
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. 1090 - Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu:
Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture. 1091 - Marc Joye:
On NTRU-ν-um Modulo XN â' 1. 1092 - Ziying Ni, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O'Neill, Weiqiang Liu:
Efficient Pipelining Exploration for A High-performance CRYSTALS-Kyber Accelerator. 1093 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Integrated Sensing and Communication. 1094 - Sunyeop Kim, Insung Kim, Seonggyeom Kim, Seokhie Hong:
Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication. 1095 - Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay:
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries. 1096 - Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, Patrick Struck:
Post-Quantum Security of Tweakable Even-Mansour, and Applications. 1097 - Joelle Lim, Derrick Ng, Ruth Ng:
SoK: Security Evaluation of SBox-Based Block Ciphers. 1098 - Jan-Pieter D'Anvers:
One-Hot Conversion: Towards Faster Table-based A2B Conversion. 1099 - Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited. 1100 - Atul Singh Arora, Jérémie Roland, Chrysoula Vlachou, Stephan Weis:
Solutions to quantum weak coin flipping. 1101 - Tomoyuki Morimae, Takashi Yamakawa:
Proofs of Quantumness from Trapdoor Permutations. 1102 - Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan:
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling. 1103 - Liam Eagen:
μCash: Transparent Anonymous Transactions. 1104 - Anthony Hart, Morgan Thomas:
Arithmetization of Σ¹₁ relations with polynomial bounds in Halo 2. 1105 - Shuaishuai Li:
Towards Practical Topology-Hiding Computation. 1106 - Rémy Oudompheng:
Projective Geometry of Hessian Elliptic Curves and Genus 2 Triple Covers of Cubics. 1107 - Daniel Apon, Chloé Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu:
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model. 1108 - Prabhanjan Ananth, Fatih Kaleoglu:
A Note on Copy-Protection from Random Oracles. 1109 - David Naccache, Ofer Yifrach-Stav:
Invisible Formula Attacks. 1110 - Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers:
A tale of two models: formal verification of KEMTLS via Tamarin. 1111 - Valerii Sopin:
Ergodic dynamical systems over the Cartesian power of the ring of p-adic integers. 1112 - Valerii Sopin:
A new algorithm for solving the rSUM problem. 1113 - Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili:
Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants. 1114 - Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. 1115 - Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE. 1116 - Kwangsu Lee, Hyoseung Kim:
Two-Round Multi-Signatures from Okamoto Signatures. 1117 - Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
PentaGOD: Stepping beyond Traditional GOD with Five Parties. 1118 - Wei Dai:
PESCA: A Privacy-Enhancing Smart-Contract Architecture. 1119 - Vishesh Mishra, Urbi Chatterjee:
VMEO: Vector Modeling Errors and Operands for Approximate adders. 1120 - Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on the Full-round FRIET. 1121 - Orr Dunkelman, Eran Lambooij, Shibam Ghosh:
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256. 1122 - Amit Jana, Mostafizar Rahman, Dhiman Saha:
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers. 1123 - Junichi Tomida:
Unbounded Quadratic Functional Encryption and More from Pairings. 1124 - Daniel J. Bernstein:
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack. 1125 - Enes Pasalic, Amar Bapic, Fengrong Zhang, Yongzhuang Wei:
Explicit infinite families of bent functions outside MM#. 1126 - Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. 1127 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Stanislav Smyshlyaev:
On the (im)possibility of ElGamal blind signatures. 1128 - (Withdrawn) Breaking KASLR on Mobile Devices without Any Use of Cache Memory. 1129
- Cas Cremers, Charlie Jacomme, Philip Lukert:
Subterm-based proof techniques for improving the automation and scope of security protocol analysis. 1130 - Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
CINI MINIS: Domain Isolation for Fault and Combined Security. 1131 - Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller, Daniel Rausch, Pascal Reisert, Andreas Vogt:
Kryvos: Publicly Tally-Hiding Verifiable E-Voting. 1132 - Haoyu Zheng, Shengke Zeng, Hongwei Li, Zhijun Li:
Secure Batch Deduplication Without Dual Servers in Backup System. 1133 - Han-Bing Yu, Qun-Xiong Zheng, Yijian Liu, Jingguo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun:
An improved method for predicting truncated multiple recursive generators with unknown parameters. 1134 - Hart Montgomery, Mark Zhandry:
Full Quantum Equivalence of Group Action DLog and CDH, and More. 1135 - Any Muanalifah, Ayus Riana Isnawati:
The tropical Version of ElGamal Encryption. 1136 - Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram:
Private Computation On Set Intersection With Sublinear Communication. 1137 - Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos:
Designated-Verifier Linkable Ring Signatures with unconditional anonymity. 1138 - Shengtong Zhang, Arvid Lunnemark, Sualeh Asif:
Formal Security Definition of Metadata-Private Messaging. 1139 - Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Witness Encryption and Null-IO from Evasive LWE. 1140 - Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen:
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes. 1141 - Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Secure Message Authentication in the Presence of Leakage and Faults. 1142 - Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker:
Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$. 1143 - Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa:
On the Higher bit Version of Approximate Inhomogeneous Short Integer Solution Problem. 1144 - Rami Akeela, Weikeng Chen:
Yafa-108/146: Implementing ed25519-embedding Cocks-Pinch curves in arkworks-rs. 1145 - Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
A Sponge-Based PRF with Good Multi-user Security. 1146 - Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder:
Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks. 1147 - Lúcás Críostóir Meier:
On Security Against Time Traveling Adversaries. 1148 - Karl Norrman:
Secure Anycast Channels with Applications to 4G and 5G Handovers. 1149 - Najwa Aaraj, Emanuele Bellini, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar:
Farasha: A Provable Permutation-based Parallelizable PRF. 1150 - Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta
, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions. 1151 - Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Xingfu Yan:
Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities. 1152 - Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle:
Sharp: Short Relaxed Range Proofs. 1153 - Weiji Guo:
Efficient Constant-Time Implementation of SM4 with Intel GFNI instruction set extension and Arm NEON coprocessor. 1154 - Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel P. J. van Woerden:
Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple. 1155 - István Vajda:
On the security of data markets: controlled Private Function Evaluation. 1156 - Tomoyuki Morimae, Takashi Yamakawa:
Classically Verifiable NIZK for QMA with Preprocessing. 1157 - Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur:
Differential Cryptanalysis of K-Cipher. 1158 - Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. 1159 - Amadou Tall:
The Scholz conjecture on addition chain is true for v(n)= 4. 1160 - Delaram Kahrobaei, Ramón Flores, Marialaura Noce:
Group-based Cryptography in the Quantum Era. 1161 - Youssef El Housni:
Pairings in Rank-1 Constraint Systems. 1162 - Yuanyuan Zhou
, Joop van de Pol, Yu Yu, François-Xavier Standaert:
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. 1163 - Thomas Pornin:
Point-Halving and Subgroup Membership in Twisted Edwards Curves. 1164 - Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. 1165 - Wenshuo Guo, Fangwei Fu:
McEliece-type encryption based on Gabidulin codes with no hidden structure. 1166 - Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim:
META-BTS: Bootstrapping Precision Beyond the Limit. 1167 - Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality. 1168 - Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, Jianwei Liu:
DyCAPS: Asynchronous Proactive Secret Sharing for Dynamic Committees. 1169 - Giuseppe D'Alconzo
, Andrea Gangemi:
TRIFORS: LINKable Trilinear Forms Ring Signature. 1170 - Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, David Tse:
No More Attacks on Proof-of-Stake Ethereum? 1171 - Jonathan Fuchs, Yann Rotella, Joan Daemen:
On the security of keyed hashing based on an unkeyed block function. 1172 - Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer:
Secure Maximum Weight Matching Approximation on General Graphs (Full Version). 1173 - Ke Zhong, Yiping Ma, Sebastian Angel:
Ibex: Privacy-preserving ad conversion tracking and bidding (full version). 1174 - (Withdrawn) A Cryptanalysis of NOVA Signature Scheme. 1175
- Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption under Corruptions. 1176 - Marc Joye, Michael Walter:
Liberating TFHE: Programmable Bootstrapping with General Quotient Polynomials. 1177 - James Bartusek, Dakshita Khurana:
Cryptography with Certified Deletion. 1178 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Trustless Cross-chain Communication for Zendoo Sidechains. 1179 - Delaram Kahrobaei, Mima Stanojkovski:
Cryptographic multilinear maps using pro-p groups. 1180 - Zvika Brakerski, Ran Canetti, Luowen Qian:
On the computational hardness needed for quantum cryptography. 1181 - Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 1182 - Sanjay Deshpande, Mamuri Nawan, Kashif Nawaz, Jakub Szefer, Chuanqi Xu:
Towards a Fast and Efficient Hardware Implementation of HQC. 1183 - Zhili Chen, Dung Hoang Duong, Tuong Ngoc Nguyen, Youming Qiao, Willy Susilo, Gang Tang:
On digital signatures based on isomorphism problems: QROM security and ring signatures. 1184 - Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko:
PEA: Practical private epistasis analysis using MPC. 1185 - Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia:
Adversarial Correctness and Privacy for Probabilistic Data Structures. 1186 - Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler:
Strongly Anonymous Ratcheted Key Exchange. 1187 - Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
High-order masking of NTRU. 1188 - Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen:
CSI-SharK: CSI-FiSh with Sharing-friendly Keys. 1189 - Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar:
Statistical Security in Two-Party Computation Revisited. 1190 - Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar:
A New Framework for Quantum Oblivious Transfer. 1191 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard. 1192 - Yi Deng, Xinxuan Zhang:
Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity. 1193 - Brent Waters, Hoeteck Wee, David J. Wu:
Multi-Authority ABE from Lattices without Random Oracles. 1194 - Debranjan Pal
, Upasana Mandal, Mainak Chaudhury, Abhijit Das, Dipanwita Roy Chowdhury:
A Deep Neural Differential Distinguisher for ARX based Block Cipher. 1195 - Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay:
Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices. 1196 - David Naccache, Ofer Yifrach-Stav:
On Squaring Modulo Mersenne Numbers. 1197 - Alexander Wagner, Felix Oberhansl, Marc Schink:
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures. 1198 - Xiaofeng Xie, Tian Tian:
Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis. 1199 - Si Chen, Junfeng Fan:
SEEK: model extraction attack against hybrid secure inference protocols. 1200 - Arnab Roy
, Aakash Chowdhury, Elisabeth Oswald:
Consistent, Efficient and Leakage-Model Free Mutual Information Estimation. 1201 - Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, Monika Trimoska:
Disorientation faults in CSIDH. 1202 - Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé:
On Module Unique-SVP and NTRU. 1203 - Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
The Pseudorandom Oracle Model and Ideal Obfuscation. 1204 - Oana Ciobotaru, Fatemeh Shirazi, Alistair Stewart, Sergey Vasilyev:
Accountable Light Client Systems for PoS Blockchains. 1205 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR. 1206 - Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul:
Attaining GOD Beyond Honest Majority With Friends and Foes. 1207 - Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
Notes on Reusable Garbling. 1208 - Matilda Backendal, Felix Günther, Kenneth G. Paterson:
Puncturable Key Wrapping and Its Applications. 1209 - Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei:
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version). 1210 - Anthony Hart:
Arithmetization of Functional Program Execution via Interaction Nets in Halo 2. 1211 - David Chaum, Richard Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang:
VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections. 1212 - Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert:
Nostradamus goes Quantum. 1213 - Karim Baghery, Navid Ghaedi Bardeh:
Updatable NIZKs from Non-Interactive Zaps. 1214 - Benjamin Dowling, Felix Günther, Alexandre Poirrier:
Continuous Authentication in Secure Messaging. 1215 - Ulrich Haböck:
A summary on the FRI low degree test. 1216 - You Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. 1217 - Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang:
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies. 1218 - Azam Soleimanian:
Anonymous Random Allocation and Its Applications. 1219 - Juan A. Garay, Aggelos Kiayias, Yu Shen:
Permissionless Clock Synchronization with Public Setup. 1220 - Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee:
Multi-User Security of the Sum of Truncated Random Permutations (Full Version). 1221 - Ali Sah Özcan, Can Ayduman, Enes Recep Türkoglu, Erkay Savas:
Homomorphic Encryption on GPU. 1222 - Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer:
Efficient Proofs of Software Exploitability for Real-world Processors. 1223 - Ehsan Ebrahimi:
From Plaintext-extractability to IND-CCA Security. 1224 - Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein:
Hybrid Post-Quantum Signatures in Hardware Security Keys. 1225 - Hao Guo, Jintai Ding:
Algebraic Relation of Three MinRank Algebraic Modelings. 1226 - George Lu, Brent Waters:
How to Sample a Discrete Gaussian (and more) from a Random Oracle. 1227 - Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. 1228 - Benoît Libert, Ky Nguyen, Alain Passelègue:
Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions. 1229 - Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. 1230 - Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi:
Continuously Non-Malleable Codes against Bounded-Depth Tampering. 1231 - Julia Kastner, Julian Loss, Jiayu Xu:
The Abe-Okamoto Partially Blind Signature Scheme Revisited. 1232 - Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan:
Forward-Secure Encryption with Fast Forwarding. 1233 - Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
Towards Tight Security Bounds for OMAC, XCBC and TMAC. 1234 - Tianshu Shan, Jiangxia Ge, Rui Xue:
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. 1235 - Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan:
Rate-1 Non-Interactive Arguments for Batch-NP and Applications. 1236 - Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg
, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler:
On the Worst-Case Inefficiency of CGKA. 1237 - Ping Wang, Yiting Su, Fangguo Zhang:
Secure Quantum Bit Commitment. 1238 - Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. 1239 - George Teseleanu:
Sherlock Holmes Zero-Knowledge Protocols. 1240 - George Teseleanu, Paul Cotan:
Continued Fractions Applied to a Family of RSA-like Cryptosystems. 1241 - Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann:
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies. 1242 - Hanno Becker, Matthias J. Kannwischer:
Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64. 1243 - Yu Long Chen:
A Modular Approach to the Security Analysis of Two-Permutation Constructions. 1244 - Lorenzo Grassi:
On Generalizations of the Lai-Massey Scheme: the Birth of Amaryllises. 1245 - Jie Chen, Yu Li, Jinming Wen, Jian Weng:
Identity-Based Matchmaking Encryption from Standard Assumptions. 1246 - Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. 1247 - Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan:
Fully-Secure MPC with Minimal Trust. 1248 - Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé:
On Rejection Sampling in Lyubashevsky's Signature Scheme. 1249 - Yun Lu, Yu Wei, Malik Magdon-Ismail, Vassilis Zikas:
Eureka: A General Framework for Black-box Differential Privacy Estimators. 1250 - Nan Wang, Sid Chi-Kin Chau:
Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup. 1251 - Fuyuki Kitagawa, Ryo Nishimaki:
Functional Encryption with Secure Key Leasing. 1252 - Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. 1253 - Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi:
Protecting the most significant bits in scalar multiplication algorithms. 1254 - Aayush Gupta, Kobi Gurkan:
An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs. 1255 - Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, Chohong Min:
EvalRound Algorithm in CKKS Bootstrapping. 1256 - Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus:
One-Time Programs from Commodity Hardware. 1257 - Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications. 1258 - Wouter Castryck, Thomas Decru
, Marc Houben, Frederik Vercauteren:
Horizontal racewalking using radical isogenies. 1259 - John Chan, Phillip Rogaway:
On Committing Authenticated Encryption. 1260 - Dana Dachman-Soled, Julian Loss, Adam O'Neill, Nikki Sigurdson:
Breaking RSA Generically is Equivalent to Factoring, with Preprocessing. 1261 - Muhammad Haris Mughees, Ling Ren:
Vectorized Batch Private Information Retrieval. 1262 - Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta:
Steganography-Free Zero-Knowledge. 1263 - Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency. 1264 - Pedro Branco, Nico Döttling, Stella Wohnig
:
Universal Ring Signatures in the Standard Model. 1265 - Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra:
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS. 1266 - (Withdrawn) High-precision Leveled Homomorphic Encryption with Batching. 1267
- Bin Liu, Antonis Michalas, Bogdan Warinschi:
Cryptographic Role-Based Access Control, Reconsidered. 1268 - Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian:
Collusion-Resistant Functional Encryption for RAMs. 1269 - Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean:
Typing High-Speed Cryptography against Spectre v1. 1270 - Bowen Liu
, Qiang Tang
:
Privacy-preserving Federated Singular Value Decomposition. 1271 - Nir Bitansky, Arka Rai Choudhuri, Justin Holmgren
, Chethan Kamath, Alex Lombardi, Omer Paneth, Ron D. Rothblum:
PPAD is as Hard as LWE and Iterated Squaring. 1272 - David Naccache, Ofer Yifrach-Stav:
A Conjecture From a Failed Cryptanalysis. 1273 - Pawel Cyprys, Shlomi Dolev, Shlomo Moran:
Self Masking for Hardering Inversions. 1274 - Alexandre Duc, Robin Müller, Damian Vizár:
DiAE: Re-rolling the DiSE. 1275 - Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi:
Second-Order Low-Randomness d+1 Hardware Sharing of the AES. 1276 - Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu:
Compact GF(2) systemizer and optimized constant-time hardware sorters for Key Generation in Classic McEliece. 1277 - Erik Pohle, Aysajan Abidin, Bart Preneel:
Fast Evaluation of S-boxes with Garbled Circuits. 1278 - Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen, ManMan Li:
Improved Neural Distinguishers with Multi-Round and Multi-Splicing Construction. 1279 - Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. 1280 - Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou:
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. 1281 - Rebecca Young, Luke Mather, Elisabeth Oswald:
Comparing Key Rank Estimation Methods. 1282 - Rémy Oudompheng, Giacomo Pope:
A Note on Reimplementing the Castryck-Decru Attack and Lessons Learned for SageMath. 1283 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
:
(Inner-Product) Functional Encryption with Updatable Ciphertexts. 1284 - Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi:
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption. 1285 - Deevashwer Rathee, Guru-Vamsi Policharla, Tiancheng Xie, Ryan Cottone, Dawn Song:
ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi. 1286 - Shengtong Zhang:
On a Conjecture From a Failed CryptoAnalysis. 1287 - Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT. 1288 - David Jacquemin, Ahmet Can Mert, Sujoy Sinha Roy:
Exploring RNS for Isogeny-based Cryptography. 1289 - Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren:
Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform. 1290 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev:
sMGM: parameterizable AEAD-mode. 1291 - Moni Naor, Noa Oved:
Bet-or-Pass: Adversarially Robust Bloom Filters. 1292 - Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia:
Improving the Efficiency of Report and Trace Ring Signatures. 1293 - Elaine Shi, Hao Chung, Ke Wu:
What Can Cryptography Do For Decentralized Mechanism Design? 1294 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Daric: A Storage Efficient Payment Channel With Penalization Mechanism. 1295 - Constantin Blokh, Nikolaos Makriyannis, Udi Peled:
Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage. 1296 - Simone Dutto, Davide Margaria
, Carlo Sanna, Andrea Vesco
:
Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity. 1297 - Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul:
BLEACH: Cleaning Errors in Discrete Computations over CKKS. 1298 - Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel:
Addax: A fast, private, and accountable ad exchange infrastructure. 1299 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Garrison: A Novel Watchtower Scheme for Bitcoin. 1300 - (Withdrawn) On the Invalidity of Lin16/Lin17 Obfuscation Schemes. 1301
- Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty:
Private Certifier Intersection. 1302 - Hanno Becker, Fabien Klein:
Towards perfect CRYSTALS in Helium. 1303 - Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier:
Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations. 1304 - Trey Li:
Subset Product with Errors over Unique Factorization Domains and Ideal Class Groups of Dedekind Domains. 1305 - Kazumasa Shinagawa, Koji Nuida:
Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols. 1306 - Vadim Lyubashevsky, Ngoc Khanh Nguyen:
BLOOM: Bimodal Lattice One-Out-of-Many Proofs and Applications. 1307 - Trey Li:
Jacobi Symbol Parity Checking Algorithm for Subset Product. 1308 - Matt Shams (Anis), Bingsheng Zhang:
MPC as a service using Ethereum Registry Smart Contracts - dCommon CIP. 1309 - Trey Li:
Power Residue Symbol Order Detecting Algorithm for Subset Product over Algebraic Integers. 1310 - Pratish Datta, Ilan Komargodski, Brent Waters:
Fully Adaptive Decentralized Multi-Authority ABE. 1311 - Trey Li:
Multiple Modular Unique Factorization Domain Subset Product with Errors. 1312 - Lorenzo Grassi:
Weak Bijective Quadratic Functions over 픽pn. 1313 - Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer:
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. 1314 - Jakub Klemsa:
Hitchhiker's Guide to a Practical Automated TFHE Parameter Setup for Custom Applications. 1315 - Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
TurboPack: Honest Majority MPC with Constant Online Communication. 1316 - Aayush Jain, Huijia Lin, Ji Luo:
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption. 1317 - Bolton Bailey, Andrew Miller, Or Sattath:
General Partially Fair Multi-Party Computation with VDFs. 1318 - Trey Li:
Post-Quantum Key Exchange from Subset Product With Errors. 1319 - Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Boosting Batch Arguments and RAM Delegation. 1320 - Tao Lu, Chengkun Wei, Ruijing Yu, Yi Chen, Li Wang, Chaochao Chen, Zeke Wang, Wenzhi Chen:
cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs. 1321 - Anton A. Sokolov:
Efficient Linkable Ring Signature from Vector Commitment inexplicably named Multratug. 1322 - Shujiao Cao, Rui Xue:
On Constructing One-Way Quantum State Generators, and More. 1323 - Venkata Koppula, Brent Waters, Mark Zhandry:
Adaptive Multiparty NIKE. 1324 - Thomas Pornin:
Efficient and Complete Formulas for Binary Curves. 1325 - Divesh Aggarwal, Marshall Ball, Maciej Obremski:
Survey: Non-malleable code in the split-state model. 1326 - Trey Li:
Post-Quantum Public Key Cryptosystem from Subset Product with Errors. 1327 - Andre Esser:
Revisiting Nearest-Neighbor-Based Information Set Decoding. 1328 - Andre Esser, Floyd Zweydinger:
New Time-Memory Trade-Offs for Subset Sum - Improving ISD in Theory and Practice. 1329 - Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. 1330 - Dario Catalano, Dario Fiore, Ida Tucker:
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures. 1331 - Nikolaos Makriyannis:
On the Classic Protocol for MPC Schnorr Signatures. 1332 - Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. 1333 - Trey Li:
Post-Quantum Signature from Subset Product with Errors. 1334 - Kai Hu, Thomas Peyrin:
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha. 1335 - Tomoyuki Morimae, Takashi Yamakawa:
One-Wayness in Quantum Cryptography. 1336 - Timo Glaser, Alexander May:
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium. 1337 - Sebastian Ramacher, Daniel Slamanig, Andreas Weninger:
Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions. 1338 - Huanhuan Chen, Yao Jiang Galteland, Kaitai Liang:
Stronger and Simpler Updatable Encryption. 1339 - Bart Mennink:
Understanding the Duplex and Its Security. 1340 - Ward Beullens, Gregor Seiler:
LaBRADOR: Compact Proofs for R1CS from Module-SIS. 1341 - Ritam Bhaumik, André Chailloux, Paul Frixons, María Naya-Plasencia:
Safely Doubling your Block Ciphers for a Post-Quantum World. 1342 - Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang:
Improved Progressive BKZ with Lattice Sieving. 1343 - Trey Li:
Discrete Exponential Equations and Noisy Systems. 1344 - Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen:
Refined Security Estimation for LWE with Hints via a Geometric Approach. 1345 - Trey Li:
Generic Signature from Noisy Systems. 1346 - Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada:
Trace and Revoke with Optimal Parameters from Polynomial Hardness. 1347 - Hoeteck Wee:
ABE for DFA from LWE against Bounded Collusions, Revisited. 1348 - Xiutao Feng, Xiaoshan Gao, Zhangyi Wang, Xiangyong Zeng:
Invertibility of multiple random functions and its application to symmetric ciphers. 1349 - Lucjan Hanzlik, Julian Loss, Benedikt Wagner:
Rai-Choo! Evolving Blind Signatures to the Next Level. 1350 - Christina Boura, Nicolas David, Rachelle Heim Boissier, María Naya-Plasencia:
Better Steady than Speedy: Full break of SPEEDY-7-192. 1351 - Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphael R. Toledo:
aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes. 1352 - Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky:
Anonymous Permutation Routing. 1353 - Marijn F. Stollenga:
Embracing Hellman: A Simple Proof-of-Space Search consensus algorithm with stable block times using Logarithmic Embargo. 1354 - Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang:
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. 1355 - Gabrielle De Micheli, Daniele Micciancio:
A fully classical LLL algorithm for modules. 1356 - Mingxun Zhou, Elaine Shi, T.-H. Hubert Chan, Shir Maimon:
A Theory of Composition for Differential Obliviousness. 1357 - Sam Gunn, Nathan Ju, Fermi Ma, Mark Zhandry:
Commitments to Quantum States. 1358 - Haruhisa Kosuge, Keita Xagawa:
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. 1359 - Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, Ming Tang:
One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks. 1360 - Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, Pascal Benoit:
Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber. 1361 - Samuel Jaques, Michael Lodder, Hart Montgomery:
ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations. 1362 - Robin Geelen, Frederik Vercauteren:
Bootstrapping for BGV and BFV Revisited. 1363 - Robin Geelen, Ilia Iliashenko, Jiayi Kang, Frederik Vercauteren:
On Polynomial Functions Modulo pe and Faster Bootstrapping for Homomorphic Encryption. 1364 - David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai:
Functional Commitments for Circuits from Falsifiable Assumptions. 1365 - Wouter Castryck, Natan Vander Meeren:
Two remarks on the vectorization problem. 1366 - Christian Badertscher, Michele Ciampi, Aggelos Kiayias:
Agile Cryptography: A Composable Approach. 1367 - Leo de Castro, Chris Peikert:
Functional Commitments for All Functions, with Transparent Setup. 1368 - Renas Bacho, Daniel Collins, Chen-Da Liu-Zhang, Julian Loss:
Network-Agnostic Security Comes for Free in DKG and MPC. 1369 - Hugo D. Scolnik, Juan Pedro Hecht:
A New Post-Quantum Key Agreement Protocol and Derived Cryptosystem Based on Rectangular Matrices. 1370 - Benjamin E. Diamond:
On the Security of KOS. 1371 - Prasanna Ravi, Anupam Chattopadhyay, Shivam Bhasin:
Security and Quantum Computing: An Overview. 1372 - Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret. 1373 - Lijun Qi, Jincheng Zhuang:
Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing. 1374 - Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa:
From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments. 1375 - Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak:
Modeling Effective Lifespan of Payment Channels. 1376 - Solane El Hirch, Silvia Mella, Alireza Mehrdad
, Joan Daemen:
Improved Differential and Linear Trail Bounds for ASCON. 1377 - Qiming Li, Sampo Sovio:
A Fast Hash Family for Memory Integrity. 1378 - David Cerezo Sánchez:
Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance. 1379 - Prabhanjan Ananth, Alex B. Grilo:
Post-Quantum Zero-Knowledge with Space-Bounded Simulation. 1380 - Tobias Hemmert:
How to backdoor LWE-like cryptosystems. 1381 - Thomas Kaeding:
Quagmire ciphers, group theory, and information: Key amplification in crib-based attacks. 1382 - Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos:
Sublinear-round Broadcast without trusted setup against dishonest majority. 1383 - Qipeng Liu:
Non-uniformity and Quantum Advice in the Random Oracle Model. 1384 - Nikolaos Papadis, Leandros Tassiulas:
Deep Reinforcement Learning-based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks. 1385 - Gérald Gavin, Sandrine Tainturier:
A multivariate noise-free HE proposal. 1386 - Seongkwang Kim, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee:
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security. 1387 - William Diehl:
MIPS Assembly Language Implementation of GIFT-64-128 Encryption. 1388 - Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren:
Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling. 1389 - Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures. 1390 - Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation. 1391 - Anju Alexander, Annapurna Valiveti, Srinivas Vivek:
A Faster Third-Order Masking of Lookup Tables. 1392 - Dario Fiore, Ida Tucker:
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams. 1393 - Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu:
Risky Translations: Securing TLBs against Timing Side Channels. 1394 - Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani:
Non-Interactive Anonymous Router with Quasi-Linear Router Computation. 1395 - Kaveh Aasaraai, Don Beaver, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela:
FPGA Acceleration of Multi-Scalar Multiplication: CycloneMSM. 1396 - Giovanni Deligios, Chen-Da Liu-Zhang:
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees. 1397 - Murat Burhan Ilter, Ali Aydin Selçuk:
MILP-aided Cryptanalysis of the FUTURE Block Cipher. 1398 - Gheorghe Pojoga, Kostas Papagiannopoulos:
Low-latency implementation of the GIFT cipher on RISC-V architectures. 1399 - Youssef El Housni, Gautam Botrel:
EdMSM: Multi-Scalar-Multiplication for recursive SNARKs and more. 1400 - Jian Liu, Jingyu Li, Di Wu, Kui Ren:
Improved Constant-weight PIR with an Extension for Multi-query. 1401 - Chandan Kumar, Mahendra Rathor, Urbi Chatterjee:
Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF. 1402 - Han Wu, Xiaoyun Wang, Guangwu Xu:
On the Dual Attack of LWE Schemes in the Presence of Hints. 1403 - Han Wu, Xiaoyun Wang, Guangwu Xu:
Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack. 1404 - Marcel Armour, Elizabeth A. Quaglia:
Subverting Deniability. 1405 - Melissa Azouaoui
, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal:
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations. 1406 - Thibauld Feneuil, Matthieu Rivain:
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head. 1407 - Pia Bauspieß, Tjerand Silde, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch:
Improved Biometrics-Authenticated Key Exchange. 1408 - Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan:
SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption. 1409 - Hauke Malte Steffen, Georg Land, Lucie Johanna Kogelheide, Tim Güneysu:
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware. 1410 - David Balbás, Daniel Collins, Serge Vaudenay:
Cryptographic Administration for Secure Group Messaging. 1411 - Charles Bouillaguet:
Boolean Polynomial Evaluation for the Masses. 1412 - Nils Fleischhacker, Kasper Green Larsen, Mark Simkin:
How to Compress Encrypted Data. 1413 - Nilanjan Datta, Avijit Dutta, Shibam Ghosh:
INT-RUP Security of SAEB and TinyJAMBU. 1414 - Doreen Riepel, Hoeteck Wee:
FABEO: Fast Attribute-Based Encryption with Optimal Security. 1415 - Martin Brisfors, Michail Moraitis, Elena Dubrova:
Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw. 1416 - Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. 1417 - Anna M. Johnston, Puru Kulkarni:
Da Yan Concentrator and Extender of Random Data (DYCE). 1418 - Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk, Nicholas Spooner:
Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions. 1419 - Conor McMenamin, Vanesa Daza, Bruno Mazorra:
Diamonds are Forever, Loss-Versus-Rebalancing is Not. 1420 - Shravan Srinivasan
, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri Aravinda Krishnan Thyagarajan:
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus. 1421 - Ismail Afia, Riham AlTawy:
Unlinkable Policy-based Sanitizable Signatures. 1422 - Sunoo Park, Nicholas Spooner:
The Superlinearity Problem in Post-Quantum Blockchains. 1423 - David W. Kravitz, Mollie Z. Halverson:
DeFi That Defies: Imported Off-Chain Metrics and Pseudonymous On-Chain Activity. 1424 - Carlos Aguilar Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz:
Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC. 1425 - Esra Günsay, Oguz Yayla:
Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption. 1426 - Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay:
Improved Quantum Analysis of SPECK and LowMC (Full Version). 1427 - Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. 1428 - Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry:
Collusion Resistant Copy-Protection for Watermarkable Functionalities. 1429 - Abhishek Jain, Zhengzhong Jin:
Indistinguishability Obfuscation via Mathematical Proofs of Equivalence. 1430 - Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu:
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF. 1431 - Xiaoling Yu, Yuntao Wang:
A Lattice-based Ring Signature Scheme Secure against Key Exposure. 1432 - Xiao Sui, Sisi Duan, Haibin Zhang:
BG: A Modular Treatment of BFT Consensus. 1433 - Agnese Gini, Pierrick Méaux:
Weightwise almost perfectly balanced functions: secondary constructions for all n and better weightwise nonlinearities. 1434 - Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen:
Eagle: Efficient Privacy Preserving Smart Contracts. 1435 - Marloes Venema, Leon Botros:
Efficient and Generic Transformations for Chosen-Ciphertext Secure Predicate Encryption. 1436 - Lennart Braun, Ivan Damgård, Claudio Orlandi:
Secure Multiparty Computation from Threshold Encryption based on Class Groups. 1437 - Florian Bourse, Malika Izabachène:
Plug-and-play sanitization for TFHE. 1438 - Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Naehrig, Michael Meyer, Bruno Sterner:
Cryptographic Smooth Neighbors. 1439 - Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab:
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version). 1440 - Yu Liu, Haodong Jiang, Yunlei Zhao:
Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE. 1441 - James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong:
FairPoS: Input Fairness in Proof-of-Stake with Adaptive Security. 1442 - Bo Yang, Yanchao Zhang, Dong Tong:
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices. 1443 - Debasmita Chakraborty:
Finding Three-Subset Division Property for Ciphers with Complex Linear Layers (Full Version). 1444 - Shanjie Xu, Qi Da, Chun Guo:
Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules). 1445 - Valentina Pribanic:
Radical isogenies and modular curves. 1446 - Ariel Gabizon, Dmitry Khovratovich:
flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size. 1447 - Dahlia Malkhi, Atsuki Momose, Ling Ren:
Byzantine Consensus under Fully Fluctuating Participation. 1448 - Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. 1449 - Andreas Erwig, Siavash Riahi:
Deterministic Wallets for Adaptor Signatures. 1450 - Masahito Ishizaka, Kazuhide Fukushima:
Attribute-Based Signatures for Range of Inner Product and Its Applications. 1451 - Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund:
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber. 1452 - Philipp Muth, Stefan Katzenbeisser:
Assisted MPC. 1453 - Clara Shikhelman, Sergei Tikhomirov:
Unjamming Lightning: A Systematic Approach. 1454 - Kevin Yeo:
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications. 1455 - Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan:
Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting. 1456 - Kaartik Bhushan, Ankit Kumar Misra, Varun Narayanan, Manoj Prabhakaran:
Secure Non-Interactive Reducibility is Decidable. 1457 - Diana Maimut, Alexandru Cristian Matei:
Speeding-Up Elliptic Curve Cryptography Algorithm. 1458 - Kamil Kluczniak:
Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice. 1459 - Hyesun Kwak, Seonhong Min, Yongsoo Song:
Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity. 1460 - James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun:
ACORN: Input Validation for Secure Aggregation. 1461 - (Withdrawn) RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the RTL for Security Applications. 1462
- Ian McQuoid, Mike Rosulek, Jiayu Xu:
How to Obfuscate MPC Inputs. 1463 - Emanuele Bellini, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger:
Parallel Isogeny Path Finding with Limited Memory. 1464 - Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. 1465 - Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie:
I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups. 1466 - Emanuele Bellini, David Gérault, Anna Hambitzer, Matteo Rossi:
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences. 1467 - Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran:
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning. 1468 - Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski:
Supersingular Curves You Can Trust. 1469 - Daniel Lubarov, Jordi Baylina Melé:
Casting out Primes: Bignum Arithmetic for Zero-Knowledge Proofs. 1470 - Xiangyu Su, Xavier Défago, Mario Larangeira, Kazuyuki Mori, Takuya Oda, Yuta Okumura, Yasumasa Tamura, Keisuke Tanaka:
Bid-Matching Problem and Score-Based Consensus for Peer-to-Peer Energy Trading. 1471 - Roberto Avanzi, Ionut Mihalcea, David Schall, Andreas Sandberg, Héctor Montaner:
Cryptographic Protection of Random Access Memory: How Inconspicuous can Hardening Against the most Powerful Adversaries be? 1472 - Minki Hhan, Jiseung Kim, Changmin Lee, Yongha Son:
How to Meet Ternary LWE Keys on Babai's Nearest Plane. 1473 - Samuel Bouaziz-Ermann, Alex B. Grilo, Damien Vergnaud:
Quantum security of subset cover problems. 1474 - Thomas Kaeding:
Quagmire ciphers and group theory: Recovering keywords from the key table. 1475 - Valence Cristiani, Maxime Lecomte, Philippe Maurine:
The EVIL Machine: Encode, Visualize and Interpret the Leakage. 1476 - Christian Picozzi, Alessio Meneghetti, Giovanni Tognolini:
A Post-Quantum Digital Signature Scheme from QC-LDPC Codes. 1477 - Miranda Christ, Joseph Bonneau:
Limits on revocable proof systems, with applications to stateless blockchains. 1478 - Jesús-Javier Chi-Domínguez:
A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack. 1479 - Benoît Chevallier-Mames:
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption. 1480 - Cas Cremers, Mang Zhao:
Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption. 1481 - Minglang Dong:
Multi-Point HashDH OPRF using Multiplicative Blinding with Application to Private Set Intersection. 1482 - Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, Joppe W. Bos:
Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead. 1483 - Anna Lysyanskaya, Leah Namisa Rosenbloom:
Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions. 1484 - Zachary A. Kissel:
Policy-Based Redactable Signatures. 1485 - Arka Rai Choudhuri, Sanjam Garg
, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang:
Correlation Intractability and SNARGs from Sub-exponential DDH. 1486 - Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, Weikeng Chen:
An efficient verifiable state for zk-EVM and beyond from the Anemoi hash function. 1487 - Thomas Kaeding:
Quagmire ciphers and group theory: What is a Beaufort cipher? 1488 - Vasyl Ustimenko:
New results on algebraic graphs of large girth and their impact on Extremal Graph Theory and Algebraic Cryptography. 1489 - Marcio Barbado Junior:
Efficient Gaussian sampling for RLWE-based cryptography through a fast Fourier transform. 1490 - Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3. 1491 - Oguzhan Akcin, Robert P. Streit, Benjamin Oommen, Sriram Vishwanath, Sandeep Chinchali:
A Control Theoretic Approach to Infrastructure-Centric Blockchain Tokenomics. 1492 - Jong-Seon No, Jinkyu Cho, Yongwoo Lee, ZaHyun Koo, Young-Sik Kim:
Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography. 1493 - Yonatan Sompolinsky, Michael Sutton:
The DAG KNIGHT Protocol: A Parameterless Generalization of Nakamoto Consensus. 1494 - Eun-Young Seo, Young-Sik Kim, Joon-Woo Lee, Jong-Seon No:
Peregrine: Toward Fastest FALCON Based on GPV Framework. 1495 - Shlomi Dolev, Yaniv Kleinman:
Multiplicative Partially Homomorphic CRT Secret Sharing. 1496 - Yusuf Alnawakhtha, Atul Mantri, Carl A. Miller, Daochen Wang:
Lattice-Based Quantum Advantage from Rotated Measurements. 1497 - Peter Chvojka, Tibor Jager:
Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments. 1498 - Markku-Juhani O. Saarinen:
Masked Key Wrapping and Mask Compression. 1499 - Susan Hohenberger, George Lu, Brent Waters, David J. Wu:
Registered Attribute-Based Encryption. 1500 - Gora Adj, Luis Rivera-Zamarripa, Javier A. Verbel:
MinRank in the Head: Short Signatures from Zero-Knowledge Proofs. 1501 - Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill:
Beyond Uber: Instantiating Generic Groups via PGGs. 1502 - Jeremiah Blocki, Blake Holman, Seunghoon Lee:
The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs. 1503 - Bar Alon, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky, Arpita Patra:
On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness. 1504 - Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi:
Efficient Registration-Based Encryption. 1505 - Sujaya Maiyya, Yuval Steinhart, Divyakant Agrawal, Prabhanjan Ananth, Amr El Abbadi:
ORTOA: One Round Trip Oblivious Access. 1506 - Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. 1507 - Riddhi Ghosal, Amit Sahai, Brent Waters:
Non-Interactive Publicly-Verifiable Delegation of Committed Programs. 1508 - Enrique Larraia, Tamara Finogina, Núria Costa:
sVote with Control Components Voting Protocol. Computational Proof of Complete Verifiability and Privacy. 1509 - Matteo Campanelli, Dario Fiore, Hamidreza Khoshakhlagh:
Witness Encryption for Succinct Functional Commitments and Applications. 1510 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar:
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH. 1511 - Thibauld Feneuil:
Building MPCitH-based Signatures from MQ, MinRank, Rank SD and PKP. 1512 - Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath:
Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin. 1513 - Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen:
Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications. 1514 - Hoeteck Wee, David J. Wu:
Succinct Vector, Polynomial, and Functional Commitments from Lattices. 1515 - Steven D. Galbraith, Trey Li:
Obfuscation of Evasive Algebraic Set Membership. 1516 - Mi-Ying (Miryam) Huang, Er-Cheng Tang:
From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty Quantum Computation with Public Verifiable Identifiable Abort. 1517 - Cheng Che, Tian Tian:
An Experimentally Verified Attack on 820-Round Trivium (Full Version). 1518 - Sigurd Eskeland:
Collusion-resistant broadcast encryption based on hidden RSA subgroups. 1519 - Kari Kostiainen, Sven Gnap, Ghassan Karame:
Censorship-Resilient and Confidential Collateralized Second-Layer Payments. 1520 - Aron Gohr, Gregor Leander, Patrick Neumann:
An Assessment of Differential-Neural Distinguishers. 1521 - Kangquan Li, Nikolay S. Kaleyski:
Two new infinite families of APN functions in triviariate form. 1522 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs. 1523 - Mor Weiss:
Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience. 1524 - Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Endemic Oblivious Transfer via Random Oracles, Revisited. 1525 - Nikolas Melissaris, Divya Ravi, Sophia Yakoubov:
Threshold-Optimal MPC With Friends and Foes. 1526 - Elie Bouscatié, Guilhem Castagnos, Olivier Sanders:
Pattern Matching in Encrypted Stream from Inner Product Encryption. 1527 - Ward Beullens:
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem. 1528 - Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh:
Key-Recovery Fault Injection Attack on the Classic McEliece KEM. 1529 - Ulrich Haböck:
Multivariate lookups based on logarithmic derivatives. 1530 - Kelong Cong, Karim Eldefrawy, Nigel P. Smart, Ben Terner:
The Key Lattice Framework for Concurrent Group Messaging. 1531 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Function-Hiding Decentralized Multi-Client Functional Encryption for Inner Products. 1532 - Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest:
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. 1533 - Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
:
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function. 1534 - Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar:
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge. 1535 - Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen:
Privacy-Preserving Blueprints. 1536 - Vasyl Ustimenko:
On Extremal Algebraic Graphs and Multivariate Cryptosystems. 1537 - Ignacio Luengo, Martin E. Avendano:
DME: a full encryption, signature and KEM multivariate public key cryptosystem. 1538 - Saumya Goyal, Varun Narayanan, Manoj Prabhakaran:
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions. 1539 - Maxime Plançon:
Exploiting algebraic structures in probing security. 1540 - Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar:
Secure Auctions in the Presence of Rational Adversaries. 1541 - Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit:
Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves (ECFFT part II). 1542 - Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi:
Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations. 1543 - Christodoulos Pappas, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, Spyros Lalis, Manolis Vavalis:
Towards Efficient Decentralized Federated Learning. 1544 - Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu:
On Structure-Preserving Cryptography and Lattices. 1545 - John Gaspoz, Siemen Dhooghe:
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms. 1546 - Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang:
A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm. 1547 - Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas:
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast. 1548 - Yingying Li, Qichun Wang:
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64. 1549 - Kaisa Nyberg:
Modifications of Bijective S-Boxes with Linear Structures. 1550 - Michele Battagliola, Riccardo Longo, Alessio Meneghetti:
Extensible Decentralized Secret Sharing and Application to Schnorr Signatures. 1551 - Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3. 1552 - Giuseppe Persiano, Kevin Yeo:
Lower Bound Framework for Differentially Private and Oblivious Data Structures. 1553 - Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias:
Executing and Proving over Dirty Ledgers. 1554 - Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven J. Watson:
Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures. 1555 - Dimitrios Sikeridis, Sean Huntley, David Ott, Michael Devetsikiotis:
Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach. 1556 - Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies:
Less is more: refinement proofs for probabilistic proofs. 1557 - Akinori Hosoyamada:
Quantum Speed-Up for Multidimensional (Zero Correlation) Linear and Integral Distinguishers. 1558 - Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take your MEDS: Digital Signatures from Matrix Code Equivalence. 1559 - Shany Ben-David, Yael Tauman Kalai, Omer Paneth:
Verifiable Private Information Retrieval. 1560 - Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Vogue: Faster Computation of Private Heavy Hitters. 1561 - Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter:
A Systematization of Voter Registration Security. 1562 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors. 1563 - Pranav Verma, Anish Mathuria, Sourish Dasgupta:
Efficient privacy preserving top-k recommendation using homomorphic sorting. 1564 - Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols:
Baloo: Nearly Optimal Lookup Arguments. 1565 - Kaisa Nyberg:
Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes. 1566 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting. 1567 - Gennaro Avitabile, Vincenzo Botta, Dario Fiore:
Extendable Threshold Ring Signatures with Enhanced Anonymity. 1568 - Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng:
DAG-Σ: A DAG-based Sigma Protocol for Relations in CNF. 1569 - Helger Lipmaa, Roberto Parisella:
Set (Non-)Membership NIZKs from Determinantal Accumulators. 1570 - Peter Gazi, Ling Ren, Alexander Russell:
Practical Settlement Bounds for Longest-Chain Consensus. 1571 - Chanki Kim, Young-Sik Kim, Jong-Seon No:
Layered ROLLO-I: Faster rank-metric code-based KEM using ideal LRPC codes. 1572 - Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu:
Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications. 1573 - Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol:
Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines. 1574 - Daniel Nager:
On lineariazation attack of entropic quasigroups cryptography. 1575 - Carla Ràfols, Alexandros Zacharakis:
Folding Schemes with Selective Verification. 1576 - Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare:
Rescue-Prime Optimized. 1577 - Fabrice Benhamouda, Shai Halevi, Lev Stambler:
Weighted Secret Sharing from Wiretap Channels. 1578 - Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu:
New Properties of Double Boomerang Connectivity Table. 1579 - Daniel J. Bernstein:
Multi-ciphertext security degradation for lattices. 1580 - Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, Mahimna Kelkar:
Truncator: Time-space Tradeoff of Cryptographic Primitives. 1581 - Rasheed Kibria, Farimah Farahmandi, Mark M. Tehranipoor:
FSMx-Ultra: Finite State Machine Extraction from Gate-Level Netlist for Security Assessment. 1582 - Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro:
Asynchronous Multi-Party Quantum Computation. 1583 - Alice Murphy, Adam O'Neill, Mohammad Zaheri:
Instantiability of Classical Random-Oracle-Model Encryption Transforms. 1584 - Kwan Yin Chan, Tsz Hon Yuen:
Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use. 1585 - Christoph U. Günther, Sourav Das, Lefteris Kokoris-Kogias:
Practical Asynchronous Proactive Secret Sharing and Key Refresh. 1586 - Fengrong Zhang, Enes Pasalic, Amar Bapic, Baocang Wang:
Applications of the indirect sum in the design of several special classes of bent functions outside the completed MM class. 1587 - Katherine E. Stange:
Factoring using multiplicative relations modulo n: a subexponential algorithm inspired by the index calculus. 1588 - Sigurd Eskeland, Ahmed Fraz Baig:
Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme. 1589 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev:
Misuse-resistant MGM2 mode. 1590 - Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi:
ISAP+: ISAP with Fast Authentication. 1591 - Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. 1592 - Melissa Chase, Michele Orrù, Trevor Perrin, Greg Zaverucha
:
Proofs of discrete logarithm equality across groups. 1593 - Pratish Datta, Tapas Pal, Katsuyuki Takashima:
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH. 1594 - Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida:
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. 1595 - Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, Antonia Wachter-Zeh:
LowMS: a new rank metric code-based KEM without ideal structure. 1596 - Markus Dichtl:
A Closer Look at a Recent Pipelined True Random Number Generator Design. 1597 - Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits. 1598 - Jiaxin Guan, Alexis Korb, Amit Sahai:
Streaming Functional Encryption. 1599 - Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal:
Secret-Shared Joins with Multiplicity from Aggregation Trees. 1600 - Geng Wang, Wenwen Xia, Gongyu Shi, Ming Wan, Yuncong Zhang, Dawu Gu:
Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium. 1601 - Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H. P. Fitzek, Najwa Aaraj:
Survey on Fully Homomorphic Encryption, Theory, and Applications. 1602 - Kok-An Pang, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani:
Slid Pairs of the Fruit-80 Stream Cipher. 1603 - Seungjun Baek, Jongsung Kim:
Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions. 1604 - Lucjan Hanzlik, Julian Loss, Sri Aravinda Krishnan Thyagarajan, Benedikt Wagner:
Sweep-UC: Swapping Coins Privately. 1605 - Mike Graf
, Ralf Küsters, Daniel Rausch:
AUC: Accountable Universal Composability. 1606 - Lawrence Roy, Jiayu Xu:
A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn't Be Considered UC-Secure). 1607 - Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam:
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup. 1608 - Avijit Dutta, Jian Guo, Eik List:
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs. 1609 - Kohtaro Watanabe, Motonari Ohtsuka, Yuta Tsukie:
ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-based McEliece Cryptosystems. 1610 - Jeff Burdges, Oana Ciobotaru, Syed Lavasani, Alistair Stewart:
Efficient Aggregatable BLS Signatures with Chaum-Pedersen Proofs. 1611 - Laasya Bangalore, Rishabh Bhadauria
, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. 1612 - Rainer Urian, Raphael Schermann:
Classic McEliece Key Generation on RAM constrained devices. 1613 - Shayan Hamidi Dehshali, Seyed Mahdi Hosseini, Soheil Zibakhsh Shabgahi, Behnam Bahrak:
Throughput Limitation of the Off-chain Payment Networks. 1614 - James Smith:
Efficient Methods for Implementation of Generalized Access Structures. 1615 - James Smith:
Secret Sharing for Generic Access Structures. 1616 - Naoki Shibayama, Yasutaka Igarashi:
A New Higher Order Differential of RAGHAV. 1617 - Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi:
Witness-Succinct Universally-Composable SNARKs. 1618 - Abel C. H. Chen:
The Performance Analysis of Post-Quantum Cryptography for Vehicular Communications. 1619 - Hart Montgomery, Jiahui Liu, Mark Zhandry:
Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More. 1620 - Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. 1621 - F. Betül Durak, Serge Vaudenay, Melissa Chase:
Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs. 1622 - David Chaum, Mario Larangeira, Mario Yaksetig:
WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership. 1623 - Evgeny K. Alekseev, Andrey Bozhko:
Algorithms for switching between block-wise and arithmetic masking. 1624 - Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Efficient Threshold FHE with Application to Real-Time Systems. 1625 - Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari:
MinRoot: Candidate Sequential Function for Ethereum VDF. 1626 - Siemen Dhooghe:
The Random Fault Model. 1627 - Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert:
Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists. 1628 - Tong Cao, Xin Li:
Temporary Block Withholding Attacks on Filecoin's Expected Consensus. 1629 - Marcel Nageler, Felix Pallua, Maria Eichlseder:
Finding Collisions for Round-Reduced Romulus-H. 1630 - Charanjit S. Jutla, Chengyu Lin:
Enhancing Ring-LWE Hardness using Dedekind Index Theorem. 1631 - Sanjam Garg
, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Cryptography with Weights: MPC, Encryption and Signatures. 1632 - Alexandre Belling, Azam Soleimanian:
Vortex : Building a Lattice-based SNARK scheme with Transparent Setup. 1633 - Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang:
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. 1634 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede:
FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption. 1635 - Dan Boneh, Chelsea Komlo:
Threshold Signatures with Private Accountability. 1636 - Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai:
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i풪. 1637 - George Teseleanu:
The Security of Quasigroups Based Substitution Permutation Networks. 1638 - Alexandre Augusto Giron, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin:
Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments. 1639 - Christina Boura, Nicolas David, Patrick Derbez
, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. 1640 - Huina Li, Guozhen Liu, Haochen Zhang, Kai Hu, Jian Guo, Weidong Qiu:
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective. 1641 - Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, Dionysis Zindros:
Proofs of Proof-of-Stake with Sublinear Complexity. 1642 - James Bartusek, Sanjam Garg
, Abhishek Jain, Guru-Vamsi Policharla:
End-to-End Secure Messaging with Traceability Only for Illegal Content. 1643 - Matvei Kotov, Alexander Treier, Ivan Buchinskiy:
An attack on a key exchange protocol based on max-times and min-times algebras. 1644 - Carlos Aguilar Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue:
The Return of the SDitH. 1645 - Matt Davison, Ken King, Trevor Miller:
Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations. 1646 - Trey Li:
Quantum Algorithm for Oracle Subset Product. 1647 - Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Nitin Singh:
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs. 1648 - Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai:
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis. 1649 - Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj:
LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. 1650 - Seunghwan Park, Chi-Gon Jung, Aesun Park, Joongeun Choi, Honggoo Kang:
TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE(R). 1651 - Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame:
Improved Universal Circuits using Lookup Tables. 1652 - Alexandre Debant, Lucca Hirschi:
Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol. 1653 - Daniele Friolo, Matteo Salvino, Daniele Venturi:
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform. 1654 - Srinivasan Raghuraman, Yibin Yang:
Just How Fair is an Unreactive World? 1655 - Dan Boneh, Aditi Partap, Lior Rotem:
Accountable Threshold Signatures with Proactive Refresh. 1656 - Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela, Kevin Bowers:
CycloneNTT: An NTT/FFT Architecture Using Quasi-Streaming of Large Datasets on DDR- and HBM-based FPGA Platforms. 1657 - Andreas Freitag:
A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity - The Perfect Revocation Method does not exist yet. 1658 - Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu:
A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers. 1659 - Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam:
Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution. 1660 - Han Wu, Guangwu Xu:
Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure. 1661 - Marta Bellés-Muñoz, Jorge Jiménez Urroz, Javier Silva:
Revisiting cycles of pairing-friendly elliptic curves. 1662 - Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Chik How Tan, Theo Fanuela Prabowo, Byung-Sun Won:
REDOG and Its Performance Analysis. 1663 - Jonghyun Kim, Jong Hwan Park:
NTRU+: Compact Construction of NTRU Using Simple Encoding Method. 1664 - Joo Woo, Kwangsu Lee, Jong Hwan Park:
GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks. 1665 - Kirill V. Vedenev, Yury V. Kosolapov:
Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem. 1666 - Jesús-Javier Chi-Domínguez:
Applying Castryck-Decru Attack on the Masked Torsion Point Images SIDH variant. 1667 - Vasyl Ustimenko:
On the families of graphs with the fastest growth of girth and their usage in cryptography. 1668 - Koksal Mus, Yarkin Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar:
Jolt: Recovering TLS Signing Keys via Rowhammer Faults. 1669 - Shoichi Hirose, Kazuhiko Minematsu:
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. 1670 - Hyunji Kim, Kyungbae Jang, Sejin Lim, Yeajun Kang, Won-Woong Kim, Hwajeong Seo:
Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers. 1671 - AoXuan Li, Gabriele D'Angelo, Jacky Tang, Frank Fang, Baron Gong:
An Auditable Confidentiality Protocol for Blockchain Transactions. 1672 - José Contreras, Hardik Gajera:
DeV-IP: A k-out-n Decentralized and verifiable BFV for Inner Product evaluation. 1673 - Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber:
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work). 1674 - Asmita Adhikary, Ileana Buhan:
SoK: Getting started with open-source fault simulation tools. 1675 - Georg Fuchsbauer, Mathias Wolf:
(Concurrently Secure) Blind Schnorr from Schnorr. 1676 - Thomas Kaeding:
Quagmire ciphers and group theory: What is a Porta cipher? 1677 - Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. 1678 - Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy:
Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting. 1679 - Julia Len, Paul Grubbs, Thomas Ristenpart:
Authenticated Encryption with Key Identification. 1680 - Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy:
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs. 1681 - Deepak Maram, Mahimna Kelkar, Ittay Eyal:
Interactive Authentication. 1682 - Sourav Das, Zhuolun Xiang, Ling Ren:
Powers of Tau in Asynchrony. 1683 - Chris Monico:
Division in the Plactic Monoid. 1684 - Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel:
CoRA: Collaborative Risk-Aware Authentication. 1685 - Ian Black, Emma McFall, Juliet Whidden, Bryant Xie, Ryann Cartor:
Practical Quantum-Safe Voting from Lattices, Extended. 1686 - Wei Dai, Tatsuaki Okamoto, Go Yamamoto:
Stronger Security and Generic Constructions for Adaptor Signatures. 1687 - Alberto Ibarrondo, Hervé Chabanne, Melek Önen:
Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation. 1688 - Yuan Tian:
Efficient Zero-Knowledge Arguments for Some Matrix Relations over Ring and Non-malleable Enhancement. 1689 - Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta
:
Private Re-Randomization for Module LWE and Applications to Quasi-Optimal ZK-SNARKs. 1690 - Cas Cremers, Charlie Jacomme, Eyal Ronen:
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation. 1691 - Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova:
Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber. 1692 - Kyoichi Asano, Keita Emura, Atsushi Takayasu:
More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model. 1693 - George Teseleanu:
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations. 1694 - Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa:
ELSA: Secure Aggregation for Federated Learning with Malicious Actors. 1695 - Varun Maram, Keita Xagawa:
Post-Quantum Anonymity of Kyber. 1696 - Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham:
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography. 1697 - Abdelhaliem Babiker:
Digital Signature from Syndrome Decoding Problem. 1698 - Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. 1699 - Manoj Srinivas Botla, Jai Bala Srujan Melam, Raja Stuthi Paul Pedapati, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath:
Comparative Study of HDL algorithms for Intrusion Detection System in Internet of Vehicles. 1700 - Mark Carney:
On Zero-Knowledge Proofs over the Quantum Internet. 1701 - Fabio Banfi:
SCB Mode: Semantically Secure Length-Preserving Encryption. 1702 - Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE. 1703 - Damien Robert:
Some applications of higher dimensional isogenies to elliptic curves (preliminary version). 1704 - Felix Günther, Marc Ilunga Tshibumbu Mukendi:
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol. 1705 - Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Hyunjun Kim, Hwajeong Seo:
Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8. 1706 - Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, Hyojae Park:
Private Access Control for Function Secret Sharing. 1707 - Alexandra Mai:
Expert Mental Models of SSI Systems and Implications for End-User Understanding. 1708 - You Zhou, Zongyang Zhang, Haibin Zhang, Sisi Duan, Bin Hu, Licheng Wang, Jianwei Liu:
Dory: Asynchronous BFT with Reduced Communication and Improved Efficiency. 1709 - Cas Cremers, Charlie Jacomme, Aurora Naska:
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations. 1710 - Seth Hoffert:
Nonce-encrypting AEAD Modes with Farfalle. 1711 - Ruben Gonzalez, Thom Wiggers:
KEMTLS vs. Post-Quantum TLS: Performance On Embedded Systems. 1712 - Elena Dubrova, Kalle Ngo, Joel Gärtner:
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste. 1713 - Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing. 1714 - Freja Elbro, Christian Majenz:
An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH Codes. 1715 - Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang:
Area-time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications. 1716 - Trevor Miller:
Scaling Blockchain-Based Tokens with Joint Cryptographic Accumulators. 1717 - Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan:
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices. 1718 - Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:
Two-Round Concurrent 2PC from Sub-Exponential LWE. 1719 - Endres Puschner, Thorben Moos, Steffen Becker
, Christian Kison, Amir Moradi, Christof Paar:
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. 1720 - Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei:
Glimpse: On-Demand, Cross-Chain Communication for Efficient DeFi Applications on Bitcoin-based Blockchains. 1721 - Michael Walter:
On Side-Channel and CVO Attacks against TFHE and FHEW. 1722 - Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen:
Asymptotically Optimal Message Dissemination with Applications to Blockchains. 1723 - Cas Cremers, Alexander Dax, Aurora Naska:
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2. 1724 - Stefan Kölbl:
A note on SPHINCS+ parameter sets. 1725 - Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry:
Optimization for SPHINCS+ using Intel Secure Hash Algorithm Extensions. 1726 - Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Find Thy Neighbourhood: Privacy-Preserving Local Clustering. 1727 - Yuan Tian:
Efficient Zero Knowledge Arguments for Bilinear Matrix Relations over Finite Fields and Knowledge-Soundness Enhancement via Operations over Extended Field. 1728 - Melissa Chase, Hannah Davis, Esha Ghosh, Kim Laine:
Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery. 1729 - Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., Swapneel Sheth:
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice. 1730 - Reham Almukhlifi, Poorvi L. Vora:
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds. 1731 - Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan:
TreeSync: Authenticated Group Management for Messaging Layer Security. 1732 - Benoît Libert, Alain Passelègue, Mahshid Riahinia:
New and Improved Constructions for Partially Equivocable Public Key Encryption. 1733 - Thomas Peyrin, Quan Quan Tan:
Mind Your Path: On (Key) Dependencies in Differential Characteristics. 1734 - Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. 1735 - Maria Corte-Real Santos, Craig Costello, Sam Frengley:
An algorithm for efficient detection of (N, N)-splittings and its application to the isogeny problem in dimension 2. 1736 - Azade Rezaeezade, Lejla Batina:
Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis. 1737 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. 1738 - Alexandra Babueva, Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Oleg Taraskin:
On blindness of several ElGamal-type blind signatures. 1739 - Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling. 1740 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors". 1741 - Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou:
A Simple Noncommutative UOV Scheme. 1742 - Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker:
Ring Signatures with User-Controlled Linkability. 1743 - Thomas Debris-Alazard, Nicolas Resch:
Worst and Average Case Hardness of Decoding via Smoothing Bounds. 1744 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography. 1745 - Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner:
Clipaha: A Scheme to Perform Password Stretching on the Client. 1746 - Adithya Vadapalli, Ryan Henry, Ian Goldberg:
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. 1747 - Pascal Lafourcade, Gaël Marcadet, Léo Robert:
RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version). 1748 - Paolo Santini, Marco Baldi, Franco Chiaraluce:
Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems. 1749 - Kévin Carrier, Yixin Shen, Jean-Pierre Tillich:
Faster Dual Lattice Attacks by Using Coding Theory. 1750 - Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard:
On The Pseudorandomness of the Decoding Problem via the Oracle Comparison Problem. 1751 - Shaza Elsharief, Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu:
IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism. 1752 - Orestis Alpos, Zhipeng Wang, Alireza Kavousi, Sze Yiu Chau, Duc Viet Le, Christian Cachin:
DSKE: Digital Signature with Key Extraction. 1753 - Zhenfei Zhang:
An SVP attack on Vortex. 1754 - Andreas Klinger
, Ulrike Meyer:
Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version). 1755 - Behzad Abdolmaleki, Daniel Slamanig:
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments. 1756 - Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld:
An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security. 1757 - Abhiram Kothapalli, Srinath T. V. Setty:
SuperNova: Proving universal machine executions without universal circuits. 1758 - Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern:
Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation. 1759 - Rachit Garg, Kristin Sheridan, Brent Waters, David J. Wu:
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation. 1760 - Umesh Kumar, V. Ch. Venkaiah:
A Family of Block Ciphers Based on Multiple Quasigroups. 1761 - Johannes Blömer, Jan Bobolz, Henrik Bröcher:
On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC. 1762 - Liam Eagen, Dario Fiore, Ariel Gabizon:
cq: Cached quotients for fast lookups. 1763 - Karim Lounis:
Wi-Fi Security: Do We Still Have to Look Back? 1764 - Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen:
Effective Network Parameter Reduction Schemes for Neural Distinguisher. 1765 - Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay:
Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs. 1766 - Orestis Alpos, Christian Cachin:
Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust. 1767 - Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake:
Continuous Group Key Agreement with Flexible Authorization and Its Applications. 1768 - Reyhaneh Rabaninejad, Bin Liu, Antonis Michalas:
PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage. 1769 - Navid Alamati, Sikhar Patranabis:
Cryptographic Primitives with Hinting Property. 1770 - Asuka Wakasugi, Mitsuru Tada:
Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms. 1771 - Min Zhang, Binbin Tu, Yu Chen:
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature. 1772 - Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais:
SoK: Decentralized Finance (DeFi) Attacks. 1773 - Manuel B. Santos:
PECO: methods to enhance the privacy of DECO protocol. 1774 - Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi:
Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols. 1775 - Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches. 1776 - Agnese Gini, Pierrick Méaux:
Weightwise perfectly balanced functions and nonlinearity. 1777 - Wyatt Howe
, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell:
Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size. 1778 - Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou:
Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators. 1779 - Cezary Glowacz:
More Efficient Key Ranking for Optimal Collision Side-Channel Attacks. 1780 - Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar, Oxana Poburinnaya, Manoj Prabhakaran:
COA-Secure Obfuscation and Applications. 1781

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.