All Papers
There is also a more detailed view with abstracts, categories, math rendering, and timestamps.
Symmetric Twin Column Parity Mixers and their Applications
Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, and Meiqin Wang
Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, and Meiqin Wang
ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors
Asmita Adhikary, Abraham J. Basurto Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, and Eloi Sanfelix Gonzalez
Asmita Adhikary, Abraham J. Basurto Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, and Eloi Sanfelix Gonzalez
Tightly-Secure Group Key Exchange with Perfect Forward Secrecy
Emanuele Di Giandomenico, Doreen Riepel, and Sven Schäge
Emanuele Di Giandomenico, Doreen Riepel, and Sven Schäge
Tweakable ForkCipher from Ideal Block Cipher
Sougata Mandal
Sougata Mandal
Carbon Footprint Traction System Incorporated as Blockchain
Umut Pekel and Oguz Yayla
Umut Pekel and Oguz Yayla
BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs
Tao Lu, Yuxun Chen, Zonghui Wang, Xiaohang Wang, Wenzhi Chen, and Jiaheng Zhang
Tao Lu, Yuxun Chen, Zonghui Wang, Xiaohang Wang, Wenzhi Chen, and Jiaheng Zhang
Another Lattice Attack Against an RSA-like Cryptosystem
George Teseleanu
George Teseleanu
Constructions of self-orthogonal codes and LCD codes from functions over finite fields
Sihem Mesnager and Ahmet SINAK
Sihem Mesnager and Ahmet SINAK
Fully Encrypted Machine Learning Protocol using Functional Encryption
Seungwan Hong, Jiseung Kim, Changmin Lee, and Minhye Seo
Seungwan Hong, Jiseung Kim, Changmin Lee, and Minhye Seo
(In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing
Wonhee Cho, Jiseung Kim, and Changmin Lee
Wonhee Cho, Jiseung Kim, and Changmin Lee
Access-Controlled Inner Product Function-Revealing Encryption
Ojaswi Acharya, Weiqi Feng, Roman Langrehr, and Adam O'Neill
Ojaswi Acharya, Weiqi Feng, Roman Langrehr, and Adam O'Neill
"There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting
Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, and Debdeep Mukhopadhyay
Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, and Debdeep Mukhopadhyay
Lova: A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation
Noel Elias
Noel Elias
A Zero-Knowledge PCP Theorem
Tom Gur, Jack O'Connor, and Nicholas Spooner
Tom Gur, Jack O'Connor, and Nicholas Spooner
Giant Does NOT Mean Strong: Cryptanalysis of BQTRU
Ali Raya, Vikas Kumar, Aditi Kar Gangopadhyay, and Sugata Gangopadhyay
Ali Raya, Vikas Kumar, Aditi Kar Gangopadhyay, and Sugata Gangopadhyay
Faster algorithms for isogeny computations over extensions of finite fields
Shiping Cai, Mingjie Chen, and Christophe Petit
Shiping Cai, Mingjie Chen, and Christophe Petit
Secure Transformer-Based Neural Network Inference for Protein Sequence Classification
Jingwei Chen, Linhan Yang, Chen Yang, Shuai Wang, Rui Li, Weijie Miao, Wenyuan Wu, Li Yang, Kang Wu, and Lizhong Dai
Jingwei Chen, Linhan Yang, Chen Yang, Shuai Wang, Rui Li, Weijie Miao, Wenyuan Wu, Li Yang, Kang Wu, and Lizhong Dai
Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication
Sönke Jendral and Elena Dubrova
Sönke Jendral and Elena Dubrova
A Linearisation Method for Identifying Dependencies in Differential Characteristics: Examining the Intersection of Deterministic Linear Relations and Nonlinear Constraints
Ling Sun
Ling Sun
Non-Interactive Zero-Knowledge Proofs with Certified Deletion
Kasra Abbaszadeh and Jonathan Katz
Kasra Abbaszadeh and Jonathan Katz
Notions of Quantum Reductions and Impossibility of Statistical NIZK
Chuhan Lu and Nikhil Pappu
Chuhan Lu and Nikhil Pappu
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy
Vadim Lyubashevsky, Gregor Seiler, and Patrick Steuer
Vadim Lyubashevsky, Gregor Seiler, and Patrick Steuer
Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off
Zhikun Wang and Ling Ren
Zhikun Wang and Ling Ren
KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies
Lorenz Panny, Christophe Petit, and Miha Stopar
Lorenz Panny, Christophe Petit, and Miha Stopar
Khatam: Reducing the Communication Complexity of Code-Based SNARKs
Hadas Zeilberger
Hadas Zeilberger
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs
Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, and Sebastian Steinhorst
Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, and Sebastian Steinhorst
Verifying Jolt zkVM Lookup Semantics
Carl Kwan, Quang Dao, and Justin Thaler
Carl Kwan, Quang Dao, and Justin Thaler
Ideal Pseudorandom Codes
Omar Alrabiah, Prabhanjan Ananth, Miranda Christ, Yevgeniy Dodis, and Sam Gunn
Omar Alrabiah, Prabhanjan Ananth, Miranda Christ, Yevgeniy Dodis, and Sam Gunn
Cryptographically Secure Digital Consent
F. Betül Durak, Abdullah Talayhan, and Serge Vaudenay
F. Betül Durak, Abdullah Talayhan, and Serge Vaudenay
Pushing the QAM method for finding APN functions further
Nadiia Ichanska, Simon Berg, Nikolay S. Kaleyski, and Yuyin Yu
Nadiia Ichanska, Simon Berg, Nikolay S. Kaleyski, and Yuyin Yu
A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme
Zichen Gui, Kenneth G. Paterson, and Sikhar Patranabis
Zichen Gui, Kenneth G. Paterson, and Sikhar Patranabis
Symmetric Encryption on a Quantum Computer
David Garvin, Oleksiy Kondratyev, Alexander Lipton, and Marco Paini
David Garvin, Oleksiy Kondratyev, Alexander Lipton, and Marco Paini
Hybrid Zero-Knowledge from Garbled Circuits
Masayuki Abe, Miguel Ambrona, and Miyako Ohkubo
Masayuki Abe, Miguel Ambrona, and Miyako Ohkubo
Scutum: Temporal Verification for Cross-Rollup Bridges via Goal-Driven Reduction
Yanju Chen, Juson Xia, Bo Wen, Kyle Charbonnet, Hongbo Wen, Hanzhi Liu, and Yu Feng
Yanju Chen, Juson Xia, Bo Wen, Kyle Charbonnet, Hongbo Wen, Hanzhi Liu, and Yu Feng
Private Neural Network Training with Packed Secret Sharing
Hengcheng Zhou
Hengcheng Zhou
How to Delete Without a Trace: Certified Deniability in a Quantum World
Alper Çakan, Vipul Goyal, and Justin Raizes
Alper Çakan, Vipul Goyal, and Justin Raizes
Fast Two-party Threshold ECDSA with Proactive Security
Brian Koziel, S. Dov Gordon, and Craig Gentry
Brian Koziel, S. Dov Gordon, and Craig Gentry
A Tight Analysis of GHOST Consistency
Peter Gaži, Zahra Motaqy, and Alexander Russell
Peter Gaži, Zahra Motaqy, and Alexander Russell
Compiled Nonlocal Games from any Trapdoor Claw-Free Function
Kaniuar Bacho, Alexander Kulpe, Giulio Malavolta, Simon Schmidt, and Michael Walter
Kaniuar Bacho, Alexander Kulpe, Giulio Malavolta, Simon Schmidt, and Michael Walter
Classic McEliece Hardware Implementation with Enhanced Side-Channel and Fault Resistance
Peizhou Gan, Prasanna Ravi, Kamal Raj, Anubhab Baksi, and Anupam Chattopadhyay
Peizhou Gan, Prasanna Ravi, Kamal Raj, Anubhab Baksi, and Anupam Chattopadhyay
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, and Ingrid Verbauwhede
Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, and Ingrid Verbauwhede
Cloning Games, Black Holes and Cryptography
Alexander Poremba, Seyoon Ragavan, and Vinod Vaikuntanathan
Alexander Poremba, Seyoon Ragavan, and Vinod Vaikuntanathan
BrakingBase - a linear prover, poly-logarithmic verifier, field agnostic polynomial commitment scheme
Vineet Nair, Ashish Sharma, and Bhargav Thankey
Vineet Nair, Ashish Sharma, and Bhargav Thankey
Constructing Dembowski–Ostrom permutation polynomials from upper triangular matrices
Yuyin Yu, Yanbin Zheng, Yongqiang Li, and Jingang Liu
Yuyin Yu, Yanbin Zheng, Yongqiang Li, and Jingang Liu
A Composability Treatment of Bitcoin's Transaction Ledger with Variable Difficulty
Juan Garay, Yun Lu, Julien Prat, Brady Testa, and Vassilis Zikas
Juan Garay, Yun Lu, Julien Prat, Brady Testa, and Vassilis Zikas
Anonymous Public-Key Quantum Money and Quantum Voting
Alper Çakan, Vipul Goyal, and Takashi Yamakawa
Alper Çakan, Vipul Goyal, and Takashi Yamakawa
SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Alivia Castor, Micah Sherr, and Muthuramakrishnan Venkitasubramaniam
Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Alivia Castor, Micah Sherr, and Muthuramakrishnan Venkitasubramaniam
On the Power of Oblivious State Preparation
James Bartusek and Dakshita Khurana
James Bartusek and Dakshita Khurana
VCVio: A Formally Verified Forking Lemma and Fiat-Shamir Transform, via a Flexible and Expressive Oracle Representation
Devon Tuma and Nicholas Hopper
Devon Tuma and Nicholas Hopper
SoK: On the Physical Security of UOV-based Signature Schemes
Thomas Aulbach, Fabio Campos, and Juliane Krämer
Thomas Aulbach, Fabio Campos, and Juliane Krämer
Improved ML-DSA Hardware Implementation With First Order Masking Countermeasure
Kamal Raj, Prasanna Ravi, Tee Kiah Chia, and Anupam Chattopadhyay
Kamal Raj, Prasanna Ravi, Tee Kiah Chia, and Anupam Chattopadhyay
Attacking Automotive RKE Security: How Smart are your ‘Smart’ Keys?
Ritul Satish, Alfred Daimari, Argha Chakrabarty, Kahaan Shah, and Debayan Gupta
Ritul Satish, Alfred Daimari, Argha Chakrabarty, Kahaan Shah, and Debayan Gupta
Succinct Randomized Encodings from Non-compact Functional Encryption, Faster and Simpler
Nir Bitansky and Rachit Garg
Nir Bitansky and Rachit Garg
SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression
Keewoo Lee and Yongdong Yeo
Keewoo Lee and Yongdong Yeo
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections
Mustafa Khairallah
Mustafa Khairallah
Batching Adaptively-Sound SNARGs for NP
Lalita Devadas, Brent Waters, and David J. Wu
Lalita Devadas, Brent Waters, and David J. Wu
Pseudorandom Function-like States from Common Haar Unitary
Minki Hhan and Shogo Yamada
Minki Hhan and Shogo Yamada
Linear Proximity Gap for Reed-Solomon Codes within the 1.5 Johnson Bound
Yiwen Gao, Haibin Kan, and Yuan Li
Yiwen Gao, Haibin Kan, and Yuan Li
Foundations of Adaptor Signatures
Paul Gerhart, Dominique Schröder, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
Paul Gerhart, Dominique Schröder, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
Breaking BASS
Simon-Philipp Merz, Kenneth G. Paterson, and Àlex Rodríguez García
Simon-Philipp Merz, Kenneth G. Paterson, and Àlex Rodríguez García
An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast
Ran Cohen, Jack Doerner, Eysa Lee, Anna Lysyanskaya, and Lawrence Roy
Ran Cohen, Jack Doerner, Eysa Lee, Anna Lysyanskaya, and Lawrence Roy
Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more
Abtin Afshar, Jiaqi Cheng, Rishab Goyal, Aayush Yadav, and Saikumar Yadugiri
Abtin Afshar, Jiaqi Cheng, Rishab Goyal, Aayush Yadav, and Saikumar Yadugiri
Smoothing Parameter and Shortest Vector Problem on Random Lattices
Amaury Pouly and Yixin Shen
Amaury Pouly and Yixin Shen
Quantum Chosen-Cipher Attack on Camellia
Yanjun Li, Qi Wang, DingYun Huang, Jian Liu, and Huiqin Xie
Yanjun Li, Qi Wang, DingYun Huang, Jian Liu, and Huiqin Xie
Siniel: Distributed Privacy-Preserving zkSNARK
Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, and Robert H. Deng
Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, and Robert H. Deng
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions
Ethan Heilman, Victor I. Kolobov, Avihu M. Levy, and Andrew Poelstra
Ethan Heilman, Victor I. Kolobov, Avihu M. Levy, and Andrew Poelstra
Investigation of the Optimal Linear Characteristics of BAKSHEESH (Full Version)
Yuxuan Peng, Jinpeng Liu, and Ling Sun
Yuxuan Peng, Jinpeng Liu, and Ling Sun
Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth
Mihail-Iulian Pleşa and Ruxandra F. Olimid
Mihail-Iulian Pleşa and Ruxandra F. Olimid
Consensus Under Adversary Majority Done Right
Srivatsan Sridhar, Ertem Nusret Tas, Joachim Neu, Dionysis Zindros, and David Tse
Srivatsan Sridhar, Ertem Nusret Tas, Joachim Neu, Dionysis Zindros, and David Tse
Quantum One-Time Protection of any Randomized Algorithm
Sam Gunn and Ramis Movassagh
Sam Gunn and Ramis Movassagh
FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels
Ruonan Chen, Ye Dong, Yizhong Liu, Tingyu Fan, Dawei Li, Zhenyu Guan, Jianwei Liu, and Jianying Zhou
Ruonan Chen, Ye Dong, Yizhong Liu, Tingyu Fan, Dawei Li, Zhenyu Guan, Jianwei Liu, and Jianying Zhou
Isogeny interpolation and the computation of isogenies from higher dimensional representations
David Jao and Jeanne Laflamme
David Jao and Jeanne Laflamme
How Fast Does the Inverse Walk Approximate a Random Permutation?
Tianren Liu, Angelos Pelecanos, Stefano Tessaro, and Vinod Vaikuntanathan
Tianren Liu, Angelos Pelecanos, Stefano Tessaro, and Vinod Vaikuntanathan
How Much Public Randomness Do Modern Consensus Protocols Need?
Joseph Bonneau, Benedikt Bünz, Miranda Christ, and Yuval Efron
Joseph Bonneau, Benedikt Bünz, Miranda Christ, and Yuval Efron
On the Jordan-Gauss graphs and new multivariate public keys
Vasyl Ustimenko, Tymoteusz Chojecki, and Aneta Wróblewska
Vasyl Ustimenko, Tymoteusz Chojecki, and Aneta Wróblewska
Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture
Ischa Stork, Vipul Arora, Łukasz Chmielewski, and Ileana Buhan
Ischa Stork, Vipul Arora, Łukasz Chmielewski, and Ileana Buhan
Discrete gaussian sampling for BKZ-reduced basis
Amaury Pouly and Yixin Shen
Amaury Pouly and Yixin Shen
Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing
Yu Dai, Debiao He, Dmitrii Koshelev, Cong Peng, and Zhijian Yang
Yu Dai, Debiao He, Dmitrii Koshelev, Cong Peng, and Zhijian Yang
Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions
Alberto Maria Mongardini, Daniele Friolo, and Giuseppe Ateniese
Alberto Maria Mongardini, Daniele Friolo, and Giuseppe Ateniese
Advanced Transparency System
Yuxuan Sun, Yuncong Hu, and Yu Yu
Yuxuan Sun, Yuncong Hu, and Yu Yu
An Efficient and Secure Boolean Function Evaluation Protocol
Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, and Sumit Kumar Debnath
Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, and Sumit Kumar Debnath
Black-Box Timed Commitments from Time-Lock Puzzles
Hamza Abusalah and Gennaro Avitabile
Hamza Abusalah and Gennaro Avitabile
A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire
John Bostanci, Barak Nehoran, and Mark Zhandry
John Bostanci, Barak Nehoran, and Mark Zhandry
Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions
Yuyu Wang, Chuanjie Su, and Jiaxin Pan
Yuyu Wang, Chuanjie Su, and Jiaxin Pan
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications
Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, and Jian Weng
Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, and Jian Weng
Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
Liron David, Avinatan Hassidim, Yossi Matias, and Moti Yung
Liron David, Avinatan Hassidim, Yossi Matias, and Moti Yung
New results in Share Conversion, with applications to evolving access structures
Tamar Ben David, Varun Narayanan, Olga Nissenbaum, and Anat Paskin-Cherniavsky
Tamar Ben David, Varun Narayanan, Olga Nissenbaum, and Anat Paskin-Cherniavsky
ABE for Circuits with $\mathsf{poly}(\lambda)$-sized Keys from LWE
Valerio Cini and Hoeteck Wee
Valerio Cini and Hoeteck Wee
Ciphertext-Policy ABE from Inner-Product FE
Ahmad Khoureich Ka
Ahmad Khoureich Ka
Construction of quadratic APN functions with coefficients in $\mathbb{F}_2$ in dimensions $10$ and $11$
Yuyin Yu, Jingchen Li, Nadiia Ichanska, and Nikolay Kaleyski
Yuyin Yu, Jingchen Li, Nadiia Ichanska, and Nikolay Kaleyski
Masking Gaussian Elimination at Arbitrary Order, with Application to Multivariate- and Code-Based PQC
Quinten Norga, Suparna Kundu, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar, and Ingrid Verbauwhede
Quinten Norga, Suparna Kundu, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar, and Ingrid Verbauwhede
An efficient collision attack on Castryck-Decru-Smith’s hash function
Ryo Ohashi and Hiroshi Onuki
Ryo Ohashi and Hiroshi Onuki
zkMarket : Privacy-preserving Digital Data Trade System via Blockchain
Seungwoo Kim, Semin Han, Seongho Park, Kyeongtae Lee, Jihye Kim, and Hyunok Oh
Seungwoo Kim, Semin Han, Seongho Park, Kyeongtae Lee, Jihye Kim, and Hyunok Oh
PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting
Jingyu Li, Zhicong Huang, Min Zhang, Jian Liu, Cheng Hong, Tao Wei, and Wenguang Chen
Jingyu Li, Zhicong Huang, Min Zhang, Jian Liu, Cheng Hong, Tao Wei, and Wenguang Chen
Universal Adaptor Signatures from Blackbox Multi-Party Computation
Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, and Vassilis Zikas
Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, and Vassilis Zikas
Byte-wise equal property of ARADI
Sunyeop Kim, Insung Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, and Seokhie Hong
Sunyeop Kim, Insung Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, and Seokhie Hong
PRIME: Differentially Private Distributed Mean Estimation with Malicious Security
Laasya Bangalore, Albert Cheu, and Muthuramakrishnan Venkitasubramaniam
Laasya Bangalore, Albert Cheu, and Muthuramakrishnan Venkitasubramaniam
Improved Attacks for SNOVA by Exploiting Stability under a Group Action
Daniel Cabarcas, Peigen Li, Javier Verbel, and Ricardo Villanueva-Polanco
Daniel Cabarcas, Peigen Li, Javier Verbel, and Ricardo Villanueva-Polanco
A Closer Look at Falcon
Phillip Gajland, Jonas Janneck, and Eike Kiltz
Phillip Gajland, Jonas Janneck, and Eike Kiltz
Push-Button Verification for BitVM Implementations
Hanzhi Liu, Jingyu Ke, Hongbo Wen, Robin Linus, Lukas George, Manish Bista, Hakan Karakuş, Domo, Junrui Liu, Yanju Chen, and Yu Feng
Hanzhi Liu, Jingyu Ke, Hongbo Wen, Robin Linus, Lukas George, Manish Bista, Hakan Karakuş, Domo, Junrui Liu, Yanju Chen, and Yu Feng
ECPM Cryptanalysis Resource Estimation
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho, and Howon Kim
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho, and Howon Kim
Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments
Masayuki Abe, David Balbás, Dung Bui, Miyako Ohkubo, Zehua Shang, and Mehdi Tibouchi
Masayuki Abe, David Balbás, Dung Bui, Miyako Ohkubo, Zehua Shang, and Mehdi Tibouchi
Compact and Tightly Secure (Anonymous) IBE from Module LWE in the QROM
Toi Tomita and Junji Shikata
Toi Tomita and Junji Shikata
Fully Homomorphic Encryption with Efficient Public Verification
Mi-Ying (Miryam) Huang, Baiyu Li, Xinyu Mao, and Jiapeng Zhang
Mi-Ying (Miryam) Huang, Baiyu Li, Xinyu Mao, and Jiapeng Zhang
Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions
Gorjan Alagic, Dana Dachman-Soled, Manasi Shingane, and Patrick Struck
Gorjan Alagic, Dana Dachman-Soled, Manasi Shingane, and Patrick Struck
Homomorphic Matrix Operations under Bicyclic Encoding
Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, and Yong Feng
Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, and Yong Feng
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing
Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, and Zhenfeng Zhang
Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, and Zhenfeng Zhang
Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN
Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Kalai, and Vinod Vaikuntanathan
Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Kalai, and Vinod Vaikuntanathan
A Forgery Attack on a Code-based Signature Scheme
Ali Babaei and Taraneh Eghlidos
Ali Babaei and Taraneh Eghlidos
A comprehensive analysis of Regev's quantum algorithm
Razvan Barbulescu, Mugurel Barcau, and Vicentiu Pasol
Razvan Barbulescu, Mugurel Barcau, and Vicentiu Pasol
On the Sample Complexity of Linear Code Equivalence for all Code Rates
Alessandro Budroni and Andrea Natale
Alessandro Budroni and Andrea Natale
$\mathsf{Graphiti}$: Secure Graph Computation Made More Scalable
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal
Exponential sums in linear cryptanalysis
Tim Beyne and Clémence Bouvier
Tim Beyne and Clémence Bouvier
PQNTRU: Acceleration of NTRU-based Schemes via Customized Post-Quantum Processor
Zewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C.C. Cheung, and Kejie Huang
Zewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C.C. Cheung, and Kejie Huang
HTCNN: High-Throughput Batch CNN Inference with Homomorphic Encryption for Edge Computing
Zewen Ye, Tianshun Huang, Tianyu Wang, Yonggen Li, Chengxuan Wang, Ray C.C. Cheung, and Kejie Huang
Zewen Ye, Tianshun Huang, Tianyu Wang, Yonggen Li, Chengxuan Wang, Ray C.C. Cheung, and Kejie Huang
DEEP Commitments and Their Applications
Alan Szepieniec
Alan Szepieniec
Offline-Online Indifferentiability of Cryptographic Systems
Ashrujit Ghoshal, Ilan Komargodski, and Gil Segev
Ashrujit Ghoshal, Ilan Komargodski, and Gil Segev
Robust Double Auctions for Resource Allocation
Arthur Lazzaretti, Charalampos Papamanthou, and Ismael Hishon-Rezaizadeh
Arthur Lazzaretti, Charalampos Papamanthou, and Ismael Hishon-Rezaizadeh
Revisiting the “improving the security of multi-party quantum key agreement with five- qubit Brown states”
Yu-Yuan Chou, Hsien-Hung Liu, and Jue-Sam Chou
Yu-Yuan Chou, Hsien-Hung Liu, and Jue-Sam Chou
New Experimental Evidences For the Riemann Hypothesis
Zhengjun Cao
Zhengjun Cao
POMS : Proxy Offloading for Multicloud Storage with Keyword Search
Adam Oumar Abdel-Rahman, Sofiane Azogagh, Zelma Aubin Birba, and Arthur Tran Van
Adam Oumar Abdel-Rahman, Sofiane Azogagh, Zelma Aubin Birba, and Arthur Tran Van
Secure and Privacy-preserving CBDC Offline Payments using a Secure Element
Elli Androulaki, Angelo De Caro, Kaoutar El Khiyaoui, Romain Gay, Rebekah Mercer, and Alessandro Sorniotti
Elli Androulaki, Angelo De Caro, Kaoutar El Khiyaoui, Romain Gay, Rebekah Mercer, and Alessandro Sorniotti
Pseudorandomness in the (Inverseless) Haar Random Oracle Model
Prabhanjan Ananth, John Bostanci, Aditya Gulati, and Yao-Ting Lin
Prabhanjan Ananth, John Bostanci, Aditya Gulati, and Yao-Ting Lin
PEARL-SCALLOP: Parameter Extension Applicable in Real-Life SCALLOP
Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, Aurel Page, Renate Scheidler, and Márton Tot Bagi
Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, Aurel Page, Renate Scheidler, and Márton Tot Bagi
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs
Emanuele Bellini, David GERAULT, Juan Grados, and Thomas Peyrin
Emanuele Bellini, David GERAULT, Juan Grados, and Thomas Peyrin
Pseudorandom Obfuscation and Applications
Pedro Branco, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, and Vinod Vaikuntanathan
Pedro Branco, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, and Vinod Vaikuntanathan
The Learning Stabilizers with Noise problem
Alexander Poremba, Yihui Quek, and Peter Shor
Alexander Poremba, Yihui Quek, and Peter Shor
OpenNTT: An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Florian Krieger, Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
Florian Krieger, Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
Provably Robust Watermarks for Open-Source Language Models
Miranda Christ, Sam Gunn, Tal Malkin, and Mariana Raykova
Miranda Christ, Sam Gunn, Tal Malkin, and Mariana Raykova
More Efficient Isogeny Proofs of Knowledge via Canonical Modular Polynomials
Thomas den Hollander, Sören Kleine, Marzio Mula, Daniel Slamanig, and Sebastian A. Spindler
Thomas den Hollander, Sören Kleine, Marzio Mula, Daniel Slamanig, and Sebastian A. Spindler
Embedded Curves and Embedded Families for SNARK-Friendly Curves
Aurore Guillevic and Simon Masson
Aurore Guillevic and Simon Masson
A graph-theoretic approach to analyzing decoding failures of BIKE
Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, and Angela Robinson
Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, and Angela Robinson
The Mysteries of LRA: Roots and Progresses in Side-channel Applications
Jiangshan Long, Changhai Ou, Zhu Wang, and Fan Zhang
Jiangshan Long, Changhai Ou, Zhu Wang, and Fan Zhang
Optimizing Message Range and Ciphertext Storage in GSW Encryption Using CRT and PVW-like Compression Scheme
Kung-Wei Hu, Huan-Chih Wang, and Ja-Ling Wu
Kung-Wei Hu, Huan-Chih Wang, and Ja-Ling Wu
One Time Pad and the Short Key Dream
Umberto Cerruti
Umberto Cerruti
Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3
Sabrina Kunzweiler, Luciano Maino, Tomoki Moriya, Christophe Petit, Giacomo Pope, Damien Robert, Miha Stopar, and Yan Bo Ti
Sabrina Kunzweiler, Luciano Maino, Tomoki Moriya, Christophe Petit, Giacomo Pope, Damien Robert, Miha Stopar, and Yan Bo Ti
Arc: Accumulation for Reed--Solomon Codes
Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, and William Wang
Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, and William Wang
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
Aikata Aikata and Sujoy Sinha Roy
Aikata Aikata and Sujoy Sinha Roy
cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications
Supriya Adhikary, Wai Kong Lee, Angshuman Karmakar, Yongwoo Lee, Seong Oun Hwang, and Ramachandra Achar
Supriya Adhikary, Wai Kong Lee, Angshuman Karmakar, Yongwoo Lee, Seong Oun Hwang, and Ramachandra Achar
On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures
Yuuki Fujita, Yusuke Sakai, Kyosuke Yamashita, and Goichiro Hanaoka
Yuuki Fujita, Yusuke Sakai, Kyosuke Yamashita, and Goichiro Hanaoka
(Quantum) Indifferentiability and Pre-Computation
Joseph Carolan, Alexander Poremba, and Mark Zhandry
Joseph Carolan, Alexander Poremba, and Mark Zhandry
Certified Randomness implies Secure Classical Position-Verification
Omar Amer, Kaushik Chakraborty, David Cui, Fatih Kaleoglu, Charles Lim, Minzhao Liu, and Marco Pistoia
Omar Amer, Kaushik Chakraborty, David Cui, Fatih Kaleoglu, Charles Lim, Minzhao Liu, and Marco Pistoia
PISA: Privacy-Preserving Smart Parking
Sayon Duttagupta and Dave Singelée
Sayon Duttagupta and Dave Singelée
Straight-Line Knowledge Extraction for Multi-Round Protocols
Lior Rotem and Stefano Tessaro
Lior Rotem and Stefano Tessaro
Proving the Security of the Extended Summation-Truncation Hybrid
Avijit Dutta and Eik List
Avijit Dutta and Eik List
Revisiting Fermat's Factorization Method
Gajraj Kuldeep and Rune Hylsberg Jacobsen
Gajraj Kuldeep and Rune Hylsberg Jacobsen
An Efficient Noncommutative NTRU from Semidirect Product
Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay, Sugata Gangopadhyay, and Md Tarique Hussain
Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay, Sugata Gangopadhyay, and Md Tarique Hussain
Pseudorandom Multi-Input Functional Encryption and Applications
Shweta Agrawal, Simran Kumari, and Shota Yamada
Shweta Agrawal, Simran Kumari, and Shota Yamada
Compact Pseudorandom Functional Encryption from Evasive LWE
Shweta Agrawal, Simran Kumari, and Shota Yamada
Shweta Agrawal, Simran Kumari, and Shota Yamada
Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes
Olivier Bernard, Marc Joye, Nigel P. Smart, and Michael Walter
Olivier Bernard, Marc Joye, Nigel P. Smart, and Michael Walter
Practical Asynchronous MPC from Lightweight Cryptography
Atsuki Momose
Atsuki Momose
Rate-1 Statistical Non-Interactive Zero-Knowledge
Pedro Branco, Nico Döttling, and Akshayaram Srinivasan
Pedro Branco, Nico Döttling, and Akshayaram Srinivasan
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
Haiyue Dong and Qian Guo
Haiyue Dong and Qian Guo
Theoretical Approaches to Solving the Shortest Vector Problem in NP-Hard Lattice-Based Cryptography with Post-SUSY Theories of Quantum Gravity in Polynomial Time
Trevor Nestor
Trevor Nestor
Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler
Megan Chen, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, and Swagata Sasmal
Megan Chen, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, and Swagata Sasmal
Low-Communication Updatable PSI from Asymmetric PSI and PSU
Guowei Ling, Peng Tang, and Weidong Qiu
Guowei Ling, Peng Tang, and Weidong Qiu
Good things come to those who wait: Dishonest-Majority Coin-Flipping Requires Delay Functions
Joseph Bonneau, Benedikt Bünz, Miranda Christ, and Yuval Efron
Joseph Bonneau, Benedikt Bünz, Miranda Christ, and Yuval Efron
$\widetilde{\mbox{O}}$ptimal Adaptively Secure Hash-based Asynchronous Common Subset
Hanwen Feng, Zhenliang Lu, and Qiang Tang
Hanwen Feng, Zhenliang Lu, and Qiang Tang
Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences
Xiuhan Lin, Mehdi Tibouchi, Yang Yu, and Shiduo Zhang
Xiuhan Lin, Mehdi Tibouchi, Yang Yu, and Shiduo Zhang
Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption
Amine Bahi, Seny Kamara, Tarik Moataz, and Guevara Noubir
Amine Bahi, Seny Kamara, Tarik Moataz, and Guevara Noubir
CountCrypt: Quantum Cryptography between QCMA and PP
Eli Goldin, Tomoyuki Morimae, Saachi Mutreja, and Takashi Yamakawa
Eli Goldin, Tomoyuki Morimae, Saachi Mutreja, and Takashi Yamakawa
State of the art of HFE variants Is it possible to repair HFE with appropriate perturbations?
Benoit COGLIATI, Gilles Macariot-Rat, Jacques Patarin, and Pierre Varjabedian
Benoit COGLIATI, Gilles Macariot-Rat, Jacques Patarin, and Pierre Varjabedian
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience
Yuan Su, Yuan Lu, Jiliang Li, Yuyi Wang, Chengyi Dong, and Qiang Tang
Yuan Su, Yuan Lu, Jiliang Li, Yuyi Wang, Chengyi Dong, and Qiang Tang
From One-Time to Two-Round Reusable Multi-Signatures without Nested Forking
Lior Rotem, Gil Segev, and Eylon Yogev
Lior Rotem, Gil Segev, and Eylon Yogev
Free-XOR Gate Bootstrapping
Chunling Chen, Xianhui Lu, Ruida Wang, Zhihao Li, Xuan Shen, and Benqiang Wei
Chunling Chen, Xianhui Lu, Ruida Wang, Zhihao Li, Xuan Shen, and Benqiang Wei
Secure and efficient transciphering for FHE-based MPC
Diego F. Aranha, Antonio Guimarães, Clément Hoffmann, and Pierrick Méaux
Diego F. Aranha, Antonio Guimarães, Clément Hoffmann, and Pierrick Méaux
Secure Computation with Parallel Calls to 2-ary Functions
Varun Narayanan, Shubham Vivek Pawar, and Akshayaram Srinivasan
Varun Narayanan, Shubham Vivek Pawar, and Akshayaram Srinivasan
Does quantum lattice sieving require quantum RAM?
Beomgeun Cho, Minki Hhan, Taehyun Kim, Jeonghoon Lee, and Yixin Shen
Beomgeun Cho, Minki Hhan, Taehyun Kim, Jeonghoon Lee, and Yixin Shen
HADES: Range-Filtered Private Aggregation on Public Data
Xiaoyuan Liu, Ni Trieu, Trinabh Gupta, Ishtiyaque Ahmad, and Dawn Song
Xiaoyuan Liu, Ni Trieu, Trinabh Gupta, Ishtiyaque Ahmad, and Dawn Song
Computational Analysis of Plausibly Post-Quantum-Secure Recursive Arguments of Knowledge
Dustin Ray and Paulo L. Barreto
Dustin Ray and Paulo L. Barreto
On pairing-friendly 2-cycles and SNARK-friendly 2-chains of elliptic curves containing a curve from a prime-order family
Tomáš Novotný
Tomáš Novotný
Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security
Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Yang Yu, and Dawu Gu
Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Yang Yu, and Dawu Gu
Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians
Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, and Dawu Gu
Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, and Dawu Gu
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, and Vincent Grosso
Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, and Vincent Grosso
A notion on S-boxes for a partial resistance to some integral attacks
Claude Carlet
Claude Carlet
On the practicality of quantum sieving algorithms for the shortest vector problem
Joao F. Doriguello, George Giapitzakis, Alessandro Luongo, and Aditya Morolia
Joao F. Doriguello, George Giapitzakis, Alessandro Luongo, and Aditya Morolia
A Framework for Group Action-Based Multi-Signatures and Applications to LESS, MEDS, and ALTEQ
Giuseppe D'Alconzo, Andrea Flamini, Alessio Meneghetti, and Edoardo Signorini
Giuseppe D'Alconzo, Andrea Flamini, Alessio Meneghetti, and Edoardo Signorini
A Note on Security Definitions for Secret Sharing with Certified Deletion
Dominique Bazin and Ryo Nishimaki
Dominique Bazin and Ryo Nishimaki
Homomorphic Encryption with Authority
Joohee Lee and Joon-Woo Lee
Joohee Lee and Joon-Woo Lee
Revisiting Products of the Form $X$ Times a Linearized Polynomial $L(X)$
Christof Beierle
Christof Beierle
Revocable Encryption, Programs, and More: The Case of Multi-Copy Security
Prabhanjan Ananth, Saachi Mutreja, and Alexander Poremba
Prabhanjan Ananth, Saachi Mutreja, and Alexander Poremba
Circular Insecure Encryption: from Long Cycles to Short Cycles
Zehou Wu
Zehou Wu
GAPP: Generic Aggregation of Polynomial Protocols
Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, and Nitin Singh
Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, and Nitin Singh
Blind zkSNARKs for Private Proof Delegation and Verifiable Computation over Encrypted Data
Mariana Gama, Emad Heydari Beni, Jiayi Kang, Jannik Spiessens, and Frederik Vercauteren
Mariana Gama, Emad Heydari Beni, Jiayi Kang, Jannik Spiessens, and Frederik Vercauteren
Unclonable Functional Encryption
Arthur Mehta and Anne Müller
Arthur Mehta and Anne Müller
Toward Optimal-Complexity Hash-Based Asynchronous MVBA with Optimal Resilience
Jovan Komatovic, Joachim Neu, and Tim Roughgarden
Jovan Komatovic, Joachim Neu, and Tim Roughgarden
Another L makes it better? Lagrange meets LLL and may improve BKZ pre-processing
Sebastien Balny, Claire Delaplace, and Gilles Dequen
Sebastien Balny, Claire Delaplace, and Gilles Dequen
Sunfish: Reading Ledgers with Sparse Nodes
Giulia Scaffino, Karl Wüst, Deepak Maram, Alberto Sonnino, and Lefteris Kokoris-Kogias
Giulia Scaffino, Karl Wüst, Deepak Maram, Alberto Sonnino, and Lefteris Kokoris-Kogias
Information Set Decoding for Ring-Linear Code
Giulia Cavicchioni, Alessio Meneghetti, and Giovanni Tognolini
Giulia Cavicchioni, Alessio Meneghetti, and Giovanni Tognolini
Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis
Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, and Lukas Stennes
Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, and Lukas Stennes
Batch Range Proof: How to Make Threshold ECDSA More Efficient
Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, and Ying Yan
Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, and Ying Yan
The Sting Framework: Proving the Existence of Superclass Adversaries
Mahimna Kelkar, Yunqi Li, Nerla Jean-Louis, Carolina Ortega Pérez, Kushal Babel, Andrew Miller, and Ari Juels
Mahimna Kelkar, Yunqi Li, Nerla Jean-Louis, Carolina Ortega Pérez, Kushal Babel, Andrew Miller, and Ari Juels
Testing Robustness of Homomorphically Encrypted Split Model LLMs
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard
Alexandra Boldyreva, Virendra Kumar, and Jiahao Sun
Alexandra Boldyreva, Virendra Kumar, and Jiahao Sun
Proteus: A Fully Homomorphic Authenticated Transciphering Protocol
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
New Strategies for Bootstrapping Large-Error Ciphertext in Large-Precision FHEW/TFHE Cryptosystem
Hongbo Li, Dengfa Liu, and Guangsheng Ma
Hongbo Li, Dengfa Liu, and Guangsheng Ma
Multi-party Setup Ceremony for Generating Tokamak zk-SNARK Parameters
Muhammed Ali Bingol
Muhammed Ali Bingol
Statistical Layered MPC
Giovanni Deligios, Anders Konring, Chen-Da Liu-Zhang, and Varun Narayanan
Giovanni Deligios, Anders Konring, Chen-Da Liu-Zhang, and Varun Narayanan
The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys
Samed Düzlü and Patrick Struck
Samed Düzlü and Patrick Struck
Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures
Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, and Mukul Kulkarni
Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, and Mukul Kulkarni
Overlapped Bootstrapping for FHEW/TFHE and Its Application to SHA3
Deokhwa Hong, Youngjin Choi, Yongwoo Lee, and Young-Sik Kim
Deokhwa Hong, Youngjin Choi, Yongwoo Lee, and Young-Sik Kim
Concretely Efficient Asynchronous MPC from Lightweight Cryptography
Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, and Yifan Song
Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, and Yifan Song
DMM: Distributed Matrix Mechanism for Differentially-Private Federated Learning using Packed Secret Sharing
Alexander Bienstock, Ujjwal Kumar, and Antigoni Polychroniadou
Alexander Bienstock, Ujjwal Kumar, and Antigoni Polychroniadou
Consensus on SNARK pre-processed circuit polynomials
Jehyuk Jang
Jehyuk Jang
A Hidden-Bits Approach to Black-Box Statistical ZAPs from LWE
Eli Bradley, George Lu, Shafik Nassar, Brent Waters, and David J. Wu
Eli Bradley, George Lu, Shafik Nassar, Brent Waters, and David J. Wu
Composability in Watermarking Schemes
Jiahui Liu and Mark Zhandry
Jiahui Liu and Mark Zhandry
zkFFT: Extending Halo2 with Vector Commitments & More
Aram Jivanyan, Gohar Hovhannisyan, Hayk Hovhannisyan, and Nerses Asaturyan
Aram Jivanyan, Gohar Hovhannisyan, Hayk Hovhannisyan, and Nerses Asaturyan
A Note on the Hint in the Dilithium Digital Signature Scheme
Amit Berman, Ariel Doubchak, and Noam Livne
Amit Berman, Ariel Doubchak, and Noam Livne
Instance Compression, Revisited
Gal Arnon, Shany Ben-David, and Eylon Yogev
Gal Arnon, Shany Ben-David, and Eylon Yogev
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Guy Zyskind, Avishay Yanai, and Alex "Sandy" Pentland
Guy Zyskind, Avishay Yanai, and Alex "Sandy" Pentland
Securely Computing One-Sided Matching Markets
James Hsin-Yu Chiang, Ivan Damgård, Claudio Orlandi, Mahak Pancholi, and Mark Simkin
James Hsin-Yu Chiang, Ivan Damgård, Claudio Orlandi, Mahak Pancholi, and Mark Simkin
Optimal Early Termination for Dishonest Majority Broadcast
Giovanni Deligios, Ivana Klasovita, and Chen-Da Liu-Zhang
Giovanni Deligios, Ivana Klasovita, and Chen-Da Liu-Zhang
Secure Stateful Aggregation: A Practical Protocol with Applications in Differentially-Private Federated Learning
Marshall Ball, James Bell-Clark, Adria Gascon, Peter Kairouz, Sewoong Oh, and Zhiye Xie
Marshall Ball, James Bell-Clark, Adria Gascon, Peter Kairouz, Sewoong Oh, and Zhiye Xie
$\Sigma$-Check: Compressed $\Sigma$-protocol Theory from Sum-check
Shang Gao, Chen Qian, Tianyu Zheng, Yu Guo, and Bin Xiao
Shang Gao, Chen Qian, Tianyu Zheng, Yu Guo, and Bin Xiao
AD-MPC: Fully Asynchronous Dynamic MPC with Guaranteed Output Delivery
Wenxuan Yu, Minghui Xu, Bing Wu, Sisi Duan, and Xiuzhen Cheng
Wenxuan Yu, Minghui Xu, Bing Wu, Sisi Duan, and Xiuzhen Cheng
How to Construct Random Unitaries
Fermi Ma and Hsin-Yuan Huang
Fermi Ma and Hsin-Yuan Huang
One-Shot Native Proofs of Non-Native Operations in Incrementally Verifiable Computations
Tohru Kohrita, Patrick Towa, and Zachary J. Williamson
Tohru Kohrita, Patrick Towa, and Zachary J. Williamson
Towards Practical Oblivious Map
Xinle Cao, Weiqi Feng, Jian Liu, Jinjin Zhou, Wenjing Fang, Lei Wang, Quanqing Xu, Chuanhui Yang, and Kui Ren
Xinle Cao, Weiqi Feng, Jian Liu, Jinjin Zhou, Wenjing Fang, Lei Wang, Quanqing Xu, Chuanhui Yang, and Kui Ren
Multiplying Polynomials without Powerful Multiplication Instructions (Long Paper)
Vincent Hwang, YoungBeom Kim, and Seog Chung Seo
Vincent Hwang, YoungBeom Kim, and Seog Chung Seo
SIMD-style Sorting of Integer Sequence in RLWE Ciphertext
Zijing Li, Hongbo Li, and Zhengyang Wang
Zijing Li, Hongbo Li, and Zhengyang Wang
Curve Forests: Transparent Zero-Knowledge Set Membership with Batching and Strong Security
Matteo Campanelli, Mathias Hall-Andersen, and Simon Holmgaard Kamp
Matteo Campanelli, Mathias Hall-Andersen, and Simon Holmgaard Kamp
Transaction Execution Mechanisms
Abdoulaye Ndiaye
Abdoulaye Ndiaye
Fiat-Shamir Goes Rational
Matteo Campanelli and Agni Datta
Matteo Campanelli and Agni Datta
A Tight Lower Bound on the TdScrypt Trapdoor Memory-Hard Function
Jeremiah Blocki and Seunghoon Lee
Jeremiah Blocki and Seunghoon Lee
Optimizing Liveness for Blockchain-Based Sealed-Bid Auctions in Rational Settings
Maozhou Huang, Xiangyu Su, Mario Larangeira, and Keisuke Tanaka
Maozhou Huang, Xiangyu Su, Mario Larangeira, and Keisuke Tanaka
Fuzzy PSI via Oblivious Protocol Routing
David Richardson, Mike Rosulek, and Jiayu Xu
David Richardson, Mike Rosulek, and Jiayu Xu
Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS
Yuting Xiao, Rui Zhang, and Hong-Sheng Zhou
Yuting Xiao, Rui Zhang, and Hong-Sheng Zhou
Efficient Quantum Pseudorandomness from Hamiltonian Phase States
John Bostanci, Jonas Haferkamp, Dominik Hangleiter, and Alexander Poremba
John Bostanci, Jonas Haferkamp, Dominik Hangleiter, and Alexander Poremba
Modular Reduction in CKKS
Jaehyung Kim and Taeyeong Noh
Jaehyung Kim and Taeyeong Noh
Bootstrapping Small Integers With CKKS
Youngjin Bae, Jaehyung Kim, Damien Stehlé, and Elias Suvanto
Youngjin Bae, Jaehyung Kim, Damien Stehlé, and Elias Suvanto
Quantum State Group Actions
Saachi Mutreja and Mark Zhandry
Saachi Mutreja and Mark Zhandry
RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs
Tomer Ashur and Sundas Tariq
Tomer Ashur and Sundas Tariq
On Constructing Pseudorandom Involutions: Feistel variants using a single round function
Chun Guo, Meiqin Wang, and Weijia Wang
Chun Guo, Meiqin Wang, and Weijia Wang
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware
Aein Rezaei Shahmirzadi and Michael Hutter
Aein Rezaei Shahmirzadi and Michael Hutter
Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices
Hirotomo Shinoki, Hisayoshi Sato, and Masayuki Yoshino
Hirotomo Shinoki, Hisayoshi Sato, and Masayuki Yoshino
Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees
Christodoulos Pappas and Dimitrios Papadopoulos
Christodoulos Pappas and Dimitrios Papadopoulos
Hybrid Password Authentication Key Exchange in the UC Framework
You Lyu and Shengli Liu
You Lyu and Shengli Liu
Efficient Key-Switching for Word-Type FHE and GPU Acceleration
Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, and Wangchen Dai
Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, and Wangchen Dai
Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security
Renas Bacho, Sourav Das, Julian Loss, and Ling Ren
Renas Bacho, Sourav Das, Julian Loss, and Ling Ren
Lollipops of pairing-friendly elliptic curves for composition of proof systems
Craig Costello and Gaurish Korpal
Craig Costello and Gaurish Korpal
Faster Proofs and VRFs from Isogenies
Shai Levin and Robi Pedersen
Shai Levin and Robi Pedersen
On the Tight Security of the Double Ratchet
Daniel Collins, Doreen Riepel, and Si An Oliver Tran
Daniel Collins, Doreen Riepel, and Si An Oliver Tran
Double-Matrix: Complete Diffusion in a Single Round with (small) MDS Matrices
Jorge Nakahara Jr
Jorge Nakahara Jr
General Functional Bootstrapping using CKKS
Andreea Alexandru, Andrey Kim, and Yuriy Polyakov
Andreea Alexandru, Andrey Kim, and Yuriy Polyakov
A New Approach Towards Encrypted Data Sharing and Computation: Enhancing Efficiency Beyond MPC and Multi-Key FHE
Anil Kumar Pradhan
Anil Kumar Pradhan
PAKE Combiners and Efficient Post-Quantum Instantiations
Julia Hesse and Michael Rosenberg
Julia Hesse and Michael Rosenberg
Really Complex Codes with Application to STARKs
Yuval Domb
Yuval Domb
Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications
Stephan Krenn, Omid Mir, and Daniel Slamanig
Stephan Krenn, Omid Mir, and Daniel Slamanig
Shaking up authenticated encryption
Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, and Ronny Van Keer
Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, and Ronny Van Keer
Algebraic Equipage for Learning with Errors in Cyclic Division Algebras
Cong Ling and Andrew Mendelsohn
Cong Ling and Andrew Mendelsohn
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem
Jonas Hofmann and Kien Tuong Truong
Jonas Hofmann and Kien Tuong Truong
LeOPaRd: Towards Practical Post-Quantum Oblivious PRFs via Interactive Lattice Problems
Muhammed F. Esgin, Ron Steinfeld, Erkan Tairi, and Jie Xu
Muhammed F. Esgin, Ron Steinfeld, Erkan Tairi, and Jie Xu
Related-Key Cryptanalysis of FUTURE
Amit Jana, Smita Das, Ayantika Chatterjee, and Debdeep Mukhopadhyay
Amit Jana, Smita Das, Ayantika Chatterjee, and Debdeep Mukhopadhyay
Efficient Maliciously Secure Oblivious Exponentiations
Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, and Yu Yu
Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, and Yu Yu
On Wagner's k-Tree Algorithm Over Integers
Haoxing Lin and Prashant Nalini Vasudevan
Haoxing Lin and Prashant Nalini Vasudevan
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference
Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, and Wei Wang
Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, and Wei Wang
Secret Sharing with Snitching
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, and Marcin Mielniczuk
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, and Marcin Mielniczuk
Blaze: Fast SNARKs from Interleaved RAA Codes
Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, and Hadas Zeilberger
Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, and Hadas Zeilberger
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation
Zhengan Huang, Junzuo Lai, Gongxian Zeng, and Jian Weng
Zhengan Huang, Junzuo Lai, Gongxian Zeng, and Jian Weng
Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model
Jinrong Chen, Yi Wang, Rongmao Chen, Xinyi Huang, and Wei Peng
Jinrong Chen, Yi Wang, Rongmao Chen, Xinyi Huang, and Wei Peng
NeutronNova: Folding everything that reduces to zero-check
Abhiram Kothapalli and Srinath Setty
Abhiram Kothapalli and Srinath Setty
Nebula: Efficient read-write memory and switchboard circuits for folding schemes
Arasu Arun and Srinath Setty
Arasu Arun and Srinath Setty
Predicting truncated multiple matrix congruential generators with unknown parameters
Changcun Wang and Zhaopeng Dai
Changcun Wang and Zhaopeng Dai
Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge
Jiaqi Cheng and Rishab Goyal
Jiaqi Cheng and Rishab Goyal
Cryptography and Collective Power
Leah Namisa Rosenbloom
Leah Namisa Rosenbloom
Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement
Daniel Collins, Yuval Efron, and Jovan Komatovic
Daniel Collins, Yuval Efron, and Jovan Komatovic
Pacmann: Efficient Private Approximate Nearest Neighbor Search
Mingxun Zhou, Elaine Shi, and Giulia Fanti
Mingxun Zhou, Elaine Shi, and Giulia Fanti
Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes
Bar Alon, Amos Beimel, and Or Lasri
Bar Alon, Amos Beimel, and Or Lasri
On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices
Sulaiman Alhussaini and Serge˘ı Sergeev
Sulaiman Alhussaini and Serge˘ı Sergeev
An undetectable watermark for generative image models
Sam Gunn, Xuandong Zhao, and Dawn Song
Sam Gunn, Xuandong Zhao, and Dawn Song
Secret Sharing with Publicly Verifiable Deletion
Jonathan Katz and Ben Sela
Jonathan Katz and Ben Sela
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs
Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, and Jiaheng Zhang
Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, and Jiaheng Zhang
Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators
Ximing Fu, Mo Li, Shihan Lyu, and Chuanyi Liu
Ximing Fu, Mo Li, Shihan Lyu, and Chuanyi Liu
Stateful Communication with Malicious Parties
Chen-Da Liu-Zhang, Christopher Portmann, and Guilherme Rito
Chen-Da Liu-Zhang, Christopher Portmann, and Guilherme Rito
DART: Distributed argument of knowledge for rough terrains
Steve Thakur
Steve Thakur
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
Weihao Bai, Long Chen, Qianwen Gao, and Zhenfeng Zhang
Weihao Bai, Long Chen, Qianwen Gao, and Zhenfeng Zhang
Matching radar signals and fingerprints with MPC
Benjamin Hansen Mortensen, Mathias Karsrud Nordal, and Martin Strand
Benjamin Hansen Mortensen, Mathias Karsrud Nordal, and Martin Strand
A Systematic Study of Sparse LWE
Aayush Jain, Huijia Lin, and Sagnik Saha
Aayush Jain, Huijia Lin, and Sagnik Saha
A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Fully Homomorphic Encryption for Cyclotomic Prime Moduli
Robin Geelen and Frederik Vercauteren
Robin Geelen and Frederik Vercauteren
WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification
Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, and Eylon Yogev
Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, and Eylon Yogev
Quantum Money from Class Group Actions on Elliptic Curves
Hart Montgomery and Shahed Sharif
Hart Montgomery and Shahed Sharif
Block Ciphers in Idealized Models: Automated Proofs and New Security Results
Miguel Ambrona, Pooya Farshim, and Patrick Harasser
Miguel Ambrona, Pooya Farshim, and Patrick Harasser
Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols
Keykhosro Khosravani, Taraneh Eghlidos, and Mohammad reza Aref
Keykhosro Khosravani, Taraneh Eghlidos, and Mohammad reza Aref
Halving differential additions on Kummer lines
Damien Robert and Nicolas Sarkis
Damien Robert and Nicolas Sarkis
$\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security
Emanuele Di Giandomenico, Yong Li, and Sven Schäge
Emanuele Di Giandomenico, Yong Li, and Sven Schäge
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, and Adi Shamir
Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, and Adi Shamir
Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols
Francesca Falzon and Evangelia Anna Markatou
Francesca Falzon and Evangelia Anna Markatou
Quantum Group Actions
Tomoyuki Morimae and Keita Xagawa
Tomoyuki Morimae and Keita Xagawa
Solving Multivariate Coppersmith Problems with Known Moduli
Keegan Ryan
Keegan Ryan
Verifiable Value Added Tax
Victor Sint Nicolaas and Sascha Jafari
Victor Sint Nicolaas and Sascha Jafari
Efficiently-Thresholdizable Batched Identity Based Encryption, with Applications
Amit Agarwal, Rex Fernando, and Benny Pinkas
Amit Agarwal, Rex Fernando, and Benny Pinkas
Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model
Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, and Yong Yu
Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, and Yong Yu
OML: Open, Monetizable, and Loyal AI
Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, and Pramod Viswanath
Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, and Pramod Viswanath
Bounded Collusion-Resistant Registered Functional Encryption for Circuits
Yijian Zhang, Jie Chen, Debiao He, and Yuqing Zhang
Yijian Zhang, Jie Chen, Debiao He, and Yuqing Zhang
Basefold in the List Decoding Regime
Ulrich Haböck
Ulrich Haböck
Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis
Kota Yoshida, Sengim Karayalcin, and Stjepan Picek
Kota Yoshida, Sengim Karayalcin, and Stjepan Picek
The Supersingular Isogeny Path and Endomorphism Ring Problems: Unconditional Reductions
Maher Mamah
Maher Mamah
Oracle Separation Between Quantum Commitments and Quantum One-wayness
John Bostanci, Boyang Chen, and Barak Nehoran
John Bostanci, Boyang Chen, and Barak Nehoran
A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID
Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, and Takashi Yamakawa
Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, and Takashi Yamakawa
Dynamic zk-SNARKs
Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, and Dimitrios Papadopoulos
Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, and Dimitrios Papadopoulos
Fiat-Shamir in the Wild
Hieu Nguyen, Uyen Ho, and Alex Biryukov
Hieu Nguyen, Uyen Ho, and Alex Biryukov
A Simple Framework for Secure Key Leasing
Fuyuki Kitagawa, Tomoyuki Morimae, and Takashi Yamakawa
Fuyuki Kitagawa, Tomoyuki Morimae, and Takashi Yamakawa
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, and Francisco Rodríguez-Henríquez
Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, and Francisco Rodríguez-Henríquez
Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets
Akash Madhusudan, Mustafa A. Mustafa, Hilder V.L. Pereira, and Erik Takke
Akash Madhusudan, Mustafa A. Mustafa, Hilder V.L. Pereira, and Erik Takke
FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation
Daniel Günther, Joachim Schmidt, Thomas Schneider, and Hossein Yalame
Daniel Günther, Joachim Schmidt, Thomas Schneider, and Hossein Yalame
Revisiting Shuffle-Based Private Set Unions with Reduced Communication
Jiseung Kim, Hyung Tae Lee, and Yongha Son
Jiseung Kim, Hyung Tae Lee, and Yongha Son
Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI
Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, and Sharwan K. Tiwari
Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, and Sharwan K. Tiwari
Understanding Leakage in Searchable Encryption: a Quantitative Approach
Alexandra Boldyreva, Zichen Gui, and Bogdan Warinschi
Alexandra Boldyreva, Zichen Gui, and Bogdan Warinschi
Tightly Secure Threshold Signatures over Pairing-Free Groups
Renas Bacho and Benedikt Wagner
Renas Bacho and Benedikt Wagner
The module action for isogeny based cryptography
Damien Robert
Damien Robert
Private Laconic Oblivious Transfer with Preprocessing
Rishabh Bhadauria, Nico Döttling, Carmit Hazay, and Chuanwei Lin
Rishabh Bhadauria, Nico Döttling, Carmit Hazay, and Chuanwei Lin
Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM
Amit Singh Bhati, Michiel Verbauwhede, and Elena Andreeva
Amit Singh Bhati, Michiel Verbauwhede, and Elena Andreeva
STARK-based Signatures from the RPO Permutation
Shahla Atapoor, Cyprien Delpech de Saint Guilhem, and Al Kindi
Shahla Atapoor, Cyprien Delpech de Saint Guilhem, and Al Kindi
Revisiting Keyed-Verification Anonymous Credentials
Michele Orrù
Michele Orrù
SNARKs for Virtual Machines are Non-Malleable
Matteo Campanelli, Antonio Faonio, and Luigi Russo
Matteo Campanelli, Antonio Faonio, and Luigi Russo
MAYO Key Recovery by Fixing Vinegar Seeds
Sönke Jendral and Elena Dubrova
Sönke Jendral and Elena Dubrova
Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle
Christian Badertscher, Matteo Campanelli, Michele Ciampi, Luigi Russo, and Luisa Siniscalchi
Christian Badertscher, Matteo Campanelli, Michele Ciampi, Luigi Russo, and Luisa Siniscalchi
Fully-Succinct Arguments over the Integers from First Principles
Matteo Campanelli and Mathias Hall-Andersen
Matteo Campanelli and Mathias Hall-Andersen
HHL for tensor-decomposable matrices
Cezary Pilaszewicz and Marian Margraf
Cezary Pilaszewicz and Marian Margraf
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
John Gaspoz and Siemen Dhooghe
John Gaspoz and Siemen Dhooghe
Fully Composable Homomorphic Encryption
Daniele Micciancio
Daniele Micciancio
PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks
Zonglun Li, Shuhao Zheng, Junliang Luo, Ziyue Xin, Dun Yuan, Shang Gao, Sichao Yang, Bin Xiao, and Xue Liu
Zonglun Li, Shuhao Zheng, Junliang Luo, Ziyue Xin, Dun Yuan, Shang Gao, Sichao Yang, Bin Xiao, and Xue Liu
HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0
Ali Şah Özcan and Erkay Savaş
Ali Şah Özcan and Erkay Savaş
Robust AE With Committing Security
Viet Tung Hoang and Sanketh Menda
Viet Tung Hoang and Sanketh Menda
Findex: A Concurrent and Database-Independent Searchable Encryption Scheme
Théophile Brézot and Chloé Hébant
Théophile Brézot and Chloé Hébant
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process
Pedram Hosseyni, Ralf Küsters, and Tim Würtele
Pedram Hosseyni, Ralf Küsters, and Tim Würtele
Quantum Cryptography from Meta-Complexity
Taiga Hiroka and Tomoyuki Morimae
Taiga Hiroka and Tomoyuki Morimae
Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem
Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, and Kanye Ye Wang
Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, and Kanye Ye Wang
VOLE-in-the-head signatures from Subfield Bilinear Collisions
Janik Huth and Antoine Joux
Janik Huth and Antoine Joux
Cryptographic Characterization of Quantum Advantage
Tomoyuki Morimae, Yuki Shirakawa, and Takashi Yamakawa
Tomoyuki Morimae, Yuki Shirakawa, and Takashi Yamakawa
Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs
Xingye Lu, Jingjing Fan, and Man Ho AU
Xingye Lu, Jingjing Fan, and Man Ho AU
More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead
Leo de Castro, Duhyeong Kim, Miran Kim, Keewoo Lee, Seonhong Min, and Yongsoo Song
Leo de Castro, Duhyeong Kim, Miran Kim, Keewoo Lee, Seonhong Min, and Yongsoo Song
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention
Jan Bormet, Sebastian Faust, Hussien Othman, and Ziyan Qu
Jan Bormet, Sebastian Faust, Hussien Othman, and Ziyan Qu
Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts
Fei Xu, Honggang Hu, and Changhong Xu
Fei Xu, Honggang Hu, and Changhong Xu
FLI: Folding Lookup Instances
Albert Garreta and Ignacio Manzur
Albert Garreta and Ignacio Manzur
Folding Schemes with Privacy Preserving Selective Verification
Joan Boyar and Simon Erfurth
Joan Boyar and Simon Erfurth
Challenges in Timed Cryptography: A Position Paper
Karim Eldefrawy, Benjamin Terner, and Moti Yung
Karim Eldefrawy, Benjamin Terner, and Moti Yung
Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
Gavin Cho, Georg Fuchsbauer, and Adam O'Neill
Gavin Cho, Georg Fuchsbauer, and Adam O'Neill
How to Recover the Full Plaintext of XCB
Peng Wang, Shuping Mao, Ruozhou Xu, Jiwu Jing, and Yuewu Wang
Peng Wang, Shuping Mao, Ruozhou Xu, Jiwu Jing, and Yuewu Wang
Overpass Channels: Horizontally Scalable, Privacy-Enhanced, with Independent Verification, Fluid Liquidity, and Robust Censorship Proof, Payments
Brandon "Cryptskii" Ramsay
Brandon "Cryptskii" Ramsay
Evaluating Leakage Attacks Against Relational Encrypted Search
Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, and Amos Treiber
Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, and Amos Treiber
Lower Bounds on the Overhead of Indistinguishability Obfuscation
Zhenjian Lu, Noam Mazor, Igor C. Oliveira, and Rafael Pass
Zhenjian Lu, Noam Mazor, Igor C. Oliveira, and Rafael Pass
Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments
Nikhil Vanjani, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
Nikhil Vanjani, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices
Yuxuan Wang, Jintong Yu, Shipei Qu, Xiaolin Zhang, Xiaowei Li, Chi Zhang, and Dawu Gu
Yuxuan Wang, Jintong Yu, Shipei Qu, Xiaolin Zhang, Xiaowei Li, Chi Zhang, and Dawu Gu
The SMAesH dataset
Gaëtan Cassiers and Charles Momin
Gaëtan Cassiers and Charles Momin
On the rough order assumption in imaginary quadratic number fields
Antonio Sanso
Antonio Sanso
Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$
Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, and Koji Nuida
Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, and Koji Nuida
Witness Semantic Security
Paul Lou, Nathan Manohar, and Amit Sahai
Paul Lou, Nathan Manohar, and Amit Sahai
A Note on the SNOVA Security
Lih-Chung Wang, Chun-Yen Chou, Jintai Ding, Yen-Liang Kuan, Jan Adriaan Leegwater, Ming-Siou Li, Bo-Shu Tseng, Po-En Tseng, and Chia-Chun Wang
Lih-Chung Wang, Chun-Yen Chou, Jintai Ding, Yen-Liang Kuan, Jan Adriaan Leegwater, Ming-Siou Li, Bo-Shu Tseng, Po-En Tseng, and Chia-Chun Wang
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption
Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, and Mingyuan Wang
Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, and Mingyuan Wang
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
Jipeng Zhang, Yuxing Yan, Junhao Huang, and Çetin Kaya Koç
Jipeng Zhang, Yuxing Yan, Junhao Huang, and Çetin Kaya Koç
Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash
Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, and Akshayaram Srinivasan
Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, and Akshayaram Srinivasan
Depth Optimized Circuits for Lattice Based Voting with Large Candidate Sets
Oskar Goldhahn and Kristian Gjøsteen
Oskar Goldhahn and Kristian Gjøsteen
Improved Soundness Analysis of the FRI Protocol
Yiwen Gao, Haibin Kan, and Yuan Li
Yiwen Gao, Haibin Kan, and Yuan Li
Some Classes of Cubic Monomial Boolean Functions with Good Second-Order Nonlinearity
RUCHI TELANG GODE
RUCHI TELANG GODE
Group Factorisation for Smaller Signatures from Cryptographic Group Actions
Giuseppe D'Alconzo, Alessio Meneghetti, and Edoardo Signorini
Giuseppe D'Alconzo, Alessio Meneghetti, and Edoardo Signorini
DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group
Semin Han, Geonho Yoon, Hyunok Oh, and Jihye Kim
Semin Han, Geonho Yoon, Hyunok Oh, and Jihye Kim
Key Collisions on AES and Its Applications
Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, and Takanori Isobe
Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, and Takanori Isobe
Unbounded ABE for Circuits from LWE, Revisited
Valerio Cini and Hoeteck Wee
Valerio Cini and Hoeteck Wee
Bit Security: optimal adversaries, equivalence results, and a toolbox for computational-statistical security analysis
Daniele Micciancio and Mark Schultz-Wu
Daniele Micciancio and Mark Schultz-Wu
FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE
Jeongeun Park, Barry Van Leeuwen, and Oliver Zajonc
Jeongeun Park, Barry Van Leeuwen, and Oliver Zajonc
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries"
Thomas Schneider, Ajith Suresh, and Hossein Yalame
Thomas Schneider, Ajith Suresh, and Hossein Yalame
Scalable Mixnets from Two-Party Mercurial Signatures on Randomizable Ciphertexts
Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig, and Mehdi Tibouchi
Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig, and Mehdi Tibouchi
TopGear 2.0: Accelerated Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing
HyunHo Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, and Yongsoo Song
HyunHo Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, and Yongsoo Song
Exploring User Perceptions of Security Auditing in the Web3 Ecosystem
Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, and Kanye Ye Wang
Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, and Kanye Ye Wang
Hard Quantum Extrapolations in Quantum Cryptography
Luowen Qian, Justin Raizes, and Mark Zhandry
Luowen Qian, Justin Raizes, and Mark Zhandry
Multi-Key Fully-Homomorphic Aggregate MAC for Arithmetic Circuits
Suvasree Biswas and Arkady Yerukhimovich
Suvasree Biswas and Arkady Yerukhimovich
Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script
Federico Barbacovi, Enrique Larraia, Paul Germouty, and Wei Zhang
Federico Barbacovi, Enrique Larraia, Paul Germouty, and Wei Zhang
Low-degree Security of the Planted Random Subgraph Problem
Andrej Bogdanov, Chris Jones, Alon Rosen, and Ilias Zadik
Andrej Bogdanov, Chris Jones, Alon Rosen, and Ilias Zadik
No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains
Jianting Zhang and Aniket Kate
Jianting Zhang and Aniket Kate
Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems
Anna-Lena Horlemann, Karan Khathuria, Marc Newman, Amin Sakzad, and Carlos Vela Cabello
Anna-Lena Horlemann, Karan Khathuria, Marc Newman, Amin Sakzad, and Carlos Vela Cabello
Concretely Efficient Private Set Union via Circuit-based PSI
Gowri R Chandran, Thomas Schneider, Maximilian Stillger, and Christian Weinert
Gowri R Chandran, Thomas Schneider, Maximilian Stillger, and Christian Weinert
Rate-1 Zero-Knowledge Proofs from One-Way Functions
Noor Athamnah, Eden Florentz – Konopnicki, and Ron D. Rothblum
Noor Athamnah, Eden Florentz – Konopnicki, and Ron D. Rothblum
Multi-Designated Detector Watermarking for Language Models
Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, and Yue Yu
Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, and Yue Yu
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from $\#\mathsf{P}$-Hardness
Dakshita Khurana and Kabir Tomer
Dakshita Khurana and Kabir Tomer
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC
Nishanth Chandran, Juan Garay, Ankit Kumar Misra, Rafail Ostrovsky, and Vassilis Zikas
Nishanth Chandran, Juan Garay, Ankit Kumar Misra, Rafail Ostrovsky, and Vassilis Zikas
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae
Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi, and Ivan Visconti
Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi, and Ivan Visconti
The transition to post-quantum cryptography, metaphorically
Stefan-Lukas Gazdag and Sophia Grundner-Culemann
Stefan-Lukas Gazdag and Sophia Grundner-Culemann
Adaptively Secure Attribute-Based Encryption from Witness Encryption
Brent Waters and Daniel Wichs
Brent Waters and Daniel Wichs
LARMix$\mathbf{++}$: Latency-Aware Routing in Mix Networks with Free Routes Topology
Mahdi Rahimi
Mahdi Rahimi
Quadratic-like balanced functions and permutations
Claude Carlet and Irene Villa
Claude Carlet and Irene Villa
Making Searchable Symmetric Encryption Schemes Smaller and Faster
Debrup Chakraborty, Avishek Majumder, and Subhabrata Samajder
Debrup Chakraborty, Avishek Majumder, and Subhabrata Samajder
The Power of NAPs: Compressing OR-Proofs via Collision-Resistant Hashing
Katharina Boudgoust and Mark Simkin
Katharina Boudgoust and Mark Simkin
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort
Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, and Shota Yamada
Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, and Shota Yamada
On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography
Vasyl Ustimenko
Vasyl Ustimenko
Honest Majority GOD MPC with $O(\mathsf{depth}(C))$ Rounds and Low Online Communication
Amit Agarwal, Alexander Bienstock, Ivan Damgård, and Daniel Escudero
Amit Agarwal, Alexander Bienstock, Ivan Damgård, and Daniel Escudero
Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, and Ashwin Jha
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, and Ashwin Jha
Signature-based Witness Encryption with Compact Ciphertext
Gennaro Avitabile, Nico Döttling, Bernardo Magri, Christos Sakkas, and Stella Wohnig
Gennaro Avitabile, Nico Döttling, Bernardo Magri, Christos Sakkas, and Stella Wohnig
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs
Mihir Bellare, Rishabh Ranjan, Doreen Riepel, and Ali Aldakheel
Mihir Bellare, Rishabh Ranjan, Doreen Riepel, and Ali Aldakheel
On the Spinor Genus and the Distinguishing Lattice Isomorphism Problem
Cong Ling, Jingbo Liu, and Andrew Mendelsohn
Cong Ling, Jingbo Liu, and Andrew Mendelsohn
Mystrium: Wide Block Encryption Efficient on Entry-Level Processors
Parisa Amiri Eliasi, Koustabh Ghosh, and Joan Daemen
Parisa Amiri Eliasi, Koustabh Ghosh, and Joan Daemen
A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction
Pierre Charbit, Geoffroy Couteau, Pierre Meyer, and Reza Naserasr
Pierre Charbit, Geoffroy Couteau, Pierre Meyer, and Reza Naserasr
Isogeny-Based Secure Voting Systems for Large-Scale Elections
Mohammed El Baraka and Siham Ezzouak
Mohammed El Baraka and Siham Ezzouak
Communication Efficient Secure and Private Multi-Party Deep Learning
Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, and Rahul Sharma
Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, and Rahul Sharma
Quantum Pseudorandom Scramblers
Chuhan Lu, Minglong Qin, Fang Song, Penghui Yao, and Mingnan Zhao
Chuhan Lu, Minglong Qin, Fang Song, Penghui Yao, and Mingnan Zhao
Password-Protected Threshold Signatures
Stefan Dziembowski, Stanislaw Jarecki, Paweł Kędzior, Hugo Krawczyk, Chan Nam Ngo, and Jiayu Xu
Stefan Dziembowski, Stanislaw Jarecki, Paweł Kędzior, Hugo Krawczyk, Chan Nam Ngo, and Jiayu Xu
Dense and smooth lattices in any genus
Wessel van Woerden
Wessel van Woerden
P2C2T: Preserving the Privacy of Cross-Chain Transfer
Panpan Han, Zheng Yan, Laurence T. Yang, and Elisa Bertino
Panpan Han, Zheng Yan, Laurence T. Yang, and Elisa Bertino
Dishonest Majority Constant-Round MPC with Linear Communication from DDH
Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, and Chenkai Weng
Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, and Chenkai Weng
Linear approximations of the Flystel construction
Tim Beyne and Clémence Bouvier
Tim Beyne and Clémence Bouvier
SoK: Descriptive Statistics Under Local Differential Privacy
René Raab, Pascal Berrang, Paul Gerhart, and Dominique Schröder
René Raab, Pascal Berrang, Paul Gerhart, and Dominique Schröder
Asynchronous Verifiable Secret Sharing with Elastic Thresholds and Distributed Key Generation
Junming Li, Zhi Lu, Renfei Shen, Yuanqing Feng, and Songfeng Lu
Junming Li, Zhi Lu, Renfei Shen, Yuanqing Feng, and Songfeng Lu
Efficient Fuzzy Private Set Intersection from Fuzzy Mapping
Ying Gao, Lin Qi, Xiang Liu, Yuanchao Luo, and Longxin Wang
Ying Gao, Lin Qi, Xiang Liu, Yuanchao Luo, and Longxin Wang
Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions
Jad Silbak and Daniel Wichs
Jad Silbak and Daniel Wichs
PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis
Antonia Januszewicz, Daniela Medrano Gutierrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, and Taeho Jung
Antonia Januszewicz, Daniela Medrano Gutierrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, and Taeho Jung
Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-ish and Thresholdisable
Martin R. Albrecht and Kamil Doruk Gur
Martin R. Albrecht and Kamil Doruk Gur
Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage
Francesco Berti and Itamar Levi
Francesco Berti and Itamar Levi
A Combined Design of 4-PLL-TRNG and 64-bit CDC-7-XPUF on a Zynq-7020 SoC
Oğuz Yayla and Yunus Emre Yılmaz
Oğuz Yayla and Yunus Emre Yılmaz
Crooked Indifferentiability of the Feistel Construction
Alexander Russell, Qiang Tang, and Jiadong Zhu
Alexander Russell, Qiang Tang, and Jiadong Zhu
Threshold PAKE with Security against Compromise of all Servers
Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, and Jiayu Xu
Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, and Jiayu Xu
Interval Key-Encapsulation Mechanism
Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, and Daniel Wichs
Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, and Daniel Wichs
Breaking and Repairing SQIsign2D-East
Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, and Frederik Vercauteren
Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, and Frederik Vercauteren
On the Complexity of Cryptographic Groups and Generic Group Models
Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, and Kui Ren
Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, and Kui Ren
Traffic-aware Merkle Trees for Shortening Blockchain Transaction Proofs
Avi Mizrahi, Noam Koren, Ori Rottenstreich, and Yuval Cassuto
Avi Mizrahi, Noam Koren, Ori Rottenstreich, and Yuval Cassuto
TentLogiX: 5-bit Chaos-Driven S-Boxes for Lightweight Cryptographic Systems
Maha Allouzi and Arefeh Rahaei
Maha Allouzi and Arefeh Rahaei
Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions
Thomas Szymkowiak, Endrit Isufi, and Markku-Juhani Saarinen
Thomas Szymkowiak, Endrit Isufi, and Markku-Juhani Saarinen
Randomness in Private Sequential Stateless Protocols
Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, and Vinod M. Prabhakaran
Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, and Vinod M. Prabhakaran
Generic Differential Key Recovery Attacks and Beyond
Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, and Jian Weng
Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, and Jian Weng
Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity
Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, and Ruida Zeng
Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, and Ruida Zeng
Another Walk for Monchi
Riccardo Taiello, Emre Tosun, Alberto Ibarrondo, Hervé Chabanne, and Melek Önen
Riccardo Taiello, Emre Tosun, Alberto Ibarrondo, Hervé Chabanne, and Melek Önen
Attestation Proof of Association – provability that attestation keys are bound to the same hardware and person
Eric Verheul
Eric Verheul
32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC
Oğuz Yayla and Yunus Emre Yılmaz
Oğuz Yayla and Yunus Emre Yılmaz
Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA
Oğuz Yayla and Yunus Emre Yılmaz
Oğuz Yayla and Yunus Emre Yılmaz
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup
Nan Wang and Dongxi Liu
Nan Wang and Dongxi Liu
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, and Samuel Pagliarini
Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, and Samuel Pagliarini
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms
Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, and Ingrid Verbauwhede
Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, and Ingrid Verbauwhede
Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance
Weihao Wang, Shuai Han, and Shengli Liu
Weihao Wang, Shuai Han, and Shengli Liu
HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces
Suvadeep Hajra and Debdeep Mukhopadhyay
Suvadeep Hajra and Debdeep Mukhopadhyay
Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos
Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, and Philipp Jovanovic
Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, and Philipp Jovanovic
Actively Secure Polynomial Evaluation from Shared Polynomial Encodings
Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, and Ralf Küsters
Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, and Ralf Küsters
Untangling the Security of Kilian's Protocol: Upper and Lower Bounds
Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner, and Eylon Yogev
Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner, and Eylon Yogev
$Shortcut$: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases
Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, and Zheli Liu
Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, and Zheli Liu
On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages
Masayuki Fukumitsu and Shingo Hasegawa
Masayuki Fukumitsu and Shingo Hasegawa
Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation
Fuchun Lin, Chaoping Xing, and Yizhou Yao
Fuchun Lin, Chaoping Xing, and Yizhou Yao
MYao: Multiparty ``Yao'' Garbled Circuits with Row Reduction, Half Gates, and Efficient Online Computation
Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, and Eran Omri
Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, and Eran Omri
Powerformer: Efficient Privacy-Preserving Transformer with Batch Rectifier-Power Max Function and Optimized Homomorphic Attention
Dongjin Park, Eunsang Lee, and Joon-Woo Lee
Dongjin Park, Eunsang Lee, and Joon-Woo Lee
Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors
Truong Son Nguyen, Tancrède Lepoint, and Ni Trieu
Truong Son Nguyen, Tancrède Lepoint, and Ni Trieu
LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK
Carmit Hazay, David Heath, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam, and Yibin Yang
Carmit Hazay, David Heath, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam, and Yibin Yang
Agile Asymmetric Cryptography and the Case for Finite Fields
Anna M. Johnston
Anna M. Johnston
New constructions of pseudorandom codes
Surendra Ghentiyala and Venkatesan Guruswami
Surendra Ghentiyala and Venkatesan Guruswami
A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models
Brennon Brimhall, Orion Weller, Matthew Green, and Ian Miers
Brennon Brimhall, Orion Weller, Matthew Green, and Ian Miers
Towards package opening detection at power-up by monitoring thermal dissipation
Julien Toulemont, Geoffrey Chancel, Fréderick Mailly, Philippe Maurine, and Pascal Nouet
Julien Toulemont, Geoffrey Chancel, Fréderick Mailly, Philippe Maurine, and Pascal Nouet
ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes
Puja Mondal, Supriya Adhikary, Suparna Kundu, and Angshuman Karmakar
Puja Mondal, Supriya Adhikary, Suparna Kundu, and Angshuman Karmakar
Provable Security of Linux-DRBG in the Seedless Robustness Model
Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, and Yeongmin Lee
Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, and Yeongmin Lee
Privacy-Preserving Breadth-First-Search and Maximal-Flow
Vincent Ehrmanntraut and Ulrike Meyer
Vincent Ehrmanntraut and Ulrike Meyer
On the Relationship between Public Key Primitives via Indifferentiability
Shuang Hu, Bingsheng Zhang, Cong Zhang, and Kui Ren
Shuang Hu, Bingsheng Zhang, Cong Zhang, and Kui Ren
Public-key encryption from a trapdoor one-way embedding of $SL_2(\mathbb{N})$
Robert Hines
Robert Hines
Distributed Broadcast Encryption from Lattices
Jeffrey Champion and David J. Wu
Jeffrey Champion and David J. Wu
Circuit ABE with poly(depth, λ)-sized Ciphertexts and Keys from Lattices
Hoeteck Wee
Hoeteck Wee
Privacy Comparison for Bitcoin Light Client Implementations
Arad Kotzer and Ori Rottenstreich
Arad Kotzer and Ori Rottenstreich
Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller
Ying Ouyang, Deng Tang, and Yanhong Xu
Ying Ouyang, Deng Tang, and Yanhong Xu
The Black-Box Simulation Barrier Persists in a Fully Quantum World
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, and Jiahui Liu
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, and Jiahui Liu
A New Method to Test the Zeros of Riemann Zeta Function
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Design issues of ``an anonymous authentication and key agreement protocol in smart living''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Cryptobazaar: Private Sealed-bid Auctions at Scale
Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, and Philipp Jovanovic
Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, and Philipp Jovanovic
Oraqle: A Depth-Aware Secure Computation Compiler
Jelle Vos, Mauro Conti, and Zekeriya Erkin
Jelle Vos, Mauro Conti, and Zekeriya Erkin
Multiple-Tweak Differential Attack Against SCARF
Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, and Yosuke Todo
Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, and Yosuke Todo
Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing
Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, and Thomas Schneider
Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, and Thomas Schneider
Blind Multisignatures for Anonymous Tokens with Decentralized Issuance
Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, and Julian Loss
Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, and Julian Loss
Lego-DLC: batching module for commit-carrying SNARK under Pedersen Engines
Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, and Jihye Kim
Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, and Jihye Kim
$\Pi$-signHD: A New Structure for the SQIsign Family with Flexible Applicability
Kaizhan Lin, Weize Wang, Chang-An Zhao, and Yunlei Zhao
Kaizhan Lin, Weize Wang, Chang-An Zhao, and Yunlei Zhao
Hard-Label Cryptanalytic Extraction of Neural Network Models
Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, and Xiaoyun Wang
Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, and Xiaoyun Wang
A Recursive zk-based State Update System
Daniel Bloom and Sai Deng
Daniel Bloom and Sai Deng
New Techniques for Preimage Sampling: Improved NIZKs and More from LWE
Brent Waters, Hoeteck Wee, and David J. Wu
Brent Waters, Hoeteck Wee, and David J. Wu
Efficient Asymmetric PAKE Compiler from KEM and AE
You Lyu, Shengli Liu, and Shuai Han
You Lyu, Shengli Liu, and Shuai Han
A Note on Ligero and Logarithmic Randomness
Guillermo Angeris, Alex Evans, and Gyumin Roh
Guillermo Angeris, Alex Evans, and Gyumin Roh
Coercion-resistant i-voting with short PIN and OAuth 2.0
Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, and Alessandro Tomasi
Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, and Alessandro Tomasi
Efficient Batch Algorithms for the Post-Quantum Crystals Dilithium Signature Scheme and Crystals Kyber Encryption Scheme
Nazlı Deniz TÜRE and Murat CENK
Nazlı Deniz TÜRE and Murat CENK
Rare structures in tensor graphs - Bermuda triangles for cryptosystems based on the Tensor Isomorphism problem
Lars Ran and Simona Samardjiska
Lars Ran and Simona Samardjiska
A Formal Analysis of Apple’s iMessage PQ3 Protocol
Felix Linker, Ralf Sasse, and David Basin
Felix Linker, Ralf Sasse, and David Basin
SLAMP-FSS: Two-Party Multi-Point Function Secret Sharing from Simple Linear Algebra
Erki Külaots, Toomas Krips, Hendrik Eerikson, and Pille Pullonen-Raudvere
Erki Külaots, Toomas Krips, Hendrik Eerikson, and Pille Pullonen-Raudvere
Survivable Payment Channel Networks
Yekaterina Podiatchev, Ariel Orda, and Ori Rottenstreich
Yekaterina Podiatchev, Ariel Orda, and Ori Rottenstreich
Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography
Madické Diadji Mbodj and Anis Bkakria
Madické Diadji Mbodj and Anis Bkakria
Scalable Equi-Join Queries over Encrypted Database
Kai Du, Jianfeng Wang, Jiaojiao Wu, and Yunling Wang
Kai Du, Jianfeng Wang, Jiaojiao Wu, and Yunling Wang
Cache Timing Leakages in Zero-Knowledge Protocols
Shibam Mukherjee, Christian Rechberger, and Markus Schofnegger
Shibam Mukherjee, Christian Rechberger, and Markus Schofnegger
DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES
Tomáš Gerlich, Jakub Breier, Pavel Sikora, Zdeněk Martinásek, Aron Gohr, Anubhab Baksi, and Xiaolu Hou
Tomáš Gerlich, Jakub Breier, Pavel Sikora, Zdeněk Martinásek, Aron Gohr, Anubhab Baksi, and Xiaolu Hou
One-Way Functions and pKt Complexity
Shuichi Hirahara, Zhenjian Lu, and Igor C. Oliveira
Shuichi Hirahara, Zhenjian Lu, and Igor C. Oliveira
SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption
Camille Nuoskala, Hossein Abdinasibfar, and Antonis Michalas
Camille Nuoskala, Hossein Abdinasibfar, and Antonis Michalas
Problems and New Approaches for Crypto-Agility in Operational Technology
Tobias Frauenschläger and Jürgen Mottok
Tobias Frauenschläger and Jürgen Mottok
Locally Verifiable Distributed SNARGs
Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, and Rotem Oshman
Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, and Rotem Oshman
Password-Protected Key Retrieval with(out) HSM Protection
Sebastian Faller, Tobias Handirk, Julia Hesse, Máté Horváth, and Anja Lehmann
Sebastian Faller, Tobias Handirk, Julia Hesse, Máté Horváth, and Anja Lehmann
Self-Orthogonal Minimal Codes From (Vectorial) p-ary Plateaued Functions
René Rodríguez Aldama, Enes Pasalic, Fengrong Zhang, and Yongzhuang Wei
René Rodríguez Aldama, Enes Pasalic, Fengrong Zhang, and Yongzhuang Wei
Universal Context Commitment without Ciphertext Expansion
Arghya Bhattacharjee, Ritam Bhaumik, and Chandranan Dhar
Arghya Bhattacharjee, Ritam Bhaumik, and Chandranan Dhar
Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor
Shivam Bhasin, Harishma Boyapally, and Dirmanto Jap
Shivam Bhasin, Harishma Boyapally, and Dirmanto Jap
EUCLEAK
Thomas Roche
Thomas Roche
EvalRound+ Bootstrapping and its Rigorous Analysis for CKKS Scheme
Hyewon Sung, Sieun Seo, Taekyung Kim, and Chohong Min
Hyewon Sung, Sieun Seo, Taekyung Kim, and Chohong Min
Practical Blind Signatures in Pairing-Free Groups
Michael Klooß, Michael Reichle, and Benedikt Wagner
Michael Klooß, Michael Reichle, and Benedikt Wagner
Security Strengthening of Threshold Symmetric Schemes
Ehsan Ebrahimi
Ehsan Ebrahimi
FDFB$^2$: Functional Bootstrapping via Sparse Polynomial Multiplication
Kamil Kluczniak and Leonard Schild
Kamil Kluczniak and Leonard Schild
ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme
Aravind Vishnu S S, M Sethumadhavan, and Lakshmy K V
Aravind Vishnu S S, M Sethumadhavan, and Lakshmy K V
Lifting approach against the SNOVA scheme
Shuhei Nakamura, Yusuke Tani, and Hiroki Furue
Shuhei Nakamura, Yusuke Tani, and Hiroki Furue
Uncompressing Dilithium's public key
Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, and Louis Goubin
Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, and Louis Goubin
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits
Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, and WenGuang Chen
Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, and WenGuang Chen
PIGEON: A Framework for Private Inference of Neural Networks
Christopher Harth-Kitzerow, Yongqin Wang, Rachit Rajat, Georg Carle, and Murali Annavaram
Christopher Harth-Kitzerow, Yongqin Wang, Rachit Rajat, Georg Carle, and Murali Annavaram
ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON
Tarun Yadav and Manoj Kumar
Tarun Yadav and Manoj Kumar
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework
Lorenzo Martinico and Markulf Kohlweiss
Lorenzo Martinico and Markulf Kohlweiss
Tightly Secure Non-Interactive BLS Multi-Signatures
Renas Bacho and Benedikt Wagner
Renas Bacho and Benedikt Wagner
A Better Kyber Butterfly for FPGAs
Jonas Bertels, Quinten Norga, and Ingrid Verbauwhede
Jonas Bertels, Quinten Norga, and Ingrid Verbauwhede
Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations
Jungho Moon, Zhanibek Omarov, Donghoon Yoo, Yongdae An, and Heewon Chung
Jungho Moon, Zhanibek Omarov, Donghoon Yoo, Yongdae An, and Heewon Chung
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature
Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, and Yunlei Zhao
Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, and Yunlei Zhao
FLIP-and-prove R1CS
Anca Nitulescu, Nikitas Paslis, and Carla Ràfols
Anca Nitulescu, Nikitas Paslis, and Carla Ràfols
Improved Key Recovery Attacks on Reduced-Round Salsa20
Sabyasachi Dey, Gregor Leander, and Nitin Kumar Sharma
Sabyasachi Dey, Gregor Leander, and Nitin Kumar Sharma
A Documentation of Ethereum’s PeerDAS
Benedikt Wagner and Arantxa Zapico
Benedikt Wagner and Arantxa Zapico
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging
Christian Badertscher, Fabio Banfi, and Jesus Diaz
Christian Badertscher, Fabio Banfi, and Jesus Diaz
CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3
Biming Zhou, Haodong Jiang, and Yunlei Zhao
Biming Zhou, Haodong Jiang, and Yunlei Zhao
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, and Maria Eichlseder
Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, and Maria Eichlseder
Quantum Sieving for Code-Based Cryptanalysis and Its Limitations for ISD
Lynn Engelberts, Simona Etinski, and Johanna Loyer
Lynn Engelberts, Simona Etinski, and Johanna Loyer
Understanding the Blockchain Interoperability Graph based on Cryptocurrency Price Correlation
Ori Mazor and Ori Rottenstreich
Ori Mazor and Ori Rottenstreich
Leakage-Resilience of Circuit Garbling
Ruiyang Li, Yiteng Sun, Chun Guo, Francois-Xavier Standaert, Weijia Wang, and Xiao Wang
Ruiyang Li, Yiteng Sun, Chun Guo, Francois-Xavier Standaert, Weijia Wang, and Xiao Wang
Direct Range Proofs for Paillier Cryptosystem and Their Applications
Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, and Siu-Ming Yiu
Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, and Siu-Ming Yiu
Votexx: Extreme Coercion Resistance
David Chaum, Richard T. Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagorski, Bingsheng Zhang, and Zeyuan Yin
David Chaum, Richard T. Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagorski, Bingsheng Zhang, and Zeyuan Yin
On the overflow and $p$-adic theory applied to homomorphic encryption
Jacob Blindenbach, Jung Hee Cheon, Gamze Gürsoy, and Jiayi Kang
Jacob Blindenbach, Jung Hee Cheon, Gamze Gürsoy, and Jiayi Kang
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra
Doreen Riepel, Marloes Venema, and Tanya Verma
Doreen Riepel, Marloes Venema, and Tanya Verma
Proximity Gaps in Interleaved Codes
Benjamin E. Diamond and Angus Gruen
Benjamin E. Diamond and Angus Gruen
Update to the Sca25519 Library: Mitigating Tearing-based Side-channel Attacks
Lukasz Chmielewski and Lubomír Hrbáček
Lukasz Chmielewski and Lubomír Hrbáček
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR
Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, and Fuchun Guo
Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, and Fuchun Guo
Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs
Michael Brand and Benoît Poletti
Michael Brand and Benoît Poletti
Secure Multiparty Computation with Lazy Sharing
Shuaishuai Li, Cong Zhang, and Dongdai Lin
Shuaishuai Li, Cong Zhang, and Dongdai Lin
Provably Secure Online Authenticated Encryption and Bidirectional Online Channels
Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, and Mridul Nandi
Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, and Mridul Nandi
SoK: The Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices
Maximilian Pursche, Nikolai Puch, Sebastian N. Peters, and Michael P. Heinl
Maximilian Pursche, Nikolai Puch, Sebastian N. Peters, and Michael P. Heinl
Quantum Security of a Compact Multi-Signature
Shaoquan Jiang
Shaoquan Jiang
Generalized one-way function and its application
Hua-Lei Yin
Hua-Lei Yin
Unconditionally secure key distribution without quantum channel
Hua-Lei Yin
Hua-Lei Yin
Approach for High-Performance Random Number Generators for Critical Systems
Pascal Hammer, Veronika Krause, Tobias Probst, and Jürgen Mottok
Pascal Hammer, Veronika Krause, Tobias Probst, and Jürgen Mottok
Unbalanced Private Set Union with Reduced Computation and Communication
Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, and Xiaoyun Wang
Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, and Xiaoyun Wang
Comprehensive Robustness Analysis of GCM, CCM, and OCB3
Akiko Inoue, Tetsu Iwata, and Kazuhiko Minematsu
Akiko Inoue, Tetsu Iwata, and Kazuhiko Minematsu
Horcrux: Synthesize, Split, Shift and Stay Alive Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments
Anqi Tian, Peifang Ni, Yingzi Gao, and Jing Xu
Anqi Tian, Peifang Ni, Yingzi Gao, and Jing Xu
Construction bent functions using the Maiorana McFarland class
Juan Carlos Ku-Cauich and Javier Diaz-Vargas
Juan Carlos Ku-Cauich and Javier Diaz-Vargas
Fast Low Level Disk Encryption Using FPGAs
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, and Palash Sarkar
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, and Palash Sarkar
Perfect Monomial Prediction for Modular Addition
Kai Hu and Trevor Yap
Kai Hu and Trevor Yap
Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
George Teseleanu
George Teseleanu
Efficient online and Non-Interactive Threshold Signatures with Identifiable Aborts for Identity-Based Signatures in the IEEE P1363 Standard
Yan Jiang, Youwen Zhu, Jian Wang, and Yudi Zhang
Yan Jiang, Youwen Zhu, Jian Wang, and Yudi Zhang
Attacking trapdoors from matrix products
Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, and Christophe Petit
Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, and Christophe Petit
Practical Small Private Exponent Attacks against RSA
Yansong Feng, Zhen Liu, Abderrahmane Nitaj, and Yanbin Pan
Yansong Feng, Zhen Liu, Abderrahmane Nitaj, and Yanbin Pan
Newton Polytope-Based Strategy for Finding Small Roots of Multivariate Polynomials
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
A Note on ARADI and LLAMA
Roberto Avanzi, Orr Dunkelman, and Shibam Ghosh
Roberto Avanzi, Orr Dunkelman, and Shibam Ghosh
Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond
Giuseppe Persiano, Duong Hieu Phan, and Moti Yung
Giuseppe Persiano, Duong Hieu Phan, and Moti Yung
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Authenticity in the Presence of Leakage using a Forkcipher
Francesco Berti, François-Xavier Standaert, and Itamar Levi
Francesco Berti, François-Xavier Standaert, and Itamar Levi
CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher
Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, and Sharwan K. Tiwari
Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, and Sharwan K. Tiwari
SoK: Instruction Set Extensions for Cryptographers
Hao Cheng, Johann Großschädl, Ben Marshall, Daniel Page, and Markku-Juhani O. Saarinen
Hao Cheng, Johann Großschädl, Ben Marshall, Daniel Page, and Markku-Juhani O. Saarinen
Revisiting a Realistic EM Side-Channel Attack on a Complex Modern SoC
Debao Wang, Yiwen Gao, Yongbin Zhou, and Xian Huang
Debao Wang, Yiwen Gao, Yongbin Zhou, and Xian Huang
ECC’s Achilles’ Heel: Unveiling Weak Keys in Standardized Curves
Enrico Talotti, Matteo Paier, and Marino Miculan
Enrico Talotti, Matteo Paier, and Marino Miculan
Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation
Aditya Singh Rawat and Mahabir Prasad Jhanwar
Aditya Singh Rawat and Mahabir Prasad Jhanwar
Quantum-safe Signatureless DNSSEC
Aditya Singh Rawat and Mahabir Prasad Jhanwar
Aditya Singh Rawat and Mahabir Prasad Jhanwar
FHEW-like Leveled Homomorphic Evaluation: Refined Workflow and Polished Building Blocks
Ruida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, and Jooyoung Lee
Ruida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, and Jooyoung Lee
MAESTRO: Multi-party AES using Lookup Tables
Hiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, and Daniel Tschudi
Hiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, and Daniel Tschudi
Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields
Arnab Roy and Matthias Johann Steiner
Arnab Roy and Matthias Johann Steiner
PulpFHE: Complex Instruction Set Extensions for FHE Processors
Omar Ahmed and Nektarios Georgios Tsoutsos
Omar Ahmed and Nektarios Georgios Tsoutsos
Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles
Aydin Abadi
Aydin Abadi
A Lattice Attack Against a Family of RSA-like Cryptosystems
George Teseleanu
George Teseleanu
Probabilistic Data Structures in the Wild: A Security Analysis of Redis
Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, and Anupama Unnikrishnan
Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, and Anupama Unnikrishnan
Dynamic Threshold Key Encapsulation with a Transparent Setup
Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, and Hyoseung Kim
Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, and Hyoseung Kim
On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers
Hayato Watanabe, Ryoma Ito, and Toshihiro Ohigashi
Hayato Watanabe, Ryoma Ito, and Toshihiro Ohigashi
R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection
Archisman Ghosh, Dong-Hyun Seo, Debayan Das, Santosh Ghosh, and Shreyas Sen
Archisman Ghosh, Dong-Hyun Seo, Debayan Das, Santosh Ghosh, and Shreyas Sen
LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted
Ryan Seah, Daren Khu, Alexander Hoover, and Ruth Ng
Ryan Seah, Daren Khu, Alexander Hoover, and Ruth Ng
On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR
Hiroki Okada, Rachel Player, Simon Pohmann, and Christian Weinert
Hiroki Okada, Rachel Player, Simon Pohmann, and Christian Weinert
Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure
Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, and Xiaoyun Wang
Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, and Xiaoyun Wang
Constructions of Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks
Claude Carlet and Palash Sarkar
Claude Carlet and Palash Sarkar
Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity
Xingwei Ren, Yongqiang Li, and Mingsheng Wang
Xingwei Ren, Yongqiang Li, and Mingsheng Wang
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem
Borui GONG, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, and Lichun Li
Borui GONG, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, and Lichun Li
RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage
Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, and Siu-Ming Yiu
Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, and Siu-Ming Yiu
Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial
Chang Chen, Zelong Wu, Guoyu Yang, Qi Chen, Wei Wang, and Jin Li
Chang Chen, Zelong Wu, Guoyu Yang, Qi Chen, Wei Wang, and Jin Li
SoK: 5 Years of Neural Differential Cryptanalysis
David Gerault, Anna Hambitzer, Moritz Huppert, and Stjepan Picek
David Gerault, Anna Hambitzer, Moritz Huppert, and Stjepan Picek
Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups)
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, and Lei Yang
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, and Lei Yang
Point (de)compression for elliptic curves over highly $2$-adic finite fields
Dmitrii Koshelev
Dmitrii Koshelev
Improved Cryptanalysis of SNOVA
Ward Beullens
Ward Beullens
Universal Composable Transaction Serialization with Order Fairness
Michele Ciampi, Aggelos Kiayias, and Yu Shen
Michele Ciampi, Aggelos Kiayias, and Yu Shen
Identity-Based Encryption from Lattices with More Compactness in the Standard Model
Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, and Dawu Gu
Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, and Dawu Gu
Don't Trust Setup! New Directions in Pre-Constrained Cryptography
Shweta Agrawal, Simran Kumari, and Ryo Nishimaki
Shweta Agrawal, Simran Kumari, and Ryo Nishimaki
Greyhound: Fast Polynomial Commitments from Lattices
Ngoc Khanh Nguyen and Gregor Seiler
Ngoc Khanh Nguyen and Gregor Seiler
Chosen Ciphertext Security for (Hierarchical) Identity-Based Matchmaking Encryption
Sohto Chiku, Keisuke Hara, and Junji Shikata
Sohto Chiku, Keisuke Hara, and Junji Shikata
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
Rafaël del Pino, Shuichi Katsumata, Thomas Prest, and Mélissa Rossi
Rafaël del Pino, Shuichi Katsumata, Thomas Prest, and Mélissa Rossi
SoK: Computational and Distributed Differential Privacy for MPC
Fredrik Meisingseth and Christian Rechberger
Fredrik Meisingseth and Christian Rechberger
Improved Lattice Blind Signatures from Recycled Entropy
Corentin Jeudy and Olivier Sanders
Corentin Jeudy and Olivier Sanders
KpqClean Ver2: Comprehensive Benchmarking and Analysis of KpqC Algorithm Round 2 Submissions
Minjoo Sim, Siwoo Eum, Gyeongju Song, Minwoo Lee, Sangwon Kim, Minho Song, and Hwajeong Seo
Minjoo Sim, Siwoo Eum, Gyeongju Song, Minwoo Lee, Sangwon Kim, Minho Song, and Hwajeong Seo
Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA)
Vadim Lyubashevsky
Vadim Lyubashevsky
Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions
Hirofumi Yoshioka, Wakaha Ogata, and Keitaro Hashimoto
Hirofumi Yoshioka, Wakaha Ogata, and Keitaro Hashimoto
Robust Multiparty Computation from Threshold Encryption Based on RLWE
Antoine Urban and Matthieu Rambaud
Antoine Urban and Matthieu Rambaud
Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused
Youngjin Bae, Jung Hee Cheon, Guillaume Hanrot, Jai Hyun Park, and Damien Stehlé
Youngjin Bae, Jung Hee Cheon, Guillaume Hanrot, Jai Hyun Park, and Damien Stehlé
Password-authenticated Cryptography from Consumable Tokens
Ghada Almashaqbeh
Ghada Almashaqbeh
NTRU+PKE: Efficient Public-Key Encryption Schemes from the NTRU Problem
Jonghyun Kim and Jong Hwan Park
Jonghyun Kim and Jong Hwan Park
Stackproofs: Private proofs of stack and contract execution using Protogalaxy
Liam Eagen, Ariel Gabizon, Marek Sefranek, Patrick Towa, and Zachary J. Williamson
Liam Eagen, Ariel Gabizon, Marek Sefranek, Patrick Towa, and Zachary J. Williamson
A Survey on SoC Security Verification Methods at the Pre-silicon Stage
Rasheed Kibria, Farimah Farahmandi, and Mark Tehranipoor
Rasheed Kibria, Farimah Farahmandi, and Mark Tehranipoor
Improved Polynomial Division in Cryptography
Kostas Kryptos Chalkias, Charanjit Jutla, Jonas Lindstrom, Varun Madathil, and Arnab Roy
Kostas Kryptos Chalkias, Charanjit Jutla, Jonas Lindstrom, Varun Madathil, and Arnab Roy
Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys
Ravi Anand, Shibam Ghosh, Takanori Isobe, and Rentaro Shiba
Ravi Anand, Shibam Ghosh, Takanori Isobe, and Rentaro Shiba
Robust but Relaxed Probing Model
Nicolai Müller and Amir Moradi
Nicolai Müller and Amir Moradi
A bound on the quantum value of all compiled nonlocal games
Alexander Kulpe, Giulio Malavolta, Connor Paddock, Simon Schmidt, and Michael Walter
Alexander Kulpe, Giulio Malavolta, Connor Paddock, Simon Schmidt, and Michael Walter
MIFARE Classic: exposing the static encrypted nonce variant
Philippe Teuwen
Philippe Teuwen
Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples
Vincent Rieder
Vincent Rieder
HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost
Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, and Jiaheng Zhang
Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, and Jiaheng Zhang
An Improved Algorithm for Code Equivalence
Julian Nowakowski
Julian Nowakowski
AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs
Hongrui Cui, Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu
Hongrui Cui, Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu
Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting
Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, and Shichang Wang
Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, and Shichang Wang
Cryptographic Security through Kleene’s Theorem and Automata Theory
Mike Wa Nkongolo
Mike Wa Nkongolo
Improved YOSO Randomness Generation with Worst-Case Corruptions
Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, and Sri AravindaKrishnan Thyagarajan
Chrysalis Cipher Suite
Ian Malloy and Dennis Hollenbeck
Ian Malloy and Dennis Hollenbeck
Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond
D'or Banoun, Elette Boyle, and Ran Cohen
D'or Banoun, Elette Boyle, and Ran Cohen
Safe curves for elliptic-curve cryptography
Daniel J. Bernstein and Tanja Lange
Daniel J. Bernstein and Tanja Lange
Succinct Non-Subsequence Arguments
San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, and Yingfei Yan
San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, and Yingfei Yan
A Security Analysis of Two Classes of RSA-like Cryptosystems
Paul Cotan and George Teseleanu
Paul Cotan and George Teseleanu
Dilithium-Based Verifiable Timed Signature Scheme
Erkan Uslu and Oğuz Yayla
Erkan Uslu and Oğuz Yayla
A Key-Recovery Attack on a Leaky Seasign Variant
Shai Levin
Shai Levin
zk-Promises: Making Zero-Knowledge Objects Accept the Call for Banning and Reputation
Maurice Shih, Michael Rosenberg, Hari Kailad, and Ian Miers
Maurice Shih, Michael Rosenberg, Hari Kailad, and Ian Miers
Efficient (Non-)Membership Tree from Multicollision-Resistance with Applications to Zero-Knowledge Proofs
Maksym Petkus
Maksym Petkus
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange
Mihir Bellare, Doreen Riepel, Stefano Tessaro, and Yizhao Zhang
Mihir Bellare, Doreen Riepel, Stefano Tessaro, and Yizhao Zhang
Committing Wide Encryption Mode with Minimum Ciphertext Expansion
Yusuke Naito, Yu Sasaki, and Takeshi Sugawara
Yusuke Naito, Yu Sasaki, and Takeshi Sugawara
Concrete Analysis of Schnorr-type Signatures with Aborts
Theo Fanuela Prabowo and Chik How Tan
Theo Fanuela Prabowo and Chik How Tan
Compass: Encrypted Semantic Search with High Accuracy
Jinhao Zhu, Liana Patel, Matei Zaharia, and Raluca Ada Popa
Jinhao Zhu, Liana Patel, Matei Zaharia, and Raluca Ada Popa
Non-Interactive Zero-Knowledge from LPN and MQ
Quang Dao, Aayush Jain, and Zhengzhong Jin
Quang Dao, Aayush Jain, and Zhengzhong Jin
FELIX (XGCD for FALCON): FPGA-based Scalable and Lightweight Accelerator for Large Integer Extended GCD
Sam Coulon, Tianyou Bao, and Jiafeng Xie
Sam Coulon, Tianyou Bao, and Jiafeng Xie
Legendre Sequences are Pseudorandom under the Quadratic-Residuosity Assumption
Henry Corrigan-Gibbs and David J. Wu
Henry Corrigan-Gibbs and David J. Wu
EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements
Daniel Dobkin, Edut Katz, David Popovtzer, and Itamar Levi
Daniel Dobkin, Edut Katz, David Popovtzer, and Itamar Levi
AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation
Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, and Song Bian
Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, and Song Bian
Koala: A Low-Latency Pseudorandom Function
Parisa Amiri Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, and Gilles Van Assche
Parisa Amiri Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, and Gilles Van Assche
A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme
Morgane Guerreau and Mélissa Rossi
Morgane Guerreau and Mélissa Rossi
A Note on the Quasigroup Lai-Massey Structures
George Teseleanu
George Teseleanu
MSMAC: Accelerating Multi-Scalar Multiplication for Zero-Knowledge Proof
Pengcheng Qiu, Guiming Wu, Tingqiang Chu, Changzheng Wei, Runzhou Luo, Ying Yan, Wei Wang, and Hui Zhang
Pengcheng Qiu, Guiming Wu, Tingqiang Chu, Changzheng Wei, Runzhou Luo, Ying Yan, Wei Wang, and Hui Zhang
Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments
Michel Dellepere, Pratyush Mishra, and Alireza Shirzad
Michel Dellepere, Pratyush Mishra, and Alireza Shirzad
A Note on ``Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations
Thales B. Paiva, Marcos A. Simplicio Jr, Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo L. Cominetti, and Henrique S. Ogawa
Thales B. Paiva, Marcos A. Simplicio Jr, Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo L. Cominetti, and Henrique S. Ogawa
Beyond the Whitepaper: Where BFT Consensus Protocols Meet Reality
David Wong, Denis Kolegov, and Ivan Mikushin
David Wong, Denis Kolegov, and Ivan Mikushin
PROF: Protected Order Flow in a Profit-Seeking World
Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, and Ari Juels
Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, and Ari Juels
ARADI and LLAMA: Low-Latency Cryptography for Memory Encryption
Patricia Greene, Mark Motley, and Bryan Weeks
Patricia Greene, Mark Motley, and Bryan Weeks
Efficient Differentially Private Set Intersection
Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, and Yuan Hong
Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, and Yuan Hong
Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption
Rachit Garg, Rishab Goyal, and George Lu
Rachit Garg, Rishab Goyal, and George Lu
Efficient Variants of TNT with BBB Security
Ritam Bhaumik, Wonseok Choi, Avijit Dutta, Cuauhtemoc Mancillas López, Hrithik Nandi, and Yaobin Shen
Ritam Bhaumik, Wonseok Choi, Avijit Dutta, Cuauhtemoc Mancillas López, Hrithik Nandi, and Yaobin Shen
Optimizing Big Integer Multiplication on Bitcoin: Introducing w-windowed Approach
Dmytro Zakharov, Oleksandr Kurbatov, Manish Bista, and Belove Bist
Dmytro Zakharov, Oleksandr Kurbatov, Manish Bista, and Belove Bist
Blue fish, red fish, live fish, dead fish
Victor Shoup
Victor Shoup
EagleSignV3 : A new secure variant of EagleSign signature over lattices
Abiodoun Clement Hounkpevi, Sidoine Djimnaibeye, Michel Seck, and Djiby Sow
Abiodoun Clement Hounkpevi, Sidoine Djimnaibeye, Michel Seck, and Djiby Sow
Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC
Juliane Krämer, Patrick Struck, and Maximiliane Weishäupl
Juliane Krämer, Patrick Struck, and Maximiliane Weishäupl
Efficient and Privacy-Preserving Collective Remote Attestation for NFV
Ghada Arfaoui, Thibaut Jacques, and Cristina Onete
Ghada Arfaoui, Thibaut Jacques, and Cristina Onete
A Composable View of Homomorphic Encryption and Authenticator
Ganyuan Cao
Ganyuan Cao
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY
Jianing Zhang, Haoyang Wang, and Deng Tang
Jianing Zhang, Haoyang Wang, and Deng Tang
Benchmarking Attacks on Learning with Errors
Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, and Kristin Lauter
Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, and Kristin Lauter
Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models
Elijah Pelofske, Vincent Urias, and Lorie M. Liebrock
Elijah Pelofske, Vincent Urias, and Lorie M. Liebrock
ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments
Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, and Fan Zhang
Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, and Fan Zhang
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols
Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, and David Basin
Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, and David Basin
SIGNITC: Supersingular Isogeny Graph Non-Interactive Timed Commitments
Knud Ahrens
Knud Ahrens
Generic Construction of Secure Sketches from Groups
Axel Durbet, Koray Karabina, and Kevin Thiry-Atighehchi
Axel Durbet, Koray Karabina, and Kevin Thiry-Atighehchi
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level
Diego F. Aranha, Georgios Fotiadis, and Aurore Guillevic
Diego F. Aranha, Georgios Fotiadis, and Aurore Guillevic
Quantum Implementation and Analysis of ARIA
Yujin Oh, Kyungbae Jang, Yujin Yang, and Hwajeong Seo
Yujin Oh, Kyungbae Jang, Yujin Yang, and Hwajeong Seo
Depth Optimized Quantum Circuits for HIGHT and LEA
Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, and Hwajeong Seo
Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, and Hwajeong Seo
Mova: Nova folding without committing to error terms
Nikolaos Dimitriou, Albert Garreta, Ignacio Manzur, and Ilia Vlasov
Nikolaos Dimitriou, Albert Garreta, Ignacio Manzur, and Ilia Vlasov
Foldable, Recursive Proofs of Isogeny Computation with Reduced Time Complexity
Krystal Maughan, Joseph Near, and Christelle Vincent
Krystal Maughan, Joseph Near, and Christelle Vincent
A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities
Xavier Bonnetain and Virginie Lallemand
Xavier Bonnetain and Virginie Lallemand
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis
Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, and Kouichi Sakurai
Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, and Kouichi Sakurai
Delegatable Anonymous Credentials From Mercurial Signatures With Stronger Privacy
Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, and Daniel Slamanig
Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, and Daniel Slamanig
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols
Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, and Bogdan Warinschi
Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, and Bogdan Warinschi
Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks
Jiawei Zhang, Jiangshan Long, Changhai Ou, Kexin Qiao, Fan Zhang, and Shi Yan
Jiawei Zhang, Jiangshan Long, Changhai Ou, Kexin Qiao, Fan Zhang, and Shi Yan
Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions
Kaartik Bhushan, Alexis Korb, and Amit Sahai
Kaartik Bhushan, Alexis Korb, and Amit Sahai
Efficient Layered Circuit for Verification of SHA3 Merkle Tree
Changchang Ding and Zheming Fu
Changchang Ding and Zheming Fu
A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems
Julius Hermelink, Silvan Streit, Erik Mårtensson, and Richard Petri
Julius Hermelink, Silvan Streit, Erik Mårtensson, and Richard Petri
More Optimizations to Sum-Check Proving
Quang Dao and Justin Thaler
Quang Dao and Justin Thaler
Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets
Mohammed Alghazwi, Tariq Bontekoe, Leon Visscher, and Fatih Turkmen
Mohammed Alghazwi, Tariq Bontekoe, Leon Visscher, and Fatih Turkmen
Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation
Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, and Pratyush Mishra
Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, and Pratyush Mishra
What Have SNARGs Ever Done for FHE?
Michael Walter
Michael Walter
Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis
Daniel de Haro Moraes, Joao Paulo Aragao Pereira, Bruno Estolano Grossi, Gustavo Mirapalheta, George Marcel Monteiro Arcuri Smetana, Wesley Rodrigues, Courtnay Nery Guimarães Jr., Bruno Domingues, Fábio Saito, and Marcos Simplício
Daniel de Haro Moraes, Joao Paulo Aragao Pereira, Bruno Estolano Grossi, Gustavo Mirapalheta, George Marcel Monteiro Arcuri Smetana, Wesley Rodrigues, Courtnay Nery Guimarães Jr., Bruno Domingues, Fábio Saito, and Marcos Simplício
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
A fast heuristic for mapping Boolean circuits to functional bootstrapping
Sergiu Carpov
Sergiu Carpov
Preservation of Speculative Constant-time by Compilation
Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Grégoire, and Vincent Laporte
Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Grégoire, and Vincent Laporte
Prover - Toward More Efficient Formal Verification of Masking in Probing Model
Feng Zhou, Hua Chen, and Limin Fan
Feng Zhou, Hua Chen, and Limin Fan
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction
Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
Depth-Aware Arithmetization of Common Primitives in Prime Fields
Jelle Vos, Mauro Conti, and Zekeriya Erkin
Jelle Vos, Mauro Conti, and Zekeriya Erkin
On degrees of carry and Scholz's conjecture
Theophilus Agama
Theophilus Agama
ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA
Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, and Jingqiang Lin
Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, and Jingqiang Lin
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, and Jian Weng
Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, and Jian Weng
Client-Aided Privacy-Preserving Machine Learning
Peihan Miao, Xinyi Shi, Chao Wu, and Ruofan Xu
Peihan Miao, Xinyi Shi, Chao Wu, and Ruofan Xu
Efficient Implementation of Super-optimal Pairings on Curves with Small Prime Fields at the 192-bit Security Level
Jianming Lin, Chang-An Zhao, and Yuhao Zheng
Jianming Lin, Chang-An Zhao, and Yuhao Zheng
Hardware Implementation and Security Analysis of Local-Masked NTT for CRYSTALS-Kyber
Rafael Carrera Rodriguez, Emanuele Valea, Florent Bruguier, and Pascal Benoit
Rafael Carrera Rodriguez, Emanuele Valea, Florent Bruguier, and Pascal Benoit
The syzygy distinguisher
Hugues RANDRIAMBOLOLONA
Hugues RANDRIAMBOLOLONA
Towards ML-KEM & ML-DSA on OpenTitan
Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, and Andreas Zankl
Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, and Andreas Zankl
A note on ``a novel authentication protocol for IoT-enabled devices''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function
Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, and Frank Hartmann
Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, and Frank Hartmann
The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange
Jeb Bearer, Benedikt Bünz, Philippe Camacho, Binyi Chen, Ellie Davidson, Ben Fisch, Brendon Fish, Gus Gutoski, Fernando Krell, Chengyu Lin, Dahlia Malkhi, Kartik Nayak, Keyao Shen, Alex Xiong, Nathan Yospe, and Sishan Long
Jeb Bearer, Benedikt Bünz, Philippe Camacho, Binyi Chen, Ellie Davidson, Ben Fisch, Brendon Fish, Gus Gutoski, Fernando Krell, Chengyu Lin, Dahlia Malkhi, Kartik Nayak, Keyao Shen, Alex Xiong, Nathan Yospe, and Sishan Long
Lightweight Dynamic Linear Components for Symmetric Cryptography
S. M. Dehnavi and M. R. Mirzaee Shamsabad
S. M. Dehnavi and M. R. Mirzaee Shamsabad
STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES
Yaacov Belenky, Hennadii Chernyshchyk, Oleg Karavaev, Oleh Maksymenko, Valery Teper, Daria Ryzhkova, Itamar Levi, Osnat Keren, and Yury Kreimer
Yaacov Belenky, Hennadii Chernyshchyk, Oleg Karavaev, Oleh Maksymenko, Valery Teper, Daria Ryzhkova, Itamar Levi, Osnat Keren, and Yury Kreimer
MATTER: A Wide-Block Tweakable Block Cipher
Roberto Avanzi, Orr Dunkelman, and Kazuhiko Minematsu
Roberto Avanzi, Orr Dunkelman, and Kazuhiko Minematsu
Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies
Giacomo Borin, Yi-Fu Lai, and Antonin Leroux
Giacomo Borin, Yi-Fu Lai, and Antonin Leroux
Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric
Zhaoman Liu, Jianting Ning, Huiying Hou, and Yunlei Zhao
Zhaoman Liu, Jianting Ning, Huiying Hou, and Yunlei Zhao
Updatable Private Set Intersection from Structured Encryption
Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, and Jaspal Singh
Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, and Jaspal Singh
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation
Aditya Damodaran, Simon Rastikian, Peter B. Rønne, and Peter Y A Ryan
Aditya Damodaran, Simon Rastikian, Peter B. Rønne, and Peter Y A Ryan
AQQUA: Augmenting Quisquis with Auditability
George Papadoulis, Danai Balla, Panagiotis Grontas, and Aris Pagourtzis
George Papadoulis, Danai Balla, Panagiotis Grontas, and Aris Pagourtzis
Fast computation of 2-isogenies in dimension 4 and cryptographic applications
Pierrick Dartois
Pierrick Dartois
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems
Dominik Marchsreiter
Dominik Marchsreiter
Cryptanalysis of two post-quantum authenticated key agreement protocols
Mehdi Abri and Hamid Mala
Mehdi Abri and Hamid Mala
A zero-trust swarm security architecture and protocols
Alex Shafarenko
Alex Shafarenko
AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities
Vlasis Koutsos, Sankarshan Damle, Dimitrios Papadopoulos, Sujit Gujar, and Dimitris Chatzopoulos
Vlasis Koutsos, Sankarshan Damle, Dimitrios Papadopoulos, Sujit Gujar, and Dimitris Chatzopoulos
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber
Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, and Jian Weng
Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, and Jian Weng
Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms
Hengyi Luo, Kaijie Jiang, Yanbin Pan, and Anyu Wang
Hengyi Luo, Kaijie Jiang, Yanbin Pan, and Anyu Wang
Generalized class group actions on oriented elliptic curves with level structure
Sarah Arpin, Wouter Castryck, Jonathan Komada Eriksen, Gioella Lorenzon, and Frederik Vercauteren
Sarah Arpin, Wouter Castryck, Jonathan Komada Eriksen, Gioella Lorenzon, and Frederik Vercauteren
Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem
Akshima, Tyler Besselman, Siyao Guo, Zhiye Xie, and Yuping Ye
Akshima, Tyler Besselman, Siyao Guo, Zhiye Xie, and Yuping Ye
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, and Ingrid Verbauwhede
Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, and Ingrid Verbauwhede
Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques
Sulaiman Alhussaini and Serge˘ı Sergeev
Sulaiman Alhussaini and Serge˘ı Sergeev
Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel
Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, and Wenrui Ma
Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, and Wenrui Ma
Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited
Tamara Finogina, Javier Herranz, and Peter B. Roenne
Tamara Finogina, Javier Herranz, and Peter B. Roenne
On the Relationship between FuncCPA and FuncCPA+
Takumi Shinozaki, Keisuke Tanaka, Masayuki Tezuka, and Yusuke Yoshida
Takumi Shinozaki, Keisuke Tanaka, Masayuki Tezuka, and Yusuke Yoshida
Respire: High-Rate PIR for Databases with Small Records
Alexander Burton, Samir Jordan Menon, and David J. Wu
Alexander Burton, Samir Jordan Menon, and David J. Wu
A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More
Thomas den Hollander and Daniel Slamanig
Thomas den Hollander and Daniel Slamanig
On the Number of Restricted Solutions to Constrained Systems and their Applications
Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, and Abishanka Saha
Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, and Abishanka Saha
Practical Traceable Receipt-Free Encryption
Henri Devillez, Olivier Pereira, and Thomas Peters
Henri Devillez, Olivier Pereira, and Thomas Peters
On the Concrete Security of Non-interactive FRI
Alexander R. Block and Pratyush Ranjan Tiwari
Alexander R. Block and Pratyush Ranjan Tiwari
Post-Quantum Access Control with Application to Secure Data Retrieval
Behzad Abdolmaleki, Hannes Blümel, Giacomo Fenzi, Homa Khajeh, Stefan Köpsell, and Maryam Zarezadeh
Behzad Abdolmaleki, Hannes Blümel, Giacomo Fenzi, Homa Khajeh, Stefan Köpsell, and Maryam Zarezadeh
LaPSuS – A Lattice-Based Private Stream Aggregation Scheme under Scrutiny
Johannes Ottenhues and Alexander Koch
Johannes Ottenhues and Alexander Koch
A Note on `` Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Shift-invariant functions and almost liftings
Jan Kristian Haugland and Tron Omland
Jan Kristian Haugland and Tron Omland
On affine forestry over integral domains and families of deep Jordan-Gauss graphs
Tymoteusz Chojecki, Grahame Erskine, James Tuite, and Vasyl Ustimenko
Tymoteusz Chojecki, Grahame Erskine, James Tuite, and Vasyl Ustimenko
Cross Ledger Transaction Consistency for Financial Auditing
Vlasis Koutsos, Xiangan Tian, Dimitrios Papadopoulos, and Dimitris Chatzopoulos
Vlasis Koutsos, Xiangan Tian, Dimitrios Papadopoulos, and Dimitris Chatzopoulos
Blockchain Space Tokenization
Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, and Giorgos Panagiotakos
Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, and Giorgos Panagiotakos
Designated-Verifier zk-SNARKs Made Easy
Chen Li and Fangguo Zhang
Chen Li and Fangguo Zhang
Secure Multiparty Computation of Symmetric Functions with Polylogarithmic Bottleneck Complexity and Correlated Randomness
Reo Eriguchi
Reo Eriguchi
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models
Aydin Abadi, Vishnu Asutosh Dasu, and Sumanta Sarkar
Aydin Abadi, Vishnu Asutosh Dasu, and Sumanta Sarkar
Finding Practical Parameters for Isogeny-based Cryptography
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Francisco Rodríguez-Henríquez
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Francisco Rodríguez-Henríquez
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, and Rina Zeitoun
Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, and Rina Zeitoun
On hermitian decomposition lattices and the module-LIP problem in rank 2
Thomas Espitau and Heorhii Pliatsok
Thomas Espitau and Heorhii Pliatsok
A reduction from Hawk to the principal ideal problem in a quaternion algebra
Clémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, and Alexandre Wallet
Clémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, and Alexandre Wallet
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions
Minglang Dong, Yu Chen, Cong Zhang, and Yujie Bai
Minglang Dong, Yu Chen, Cong Zhang, and Yujie Bai
A Practical and Scalable Implementation of the Vernam Cipher, under Shannon Conditions, using Quantum Noise
Adrian Neal
Adrian Neal
A Note on ``Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
LR-OT: Leakage-Resilient Oblivious Transfer
Francesco Berti, Carmit Hazay, and Itamar Levi
Francesco Berti, Carmit Hazay, and Itamar Levi
Predicting one class of truncated matrix congruential generators with unknown parameters
Changcun Wang and Zhaopeng Dai
Changcun Wang and Zhaopeng Dai
Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption
Chen Yang, Jingwei Chen, Wenyuan Wu, and Yong Feng
Chen Yang, Jingwei Chen, Wenyuan Wu, and Yong Feng
Permutation Superposition Oracles for Quantum Query Lower Bounds
Christian Majenz, Giulio Malavolta, and Michael Walter
Christian Majenz, Giulio Malavolta, and Michael Walter
Anonymous Outsourced Statekeeping with Reduced Server Storage
Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, and Michael Rosenberg
Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, and Michael Rosenberg
Dot-Product Proofs and Their Applications
Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, and David J. Wu
Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, and David J. Wu
Cryptanalysis of EagleSign
Ludo N. Pulles and Mehdi Tibouchi
Ludo N. Pulles and Mehdi Tibouchi
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3
Zhongyi Zhang, Chengan Hou, and Meicheng Liu
Zhongyi Zhang, Chengan Hou, and Meicheng Liu
Scalable and Lightweight State-Channel Audits
Christian Badertscher, Maxim Jourenko, Dimitris Karakostas, and Mario Larangeira
Christian Badertscher, Maxim Jourenko, Dimitris Karakostas, and Mario Larangeira
Exploiting signature leakages: breaking Enhanced pqsigRM
Thomas Debris-Alazard, Pierre Loisel, and Valentin Vasseur
Thomas Debris-Alazard, Pierre Loisel, and Valentin Vasseur
Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis
Hossein Arabnezhad and Babak Sadeghiyan
Hossein Arabnezhad and Babak Sadeghiyan
A New PPML Paradigm for Quantized Models
Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, and Kui Ren
Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, and Kui Ren
Jolt-b: recursion friendly Jolt with basefold commitment
Hang Su, Qi Yang, and Zhenfei Zhang
Hang Su, Qi Yang, and Zhenfei Zhang
Distributed Verifiable Random Function With Compact Proof
Ahmet Ramazan Ağırtaş, Arda Buğra Özer, Zülfükar Saygı, and Oğuz Yayla
Ahmet Ramazan Ağırtaş, Arda Buğra Özer, Zülfükar Saygı, and Oğuz Yayla
Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions
Ryuya Hayashi, Yusuke Sakai, and Shota Yamada
Ryuya Hayashi, Yusuke Sakai, and Shota Yamada
Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE
Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, and Moti Yung
Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, and Moti Yung
Curl: Private LLMs through Wavelet-Encoded Look-Up Tables
Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, and Miguel de Vega
Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, and Miguel de Vega
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods
Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, and Stefano Tessaro
Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, and Stefano Tessaro
Revisiting PACD-based Attacks on RSA-CRT
Guillaume Barbu, Laurent Grémy, and Roch Lescuyer
Guillaume Barbu, Laurent Grémy, and Roch Lescuyer
OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms
Maximilian Kroschewski, Anja Lehmann, and Cavit Özbay
Maximilian Kroschewski, Anja Lehmann, and Cavit Özbay
Switching Off your Device Does Not Protect Against Fault Attacks
Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, and Vincent Grosso
Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, and Vincent Grosso
Finding Bugs and Features Using Cryptographically-Informed Functional Testing
Giacomo Fenzi, Jan Gilcher, and Fernando Virdia
Giacomo Fenzi, Jan Gilcher, and Fernando Virdia
Implementation and Performance Evaluation of Elliptic Curve Cryptography over SECP256R1 on STM32 Microprocessor
Onur İşler
Onur İşler
A Fast and Efficient SIKE Co-Design: Coarse-Grained Reconfigurable Accelerators with Custom RISC-V Microcontroller on FPGA
Jing Tian, Bo Wu, Lang Feng, Haochen Zhang, and Zhongfeng Wang
Jing Tian, Bo Wu, Lang Feng, Haochen Zhang, and Zhongfeng Wang
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
Shared-Custodial Password-Authenticated Deterministic Wallets
Poulami Das, Andreas Erwig, and Sebastian Faust
Poulami Das, Andreas Erwig, and Sebastian Faust
Oryx: Private detection of cycles in federated graphs
Ke Zhong and Sebastian Angel
Ke Zhong and Sebastian Angel
A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR
Shen Dong, Hongrui Cui, Kaiyi Zhang, Kang Yang, and Yu Yu
Shen Dong, Hongrui Cui, Kaiyi Zhang, Kang Yang, and Yu Yu
Public vs Private Blockchains lineage storage
Bilel Zaghdoudi and Maria Potop Butucaru
Bilel Zaghdoudi and Maria Potop Butucaru
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, and Takashi Nishide
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, and Takashi Nishide
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors
Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, and Mehdi Tibouchi
Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, and Mehdi Tibouchi
HERatio: Homomorphic Encryption of Rationals using Laurent Polynomials
Luke Harmon, Gaetan Delavignette, and Hanes Oliveira
Luke Harmon, Gaetan Delavignette, and Hanes Oliveira
Collision Attacks on Galois/Counter Mode (GCM)
John Preuß Mattsson
John Preuß Mattsson
Legacy Encryption Downgrade Attacks against LibrePGP and CMS
Falko Strenzke and Johannes Roth
Falko Strenzke and Johannes Roth
QuickPool: Privacy-Preserving Ride-Sharing Service
Banashri Karmakar, Shyam Murthy, Arpita Patra, and Protik Paul
Banashri Karmakar, Shyam Murthy, Arpita Patra, and Protik Paul
Faster Asynchronous Blockchain Consensus and MVBA
Matthieu Rambaud
Matthieu Rambaud
Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements
Colin O'Flynn
Colin O'Flynn
Masked Vector Sampling for HQC
Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, and Laurent Sauvage
Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, and Laurent Sauvage
A New CRT-based Fully Homomorphic Encryption
Anil Kumar Pradhan
Anil Kumar Pradhan
Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions
Amos Beimel, Tal Malkin, and Noam Mazor
Amos Beimel, Tal Malkin, and Noam Mazor
A Note on Efficient Computation of the Multilinear Extension
Ron D. Rothblum
Ron D. Rothblum
A Note on ``Privacy Preserving n-Party Scalar Product Protocol''
Lihua Liu
Lihua Liu
Stickel’s Protocol using Tropical Increasing Matrices
Any Muanalifah, Zahari Mahad, Nurwan, and Rosalio G Artes
Any Muanalifah, Zahari Mahad, Nurwan, and Rosalio G Artes
Unforgeability of Blind Schnorr in the Limited Concurrency Setting
Franklin Harding and Jiayu Xu
Franklin Harding and Jiayu Xu
FHE-MENNs: Opportunities and Pitfalls for Accelerating Fully Homomorphic Private Inference with Multi-Exit Neural Networks
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
Lars Wolfgang Folkerts and Nektarios Georgios Tsoutsos
Limits of Black-Box Anamorphic Encryption
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging
Michael Anastos, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Matthew Kwan, Guillermo Pascual-Perez, and Krzysztof Pietrzak
Michael Anastos, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Matthew Kwan, Guillermo Pascual-Perez, and Krzysztof Pietrzak
Post-Quantum Ready Key Agreement for Aviation
Marcel Tiepelt, Christian Martin, and Nils Maeurer
Marcel Tiepelt, Christian Martin, and Nils Maeurer
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash
Debasmita Chakraborty and Mridul Nandi
Debasmita Chakraborty and Mridul Nandi
Notes on Multiplying Cyclotomic Polynomials on a GPU
Joseph Johnston
Joseph Johnston
Faster Lookup Table Evaluation with Application to Secure LLM Inference
Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, and Kui Ren
Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, and Kui Ren
Fusion Channel Attack with POI Learning Encoder
Xinyao Li, Xiwen Ren, Ling Ning, and Changhai Ou
Xinyao Li, Xiwen Ren, Ling Ning, and Changhai Ou
MatcHEd: Privacy-Preserving Set Similarity based on MinHash
Rostin Shokri, Charles Gouert, and Nektarios Georgios Tsoutsos
Rostin Shokri, Charles Gouert, and Nektarios Georgios Tsoutsos
PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption
Charles Gouert and Nektarios Georgios Tsoutsos
Charles Gouert and Nektarios Georgios Tsoutsos
Juliet: A Configurable Processor for Computing on Encrypted Data
Charles Gouert, Dimitris Mouris, and Nektarios Georgios Tsoutsos
Charles Gouert, Dimitris Mouris, and Nektarios Georgios Tsoutsos
HElix: Genome Similarity Detection in the Encrypted Domain
Rostin Shokri, Charles Gouert, and Nektarios Georgios Tsoutsos
Rostin Shokri, Charles Gouert, and Nektarios Georgios Tsoutsos
Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models
Lars Folkerts and Nektarios Georgios Tsoutsos
Lars Folkerts and Nektarios Georgios Tsoutsos
Obfuscated Key Exchange
Felix Günther, Douglas Stebila, and Shannon Veitch
Felix Günther, Douglas Stebila, and Shannon Veitch
Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy
Onur Gunlu
Onur Gunlu
Enabling Complete Atomicity for Cross-chain Applications Through Layered State Commitments
Yuandi Cai, Ru Cheng, Yifan Zhou, Shijie Zhang, Jiang Xiao, and Hai Jin
Yuandi Cai, Ru Cheng, Yifan Zhou, Shijie Zhang, Jiang Xiao, and Hai Jin
LEA Block Cipher in Rust Language: Trade-off between Memory Safety and Performance
Sangwon Kim, Siwoo Eum, Minho Song, and Hwajeong Seo
Sangwon Kim, Siwoo Eum, Minho Song, and Hwajeong Seo
Quantum Implementation of LSH
Yujin Oh, Kyungbae Jang, and Hwajeong Seo
Yujin Oh, Kyungbae Jang, and Hwajeong Seo
Practical Non-interactive Multi-signatures, and a Multi-to-Aggregate Signatures Compiler
Matthieu Rambaud and Christophe Levrat
Matthieu Rambaud and Christophe Levrat
Separating Selective Opening Security From Standard Security, Assuming IO
Justin Holmgren and Brent Waters
Justin Holmgren and Brent Waters
QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup
Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, and Sacha Servan-Schreiber
Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, and Sacha Servan-Schreiber
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols
Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, and Yifan Song
Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, and Yifan Song
Securely Training Decision Trees Efficiently
Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, and Divya Gupta
Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, and Divya Gupta
A More Compact AES, and More
Dag Arne Osvik and David Canright
Dag Arne Osvik and David Canright
TaSSLE: Lasso for the commitment-phobic
Daniel Dore
Daniel Dore
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop
Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, and Marco Zecchini
Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, and Marco Zecchini
Message Latency in Waku Relay with Rate Limiting Nullifiers
Alvaro Revuelta, Sergei Tikhomirov, Aaryamann Challani, Hanno Cornelius, and Simon Pierre Vivier
Alvaro Revuelta, Sergei Tikhomirov, Aaryamann Challani, Hanno Cornelius, and Simon Pierre Vivier
A Study of Partial Non-Linear Layers with DEFAULT and BAKSHEESH
Anubhab Baksi
Anubhab Baksi
On the efficient representation of isogenies (a survey)
Damien Robert
Damien Robert
Protecting cryptographic code against Spectre-RSB
Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, and Zhiyuan Zhang
Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, and Zhiyuan Zhang
Strong Existential Unforgeability and More of MPC-in-the-Head Signatures
Mukul Kulkarni and Keita Xagawa
Mukul Kulkarni and Keita Xagawa
From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation
Shahriar Ebrahimi and Parisa Hassanizadeh
Shahriar Ebrahimi and Parisa Hassanizadeh
Efficient Lattice-Based Threshold Signatures with Functional Interchangeability
Guofeng Tang, Bo Pang, Long Chen, and Zhenfeng Zhang
Guofeng Tang, Bo Pang, Long Chen, and Zhenfeng Zhang
VerITAS: Verifying Image Transformations at Scale
Trisha Datta, Binyi Chen, and Dan Boneh
Trisha Datta, Binyi Chen, and Dan Boneh
AITIA: Efficient Secure Computation of Bivariate Causal Discovery
Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, and Ni Trieu
Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, and Ni Trieu
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption
Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, and Zhenyu Guan
Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, and Zhenyu Guan
VIMz: Verifiable Image Manipulation using Folding-based zkSNARKs
Stefan Dziembowski, Shahriar Ebrahimi, and Parisa Hassanizadeh
Stefan Dziembowski, Shahriar Ebrahimi, and Parisa Hassanizadeh
Compact Key Function Secret Sharing with Non-linear Decoder
Chandan Kumar, Sikhar Patranabis, and Debdeep Mukhopadhyay
Chandan Kumar, Sikhar Patranabis, and Debdeep Mukhopadhyay
Insta-Pok3r: Real-time Poker on Blockchain
Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, and Sriram Sridhar
Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, and Sriram Sridhar
Quirky Interactive Reductions of Knowledge
Joseph Johnston
Joseph Johnston
HEProfiler: An In-Depth Profiler of Approximate Homomorphic Encryption Libraries
Jonathan Takeshita, Nirajan Koirala, Colin McKechney, and Taeho Jung
Jonathan Takeshita, Nirajan Koirala, Colin McKechney, and Taeho Jung
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them
Matteo Campanelli, Dario Fiore, and Rosario Gennaro
Matteo Campanelli, Dario Fiore, and Rosario Gennaro
Password-authenticated Key Exchange and Applications
Kristian Gjøsteen
Kristian Gjøsteen
Shuffle Arguments Based on Subset-Checking
Behzad Abdolmaleki, Prastudy Fauzi, Toomas Krips, and Janno Siim
Behzad Abdolmaleki, Prastudy Fauzi, Toomas Krips, and Janno Siim
Enhancing Local Verification: Aggregate and Multi-Signature Schemes
Ahmet Ramazan Ağırtaş, Neslihan Yaman Gökce, and Oğuz Yayla
Ahmet Ramazan Ağırtaş, Neslihan Yaman Gökce, and Oğuz Yayla
Optimized Computation of the Jacobi Symbol
Jonas Lindstrøm and Kostas Kryptos Chalkias
Jonas Lindstrøm and Kostas Kryptos Chalkias
Stochastic Secret Sharing with $1$-Bit Shares and Applications to MPC
Benny Applebaum and Eliran Kachlon
Benny Applebaum and Eliran Kachlon
A New Fine Tuning Method for FHEW/TFHE Bootstrapping with IND-CPAD Security
Deokhwa Hong, Young-Sik Kim, Yongwoo Lee, and Eunyoung Seo
Deokhwa Hong, Young-Sik Kim, Yongwoo Lee, and Eunyoung Seo
Adaptor Signatures: New Security Definition and A Generic Construction for NP Relations
Xiangyu Liu, Ioannis Tzannetos, and Vassilis Zikas
Xiangyu Liu, Ioannis Tzannetos, and Vassilis Zikas
On Sequential Functions and Fine-Grained Cryptography
Jiaxin Guan and Hart Montgomery
Jiaxin Guan and Hart Montgomery
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, and Goutam Tamvada
Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, and Goutam Tamvada
Distributional Secure Merge
Gayathri Garimella, Srinivasan Raghuramam, and Peter Rindal
Gayathri Garimella, Srinivasan Raghuramam, and Peter Rindal
Improved Multi-Party Fixed-Point Multiplication
Saikrishna Badrinarayanan, Eysa Lee, Peihan Miao, and Peter Rindal
Saikrishna Badrinarayanan, Eysa Lee, Peihan Miao, and Peter Rindal
The Sum-Check Protocol over Fields of Small Characteristic
Suyash Bagad, Yuval Domb, and Justin Thaler
Suyash Bagad, Yuval Domb, and Justin Thaler
Efficient Secret Sharing for Large-Scale Applications
Sarvar Patel, Giuseppe Persiano, Joon Young Seo, and Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Joon Young Seo, and Kevin Yeo
Searching for differential addition chains
Daniel J. Bernstein, Jolijn Cottaar, and Tanja Lange
Daniel J. Bernstein, Jolijn Cottaar, and Tanja Lange
Cryptography in the Common Haar State Model: Feasibility Results and Separations
Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin
Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model
Tariq Bontekoe, Hassan Jameel Asghar, and Fatih Turkmen
Tariq Bontekoe, Hassan Jameel Asghar, and Fatih Turkmen
Embedding Integer Lattices as Ideals into Polynomial Rings
Yihang Cheng, Yansong Feng, and Yanbin Pan
Yihang Cheng, Yansong Feng, and Yanbin Pan
PeaceFounder: centralised E2E verifiable evoting via pseudonym braiding and history trees
Janis Erdmanis
Janis Erdmanis
Reduction from Average-Case M-ISIS to Worst-Case CVP Over Perfect Lattices
Samuel Lavery
Samuel Lavery
Constraint-Packing and the Sum-Check Protocol over Binary Tower Fields
Quang Dao and Justin Thaler
Quang Dao and Justin Thaler
A note on adding zero-knowledge to STARKs
Ulrich Haböck and Al Kindi
Ulrich Haböck and Al Kindi
A note on the G-FFT
Ulrich Haböck
Ulrich Haböck
Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks
Sirui Shen and Chenglu Jin
Sirui Shen and Chenglu Jin
A Practical Protocol for Quantum Oblivious Transfer from One-Way Functions
Eleni Diamanti, Alex B. Grilo, Adriano Innocenzi, Pascal Lefebvre, Verena Yacoub, and Álvaro Yángüez
Eleni Diamanti, Alex B. Grilo, Adriano Innocenzi, Pascal Lefebvre, Verena Yacoub, and Álvaro Yángüez
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding
Shuichi Katsumata, Michael Reichle, and Kaoru Takemure
Shuichi Katsumata, Michael Reichle, and Kaoru Takemure
Threshold OPRF from Threshold Additive HE
Animesh Singh, Sikhar Patranabis, and Debdeep Mukhopadhyay
Animesh Singh, Sikhar Patranabis, and Debdeep Mukhopadhyay
SACfe: Secure Access Control in Functional Encryption with Unbounded Data
Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, and Tapas Pal
Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, and Tapas Pal
GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture
Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, and Fu Xiao
Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, and Fu Xiao
Oblivious Single Access Machines: A New Model for Oblivious Computation
Ananya Appan, David Heath, and Ling Ren
Ananya Appan, David Heath, and Ling Ren
FASIL: A challenge-based framework for secure and privacy-preserving federated learning
Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Tuna, Ramin Fuladi, and Utku Gülen
Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Tuna, Ramin Fuladi, and Utku Gülen
Structured-Seed Local Pseudorandom Generators and their Applications
Dung Bui, Geoffroy Couteau, and Nikolas Melissaris
Dung Bui, Geoffroy Couteau, and Nikolas Melissaris
MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing
Martin Zbudila, Erik Pohle, Aysajan Abidin, and Bart Preneel
Martin Zbudila, Erik Pohle, Aysajan Abidin, and Bart Preneel
Polynomial sharings on two secrets: Buy one, get one free
Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, and Maximilian Orlt
Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, and Maximilian Orlt
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity
Reyhaneh Rabaninejad, Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig, and Antonis Michalas
Reyhaneh Rabaninejad, Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig, and Antonis Michalas
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices
Feixiang Zhao, Huaxiong Wang, and Jian Weng
Feixiang Zhao, Huaxiong Wang, and Jian Weng
Competitive Policies for Online Collateral Maintenance
Ghada Almashaqbeh, Sixia Chen, and Alexander Russell
Ghada Almashaqbeh, Sixia Chen, and Alexander Russell
ammBoost: State Growth Control for AMMs
Nicholas Michel, Mohamed E. Najd, and Ghada Almashaqbeh
Nicholas Michel, Mohamed E. Najd, and Ghada Almashaqbeh
chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets
Zahra Motaqy, Mohamed E. Najd, and Ghada Almashaqbeh
Zahra Motaqy, Mohamed E. Najd, and Ghada Almashaqbeh
Exploiting Clock-Slew Dependent Variability in CMOS Digital Circuits Towards Power and EM SCA Resilience
Archisman Ghosh, Md. Abdur Rahman, Debayan Das, Santosh Ghosh, and Shreyas Sen
Archisman Ghosh, Md. Abdur Rahman, Debayan Das, Santosh Ghosh, and Shreyas Sen
Sparsity-Aware Protocol for ZK-friendly ML Models: Shedding Lights on Practical ZKML
Alan Li, Qingkai Liang, and Mo Dong
Alan Li, Qingkai Liang, and Mo Dong
Accelerating pairings on BW10 and BW14 Curves
Senegue Gomez Nyamsi, Laurian Guimagang Azebaze, and Emmanuel Fouotsa
Senegue Gomez Nyamsi, Laurian Guimagang Azebaze, and Emmanuel Fouotsa
A Succinct Range Proof for Polynomial-based Vector Commitment
Rui Gao, Zhiguo Wan, Yuncong Hu, and Huaqun Wang
Rui Gao, Zhiguo Wan, Yuncong Hu, and Huaqun Wang
Expediting Homomorphic Computation via Multiplicative Complexity-aware Multiplicative Depth Minimization
Mingfei Yu and Giovanni De Micheli
Mingfei Yu and Giovanni De Micheli
Grafting: Complementing RNS in CKKS
Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, and Jaehyung Kim
Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, and Jaehyung Kim
Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination
Aydin Abadi
Aydin Abadi
Supersonic OT: Fast Unconditionally Secure Oblivious Transfer
Aydin Abadi and Yvo Desmedt
Aydin Abadi and Yvo Desmedt
Secure Vickrey Auctions with Rational Parties
Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, and Girisha Shankar
Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, and Girisha Shankar
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion
Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, and Xuan Wang
Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, and Xuan Wang
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences
Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, and Daniele Venturi
Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, and Daniele Venturi
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods
Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, and Yongqiang Li
Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, and Yongqiang Li
On the vector subspaces of $\mathbb{F}_{2^n}$ over which the multiplicative inverse function sums to zero
Claude Carlet
Claude Carlet
Delegated-Query Oblivious Transfer and its Practical Applications
Yvo Desmedt and Aydin Abadi
Yvo Desmedt and Aydin Abadi
Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth
Weizhe Wang and Deng Tang
Weizhe Wang and Deng Tang
Relaxed Vector Commitment for Shorter Signatures
Seongkwang Kim, Byeonghak Lee, and Mincheol Son
Seongkwang Kim, Byeonghak Lee, and Mincheol Son
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system
Seongho Park, Jaekyoung Choi, Jihye Kim, and Hyunok Oh
Seongho Park, Jaekyoung Choi, Jihye Kim, and Hyunok Oh
Elementary Formulas for Greatest Common Divisors and Semiprime Factors
Joseph M. Shunia
Joseph M. Shunia
Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption
Elena Kirshanova, Chiara Marcolla, and Sergi Rovira
Elena Kirshanova, Chiara Marcolla, and Sergi Rovira
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures
Tjard Langhout, Huanhuan Chen, and Kaitai Liang
Tjard Langhout, Huanhuan Chen, and Kaitai Liang
ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes
Maryam Rezapour and Benjamin Fuller
Maryam Rezapour and Benjamin Fuller
Measuring Conditional Anonymity - A Global Study
Pascal Berrang, Paul Gerhart, and Dominique Schröder
Pascal Berrang, Paul Gerhart, and Dominique Schröder
Dishonest Majority Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers
Daniel Escudero, Antigoni Polychroniadou, Yifan Song, and Chenkai Weng
Daniel Escudero, Antigoni Polychroniadou, Yifan Song, and Chenkai Weng
Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR
Matthias Geihs
Matthias Geihs
Cross-chain bridges via backwards-compatible SNARKs
Sergio Juárez, Mark Blunden, Joris Koopman, Anish Mohammed, Kapil Shenvi Pause, and Steve Thakur
Sergio Juárez, Mark Blunden, Joris Koopman, Anish Mohammed, Kapil Shenvi Pause, and Steve Thakur
On Knowledge-Soundness of Plonk in ROM from Falsifiable Assumptions
Helger Lipmaa, Roberto Parisella, and Janno Siim
Helger Lipmaa, Roberto Parisella, and Janno Siim
Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions
George Lu and Mark Zhandry
George Lu and Mark Zhandry
An analysis of the Crossbred Algorithm for the MQ Problem
Damien Vidal, Sorina Ionica, and Claire Delaplace
Damien Vidal, Sorina Ionica, and Claire Delaplace
Leveled Homomorphic Encryption Schemes for Homomorphic Encryption Standard
Shuhong Gao and Kyle Yates
Shuhong Gao and Kyle Yates
Perfectly-secure Network-agnostic MPC with Optimal Resiliency
Shravani Patil and Arpita Patra
Shravani Patil and Arpita Patra
A Formal Treatment of End-to-End Encrypted Cloud Storage
Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, and Kenneth G. Paterson
Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, and Kenneth G. Paterson
Privacy-Preserving Dijkstra
Benjamin Ostrovsky
Benjamin Ostrovsky
CoGNN: Towards Secure and Efficient Collaborative Graph Learning
Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, and Mingwei Xu
Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, and Mingwei Xu
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption
Long Meng, Liqun Chen, Yangguang Tian, and Mark Manulis
Long Meng, Liqun Chen, Yangguang Tian, and Mark Manulis
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs
Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, and Sushmita Ruj
Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, and Sushmita Ruj
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version)
Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomáš Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdeněk Martinásek, and Shivam Bhasin
Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomáš Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdeněk Martinásek, and Shivam Bhasin
SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation
Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, and Farimah Farahmandi
Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, and Farimah Farahmandi
SoK: Programmable Privacy in Distributed Systems
Daniel Benarroch, Bryan Gillespie, Ying Tong Lai, and Andrew Miller
Daniel Benarroch, Bryan Gillespie, Ying Tong Lai, and Andrew Miller
Hadamard Product Arguments and Their Applications
Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, and Hyunok Oh
Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, and Hyunok Oh
FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference
Mohammad Hashemi, Dev Mehta, Kyle Mitard, Shahin Tajik, and Fatemeh Ganji
Mohammad Hashemi, Dev Mehta, Kyle Mitard, Shahin Tajik, and Fatemeh Ganji
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs
Alex Ozdemir, Evan Laufer, and Dan Boneh
Alex Ozdemir, Evan Laufer, and Dan Boneh
Distributed PIR: Scaling Private Messaging via the Users' Machines
Elkana Tovey, Jonathan Weiss, and Yossi Gilad
Elkana Tovey, Jonathan Weiss, and Yossi Gilad
Improved Boomerang Attacks on 6-Round AES
Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, and Victor Mollimard
Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, and Victor Mollimard
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds
Yuval Ishai, Elaine Shi, and Daniel Wichs
Yuval Ishai, Elaine Shi, and Daniel Wichs
ZLR: a fast online authenticated encryption scheme achieving full security
Wonseok Choi, Seongha Hwang, Byeonghak Lee, and Jooyoung Lee
Wonseok Choi, Seongha Hwang, Byeonghak Lee, and Jooyoung Lee
Towards Optimal Parallel Broadcast under a Dishonest Majority
Daniel Collins, Sisi Duan, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, and Haochen Wang
Daniel Collins, Sisi Duan, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, and Haochen Wang
ICICLE v2: Polynomial API for Coding ZK Provers to Run on Specialized Hardware
Karthik Inbasekar, Yuval Shekel, and Michael Asa
Karthik Inbasekar, Yuval Shekel, and Michael Asa
Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity
Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, and Sophia Yakoubov
Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, and Sophia Yakoubov
A Note on (2, 2)-isogenies via Theta Coordinates
Jianming Lin, Saiyu Wang, and Chang-An Zhao
Jianming Lin, Saiyu Wang, and Chang-An Zhao
Cryptography at the Crossroads: Ethical Responsibility, the Cypherpunk Movement and Institutions
Eric Blair
Eric Blair
Analysis, modify and apply in IIOT form light-weight PSI in CM20
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility
Jia Liu and Mark Manulis
Jia Liu and Mark Manulis
Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost
Itamar Levi and Osnat Keren
Itamar Levi and Osnat Keren
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis
Sengim Karayalcin, Guilherme Perin, and Stjepan Picek
Sengim Karayalcin, Guilherme Perin, and Stjepan Picek
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things
Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, and Bin Xiao
Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, and Bin Xiao
Malicious Security for PIR (almost) for Free
Brett Falk, Pratyush Mishra, and Matan Shtepel
Brett Falk, Pratyush Mishra, and Matan Shtepel
Shared OT and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition
Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, and Ni Trieu
Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, and Ni Trieu
Secure Account Recovery for a Privacy-Preserving Web Service
Ryan Little, Lucy Qin, and Mayank Varia
Ryan Little, Lucy Qin, and Mayank Varia
Efficient Execution Auditing for Blockchains under Byzantine Assumptions
Jeff Burdges, Alfonso Cevallos, Handan Kılınç Alper, Chen-Da Liu-Zhang, Fatemeh Shirazi, Alistair Stewart, Rob Habermeier, Robert Klotzner, and Andronik Ordian
Jeff Burdges, Alfonso Cevallos, Handan Kılınç Alper, Chen-Da Liu-Zhang, Fatemeh Shirazi, Alistair Stewart, Rob Habermeier, Robert Klotzner, and Andronik Ordian
Designs for practical SHE schemes based on Ring-LWR
Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, and Radu Titiu
Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, and Radu Titiu
Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices
Thomas Espitau, Guilhem Niot, and Thomas Prest
Thomas Espitau, Guilhem Niot, and Thomas Prest
Signer Revocability for Threshold Ring Signatures
Da Teng and Yanqing Yao
Da Teng and Yanqing Yao
VRaaS: Verifiable Randomness as a Service on Blockchains
Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, and Sri AravindaKrishnan Thyagarajan
Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, and Sri AravindaKrishnan Thyagarajan
SNARGs under LWE via Propositional Proofs
Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, and Vinod Vaikuntanathan
Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, and Vinod Vaikuntanathan
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections
Josh Benaloh, Michael Naehrig, Olivier Pereira, and Dan S. Wallach
Josh Benaloh, Michael Naehrig, Olivier Pereira, and Dan S. Wallach
Arithmetisation of computation via polynomial semantics for first-order logic
Murdoch J. Gabbay
Murdoch J. Gabbay
MixBuy: Contingent Payment in the Presence of Coin Mixers
Diego Castejon-Molina, Dimitrios Vasilopoulos, and Pedro Moreno-Sanchez
Diego Castejon-Molina, Dimitrios Vasilopoulos, and Pedro Moreno-Sanchez
Communication Complexity vs Randomness Complexity in Interactive Proofs
Benny Applebaum, Kaartik Bhushan, and Manoj Prabhakaran
Benny Applebaum, Kaartik Bhushan, and Manoj Prabhakaran
Notes on (failed) attempts to instantiate TLR3
Alexander Maximov
Alexander Maximov
DISCO: Dynamic Searchable Encryption with Constant State
Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, and Ee-Chien Chang
Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, and Ee-Chien Chang
Efficient 2PC for Constant Round Secure Equality Testing and Comparison
Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, and Kui Ren
Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, and Kui Ren
Return of the Kummer: a Toolbox for Genus-2 Cryptography
Maria Corte-Real Santos and Krijn Reijnders
Maria Corte-Real Santos and Krijn Reijnders
A Modular Approach to Registered ABE for Unbounded Predicates
Nuttapong Attrapadung and Junichi Tomida
Nuttapong Attrapadung and Junichi Tomida
Provably Secure Butterfly Key Expansion from the CRYSTALS Post-Quantum Schemes
Edward Eaton, Philippe Lamontagne, and Peter Matsakis
Edward Eaton, Philippe Lamontagne, and Peter Matsakis
Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes
Sathvika Balumuri, Edward Eaton, and Philippe Lamontagne
Sathvika Balumuri, Edward Eaton, and Philippe Lamontagne
Quantum CCA-Secure PKE, Revisited
Navid Alamati and Varun Maram
Navid Alamati and Varun Maram
Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs
Chaya Ganesh, Vineet Nair, and Ashish Sharma
Chaya Ganesh, Vineet Nair, and Ashish Sharma
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Client Stragglers
Riccardo Taiello, Melek Önen, Clémentine Gritti, and Marco Lorenzi
Riccardo Taiello, Melek Önen, Clémentine Gritti, and Marco Lorenzi
SmartZKCP: Towards Practical Data Exchange Marketplace Against Active Attacks
Xuanming Liu, Jiawen Zhang, Yinghao Wang, Xinpeng Yang, and Xiaohu Yang
Xuanming Liu, Jiawen Zhang, Yinghao Wang, Xinpeng Yang, and Xiaohu Yang
Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing
Xuanming Liu, Zhelei Zhou, Yinghao Wang, Jinye He, Bingsheng Zhang, Xiaohu Yang, and Jiaheng Zhang
Xuanming Liu, Zhelei Zhou, Yinghao Wang, Jinye He, Bingsheng Zhang, Xiaohu Yang, and Jiaheng Zhang
Two RSA-based Cryptosystems
A. Telveenus
A. Telveenus
Certifying Private Probabilistic Mechanisms
Zoë Ruha Bell, Shafi Goldwasser, Michael P. Kim, and Jean-Luc Watson
Zoë Ruha Bell, Shafi Goldwasser, Michael P. Kim, and Jean-Luc Watson
Distributed Point Function with Constraints, Revisited
Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
Willow: Secure Aggregation with One-Shot Clients
James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, and Phillipp Schoppmann
James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, and Phillipp Schoppmann
MFKDF: Multiple Factors Knocked Down Flat
Matteo Scarlata, Matilda Backendal, and Miro Haller
Matteo Scarlata, Matilda Backendal, and Miro Haller
An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures
Gil Segev and Liat Shapira
Gil Segev and Liat Shapira
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP
Brent Waters and David J. Wu
Brent Waters and David J. Wu
CISELeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes
Aruna Jayasena, Richard Bachmann, and Prabhat Mishra
Aruna Jayasena, Richard Bachmann, and Prabhat Mishra
Multi-Hop Multi-Key Homomorphic Signatures with Context Hiding from Standard Assumptions
Abtin Afshar, Jiaqi Cheng, and Rishab Goyal
Abtin Afshar, Jiaqi Cheng, and Rishab Goyal
Information-Theoretic Single-Server PIR in the Shuffle Model
Yuval Ishai, Mahimna Kelkar, Daniel Lee, and Yiping Ma
Yuval Ishai, Mahimna Kelkar, Daniel Lee, and Yiping Ma
Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis
Itai Dinur
Itai Dinur
The Committing Security of MACs with Applications to Generic Composition
Ritam Bhaumik, Bishwajit Chakraborty, Wonseok Choi, Avijit Dutta, Jérôme Govinden, and Yaobin Shen
Ritam Bhaumik, Bishwajit Chakraborty, Wonseok Choi, Avijit Dutta, Jérôme Govinden, and Yaobin Shen
MATHEMATICAL SPECULATIONS ON CRYPTOGRAPHY
Anjali C B
Anjali C B
Verifiable and Private Vote-by-Mail
Henri Devillez, Olivier Pereira, and Thomas Peters
Henri Devillez, Olivier Pereira, and Thomas Peters
Time Sharing - A Novel Approach to Low-Latency Masking
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede
Climbing and descending tall volcanos
Steven Galbraith
Steven Galbraith
On Orchestrating Parallel Broadcasts for Distributed Ledgers
Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, and Maofan Yin
Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, and Maofan Yin
Scalable Private Set Union, with Stronger Security
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, and Dawu Gu
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, and Dawu Gu
Simple Logarithmic-size LSAG signature
Edsger Hughes
Edsger Hughes
Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption
Benoit Libert
Benoit Libert
Multi-Input Functional Encryption for Unbounded Inner Products
Bishnu Charan Behera and Somindu C. Ramanna
Bishnu Charan Behera and Somindu C. Ramanna
Cryptographic Analysis of Delta Chat
Yuanming Song, Lenka Mareková, and Kenneth G. Paterson
Yuanming Song, Lenka Mareková, and Kenneth G. Paterson
Unbounded Non-Zero Inner Product Encryption
Bishnu Charan Behera and Somindu C. Ramanna
Bishnu Charan Behera and Somindu C. Ramanna
Polymath: Groth16 Is Not The Limit
Helger Lipmaa
Helger Lipmaa
REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections
Josh Benaloh, Michael Naehrig, and Olivier Pereira
Josh Benaloh, Michael Naehrig, and Olivier Pereira
Compact Key Storage: A Modern Approach to Key Backup and Delegation
Yevgeniy Dodis, Daniel Jost, and Antonio Marcedone
Yevgeniy Dodis, Daniel Jost, and Antonio Marcedone
SoK: Model Reverse Engineering Threats for Neural Network Hardware
Seetal Potluri and Farinaz Koushanfar
Seetal Potluri and Farinaz Koushanfar
Quantum Evolving Secret Sharing for General Access Structures
Efrat Cohen and Anat Paskin-Cherniavsky
Efrat Cohen and Anat Paskin-Cherniavsky
Generalized Indifferentiable Sponge and its Application to Polygon Miden VM
Tomer Ashur and Amit Singh Bhati
Tomer Ashur and Amit Singh Bhati
A Tight Security Proof for $\mathrm{SPHINCS^{+}}$, Formally Verified
Manuel Barbosa, François Dupressoir, Andreas Hülsing, Matthias Meijers, and Pierre-Yves Strub
Manuel Barbosa, François Dupressoir, Andreas Hülsing, Matthias Meijers, and Pierre-Yves Strub
Approximate CRT-Based Gadget Decomposition and Application to TFHE Blind Rotation
Olivier Bernard and Marc Joye
Olivier Bernard and Marc Joye
Preliminary Analysis of Ascon-Xof and Ascon-Hash
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer
Reducing the Number of Qubits in Quantum Information Set Decoding
Clémence Chevignard, Pierre-Alain Fouque, and André Schrottenloher
Clémence Chevignard, Pierre-Alain Fouque, and André Schrottenloher
Are Your Keys Protected? Time will Tell
Yoav Ben-Dov, Liron David, Moni Naor, and Elad Tzalik
Yoav Ben-Dov, Liron David, Moni Naor, and Elad Tzalik
On the Semidirect Discrete Logarithm Problem in Finite Groups
Christopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, and Rainer Steinwandt
Christopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, and Rainer Steinwandt
On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH
Andreas Hülsing, David Joseph, Christian Majenz, and Anand Kumar Narayanan
Andreas Hülsing, David Joseph, Christian Majenz, and Anand Kumar Narayanan
Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets
Jayamine Alupotha, Mathieu Gestin, and Christian Cachin
Jayamine Alupotha, Mathieu Gestin, and Christian Cachin
Access Structure Hiding Verifiable Tensor Designs
Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, and Suprita Talnikar
Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, and Suprita Talnikar
Practical Committing Attacks against Rocca-S
Ryunosuke Takeuchi, Yosuke Todo, and Tetsu Iwata
Ryunosuke Takeuchi, Yosuke Todo, and Tetsu Iwata
Breaktooth: Breaking Bluetooth Sessions Abusing Power-Saving Mode
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, and Masakatu Morii
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, and Masakatu Morii
Monotone-Policy Aggregate Signatures
Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, and Omer Paneth
Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, and Omer Paneth
Edit Distance Robust Watermarks for Language Models
Noah Golowich and Ankur Moitra
Noah Golowich and Ankur Moitra
Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE
Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee, and Daniel Wichs
Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee, and Daniel Wichs
Dynamic-FROST: Schnorr Threshold Signatures with a Flexible Committee
Annalisa Cimatti, Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci, Matteo Nardelli, and Marco Pedicini
Annalisa Cimatti, Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci, Matteo Nardelli, and Marco Pedicini
Fully-Succinct Multi-Key Homomorphic Signatures from Standard Assumptions
Gaspard Anthoine, David Balbás, and Dario Fiore
Gaspard Anthoine, David Balbás, and Dario Fiore
Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers
Akinori Hosoyamada
Akinori Hosoyamada
How to Construct Quantum FHE, Generically
Aparna Gupte and Vinod Vaikuntanathan
Aparna Gupte and Vinod Vaikuntanathan
Flock: A Framework for Deploying On-Demand Distributed Trust
Darya Kaviani, Sijun Tan, Pravein Govindan Kannan, and Raluca Ada Popa
Darya Kaviani, Sijun Tan, Pravein Govindan Kannan, and Raluca Ada Popa
Glitch-Stopping Circuits: Hardware Secure Masking without Registers
Zhenda Zhang, Svetla Nikova, and Ventzislav Nikov
Zhenda Zhang, Svetla Nikova, and Ventzislav Nikov
Ring Signatures for Deniable AKEM: Gandalf's Fellowship
Phillip Gajland, Jonas Janneck, and Eike Kiltz
Phillip Gajland, Jonas Janneck, and Eike Kiltz
Analyzing and Benchmarking ZK-Rollups
Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, and Benjamin Livshits
Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, and Benjamin Livshits
zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing
Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, and Mingming Song
Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, and Mingming Song
Secret Key Recovery in a Global-Scale End-to-End Encryption System
Graeme Connell, Vivian Fang, Rolfe Schmidt, Emma Dauterman, and Raluca Ada Popa
Graeme Connell, Vivian Fang, Rolfe Schmidt, Emma Dauterman, and Raluca Ada Popa
A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms
Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, and Deng Tang
Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, and Deng Tang
Bruisable Onions: Anonymous Communication in the Asynchronous Model
Megumi Ando, Anna Lysyanskaya, and Eli Upfal
Megumi Ando, Anna Lysyanskaya, and Eli Upfal
Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Proofs
Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, and Giovanni Tognolini
Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, and Giovanni Tognolini
Low-Latency Linear Transformations with Small Key Transmission for Private Neural Network on Homomorphic Encryption
Byeong-Seo Min and Joon-Woo Lee
Byeong-Seo Min and Joon-Woo Lee
Lattice-based Fault Attacks against ECMQV
Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, and Wenling Wu
Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, and Wenling Wu
PipeSwap: Forcing the Timely Release of a Secret for Atomic Swaps Across All Blockchains
Peifang Ni, Anqi Tian, and Jing Xu
Peifang Ni, Anqi Tian, and Jing Xu
Extending class group action attacks via sesquilinear pairings
Joseph Macula and Katherine E. Stange
Joseph Macula and Katherine E. Stange
Consistency-or-Die: Consistency for Key Transparency
Joakim Brorsson, Elena Pagnin, Bernardo David, and Paul Stankovski Wagner
Joakim Brorsson, Elena Pagnin, Bernardo David, and Paul Stankovski Wagner
Radical Vélu Isogeny Formulae
Thomas Decru
Thomas Decru
Multiple Sampling Fast Correlation Attack on Small State Stream Ciphers with Limited Round Key Period
Zhongzhi Zhou, Vahid Amin-Ghafari, and Hui Liu
Zhongzhi Zhou, Vahid Amin-Ghafari, and Hui Liu
Distributing Keys and Random Secrets with Constant Complexity
Benny Applebaum and Benny Pinkas
Benny Applebaum and Benny Pinkas
Succinctly-Committing Authenticated Encryption
Mihir Bellare and Viet Tung Hoang
Mihir Bellare and Viet Tung Hoang
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Marc Fischlin and Olga Sanina
Marc Fischlin and Olga Sanina
Cryptanalysis of Algebraic Verifiable Delay Functions
Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, and Benjamin Wesolowski
Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, and Benjamin Wesolowski
Epistle: Elastic Succinct Arguments for Plonk Constraint System
Shuangjun Zhang, Dongliang Cai, Yuan Li, Haibin Kan, and Liang Zhang
Shuangjun Zhang, Dongliang Cai, Yuan Li, Haibin Kan, and Liang Zhang
New Approaches for Estimating the Bias of Differential-Linear Distinguishers (Full Version)
Ting Peng, Wentao Zhang, Jingsui Weng, and Tianyou Ding
Ting Peng, Wentao Zhang, Jingsui Weng, and Tianyou Ding
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model
Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, and Mariana Raykova
Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, and Mariana Raykova
On cycles of pairing-friendly abelian varieties
Maria Corte-Real Santos, Craig Costello, and Michael Naehrig
Maria Corte-Real Santos, Craig Costello, and Michael Naehrig
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures
Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, and Sushmita Ruj
Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, and Sushmita Ruj
Optimal Traitor Tracing from Pairings
Mark Zhandry
Mark Zhandry
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations
Charles Gouert, Mehmet Ugurbil, Dimitris Mouris, Miguel de Vega, and Nektarios Georgios Tsoutsos
Charles Gouert, Mehmet Ugurbil, Dimitris Mouris, Miguel de Vega, and Nektarios Georgios Tsoutsos
Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead
Dandan Yuan, Shujie Cui, and Giovanni Russello
Dandan Yuan, Shujie Cui, and Giovanni Russello
Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation
Liqun Chen, Patrick Hough, and Nada El Kassem
Liqun Chen, Patrick Hough, and Nada El Kassem
Length Leakage in Oblivious Data Access Mechanisms
Grace Jia, Rachit Agarwal, and Anurag Khandelwal
Grace Jia, Rachit Agarwal, and Anurag Khandelwal
BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning
Songze Li and Yanbo Dai
Songze Li and Yanbo Dai
A new multivariate primitive from CCZ equivalence
Marco Calderini, Alessio Caminata, and Irene Villa
Marco Calderini, Alessio Caminata, and Irene Villa
HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits
Gregor Leander, Christof Paar, Julian Speith, and Lukas Stennes
Gregor Leander, Christof Paar, Julian Speith, and Lukas Stennes
Novel approximations of elementary functions in zero-knowledge proofs
Kaarel August Kurik and Peeter Laud
Kaarel August Kurik and Peeter Laud
Ascon-Keccak AEAD Algorithm
Stephan Müller
Stephan Müller
Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations
Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, and Meiqin Wang
Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, and Meiqin Wang
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
Seyoon Ragavan, Neekon Vafa, and Vinod Vaikuntanathan
Seyoon Ragavan, Neekon Vafa, and Vinod Vaikuntanathan
Securing the Future of GenAI: Policy and Technology
Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, and Matthew Turek
Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, and Matthew Turek
Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk
Benoit Libert
Benoit Libert
Practical q-IND-CPA-D-Secure Approximate Homomorphic Encryption
Jean-Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger, and Juan Ramón Troncoso-Pastoriza
Jean-Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger, and Juan Ramón Troncoso-Pastoriza
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers
Jimmy Dani, Kalyan Nakka, and Nitesh Saxena
Jimmy Dani, Kalyan Nakka, and Nitesh Saxena
On the parallelization of square-root Vélu's formulas
Jorge Chávez-Saab, Odalis Ortega, and Amalia Pizarro-Madariaga
Jorge Chávez-Saab, Odalis Ortega, and Amalia Pizarro-Madariaga
Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions
Noga Amit and Guy N. Rothblum
Noga Amit and Guy N. Rothblum
Fast, Large Scale Dimensionality Reduction Schemes Based on CKKS
Haonan Yuan, Wenyuan Wu, and Jingwei Chen
Haonan Yuan, Wenyuan Wu, and Jingwei Chen
How (Not) to Simulate PLONK
Marek Sefranek
Marek Sefranek
More Efficient Approximate $k$-wise Independent Permutations from Random Reversible Circuits via log-Sobolev Inequalities
Lucas Gretta, William He, and Angelos Pelecanos
Lucas Gretta, William He, and Angelos Pelecanos
Distributed Asynchronous Remote Key Generation
Mark Manulis and Hugo Nartz
Mark Manulis and Hugo Nartz
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries
Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, and Roberto Tamassia
Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, and Roberto Tamassia
Finding Dense Submodules with Algebraic Lattice Reduction
Alexander Karenin and Elena Kirshanova
Alexander Karenin and Elena Kirshanova
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, and Pierre-Yves Strub
José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, and Pierre-Yves Strub
Computation Efficient Structure Aware PSI From Incremental Function Secret Sharing
Gayathri Garimella, Benjamin Goff, and Peihan Miao
Gayathri Garimella, Benjamin Goff, and Peihan Miao
Two generalizations of almost perfect nonlinearity
Claude Carlet
Claude Carlet
Batching-Efficient RAM using Updatable Lookup Arguments
Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, and Nitin Singh
Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, and Nitin Singh
Almost optimal succinct arguments for Boolean circuit on RAM
Tiancheng Xie and Tianyi Liu
Tiancheng Xie and Tianyi Liu
Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity
Ignacio Cascudo, Daniele Cozzo, and Emanuele Giunta
Ignacio Cascudo, Daniele Cozzo, and Emanuele Giunta
Fully Secure MPC and zk-FLIOP Over Rings: New Constructions, Improvements and Extensions
Anders Dalskov, Daniel Escudero, and Ariel Nof
Anders Dalskov, Daniel Escudero, and Ariel Nof
The Round Complexity of Proofs in the Bounded Quantum Storage Model
Alex B. Grilo and Philippe Lamontagne
Alex B. Grilo and Philippe Lamontagne
Provable security against decryption failure attacks from LWE
Christian Majenz and Fabrizio Sisinni
Christian Majenz and Fabrizio Sisinni
Fine-Grained Non-Interactive Key Exchange, Revisited
Balthazar Bauer, Geoffroy Couteau, and Elahe Sadeghi
Balthazar Bauer, Geoffroy Couteau, and Elahe Sadeghi
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis
Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, and Pascal Sasdrich
Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, and Pascal Sasdrich
Hamming Weight Proofs of Proximity with One-Sided Error
Gal Arnon, Shany Ben-David, and Eylon Yogev
Gal Arnon, Shany Ben-David, and Eylon Yogev
Tight Characterizations for Preprocessing against Cryptographic Salting
Fangqi Dong, Qipeng Liu, and Kewen Wu
Fangqi Dong, Qipeng Liu, and Kewen Wu
How (not) to Build Quantum PKE in Minicrypt
Longcheng Li, Qian Li, Xingjian Li, and Qipeng Liu
Longcheng Li, Qian Li, Xingjian Li, and Qipeng Liu
Multi-Server Doubly Efficient PIR
Arthur Lazzaretti, Zeyu Liu, Ben Fisch, and Charalampos Papamanthou
Arthur Lazzaretti, Zeyu Liu, Ben Fisch, and Charalampos Papamanthou
Post-quantum XML and SAML Single Sign-On
Johannes Müller and Jan Oupický
Johannes Müller and Jan Oupický
Multivariate Multi-Polynomial Commitment and its Applications
Xiao Yang, Chengru Zhang, Mark Ryan, and Gao Meng
Xiao Yang, Chengru Zhang, Mark Ryan, and Gao Meng
Securing Lightning Channels against Rational Miners
Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, and Subhra Mazumdar
Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, and Subhra Mazumdar
KHAN Encryption Algorithm: Leveraging Full Reptend Primes
Ayaz Khan
Ayaz Khan
Improved Meet-LWE Attack via Ternary Trees
Eunmin Lee, Joohee Lee, Yongha Son, and Yuntao Wang
Eunmin Lee, Joohee Lee, Yongha Son, and Yuntao Wang
Batched Distributed Point Function from Sparse LPN and Homomorphic Secret Sharing
Lucas Piske, Jaspal Singh, and Ni Trieu
Lucas Piske, Jaspal Singh, and Ni Trieu
Early Stopping Byzantine Agreement in $(1+\epsilon) \cdot f$ Rounds
Fatima Elsheimy, Julian Loss, and Charalampos Papamanthou
Fatima Elsheimy, Julian Loss, and Charalampos Papamanthou
A General Framework for Lattice-Based ABE Using Evasive Inner-Product Functional Encryption
Yao-Ching Hsieh, Huijia Lin, and Ji Luo
Yao-Ching Hsieh, Huijia Lin, and Ji Luo
Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing
Pierre Meyer, Claudio Orlandi, Lawrence Roy, and Peter Scholl
Pierre Meyer, Claudio Orlandi, Lawrence Roy, and Peter Scholl
A new stand-alone MAC construct called SMAC
Dachao Wang, Alexander Maximov, Patrik Ekdahl, and Thomas Johansson
Dachao Wang, Alexander Maximov, Patrik Ekdahl, and Thomas Johansson
The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs
Jan Bobolz, Pooya Farshim, Markulf Kohlweiss, and Akira Takahashi
Jan Bobolz, Pooya Farshim, Markulf Kohlweiss, and Akira Takahashi
DVA: Dangerous Variations of ALTEQ
Arnaud Sipasseuth
Arnaud Sipasseuth
Zero-knowledge IOPs Approaching Witness Length
Noga Ron-Zewi and Mor Weiss
Noga Ron-Zewi and Mor Weiss
Faster verifications and smaller signatures: Trade-offs for ALTEQ using rejections
Arnaud Sipasseuth
Arnaud Sipasseuth
Succinct Homomorphic Secret Sharing
Damiano Abram, Lawrence Roy, and Peter Scholl
Damiano Abram, Lawrence Roy, and Peter Scholl
How to Redact the Bitcoin Backbone Protocol
Mehmet Sabir Kiraz, Enrique Larraia, and Owen Vaughan
Mehmet Sabir Kiraz, Enrique Larraia, and Owen Vaughan
Relations among new CCA security notions for approximate FHE
Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, and Renaud Sirdey
Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, and Renaud Sirdey
Traceable Secret Sharing Based on the Chinese Remainder Theorem
Charlotte Hoffmann
Charlotte Hoffmann
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
Qian Guo, Erik Mårtensson, and Adrian Åström
Qian Guo, Erik Mårtensson, and Adrian Åström
Reducing Overdefined Systems of Polynomial Equations Derived from Small Scale Variants of the AES via Data Mining Methods
Jana Berušková, Martin Jureček, and Olha Jurečková
Jana Berušková, Martin Jureček, and Olha Jurečková
Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability
Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, and May Buzaglo
Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, and May Buzaglo
Consensus in the Presence of Overlapping Faults and Total Omission
Julian Loss, Kecheng Shi, and Gilad Stern
Julian Loss, Kecheng Shi, and Gilad Stern
Resettable Statistical Zero-Knowledge for NP
Susumu Kiyoshima
Susumu Kiyoshima
DiTRU: A Resurrection of NTRU over Dihedral Group
Ali Raya, Vikas Kumar, and Sugata Gangopadhyay
Ali Raya, Vikas Kumar, and Sugata Gangopadhyay
Analysis on Sliced Garbling via Algebraic Approach
Taechan Kim
Taechan Kim
Can We Beat Three Halves Lower Bound?: (Im)Possibility of Reducing Communication Cost for Garbled Circuits
Chunghun Baek and Taechan Kim
Chunghun Baek and Taechan Kim
On Maximum Size Simultaneous Linear Approximations in Ascon and Keccak and Related Translation and Differential Properties
Nicolas T. Courtois, Frédéric Amiel, and Alexandre Bonnard de Fonvillars
Nicolas T. Courtois, Frédéric Amiel, and Alexandre Bonnard de Fonvillars
Algebraic Structure of the Iterates of $\chi$
Björn Kriepke and Gohar Kyureghyan
Björn Kriepke and Gohar Kyureghyan
A Note on Zero-Knowledge for NP and One-Way Functions
Yanyi Liu, Noam Mazor, and Rafael Pass
Yanyi Liu, Noam Mazor, and Rafael Pass
Symmetric Signcryption and E2EE Group Messaging in Keybase
Joseph Jaeger, Akshaya Kumar, and Igors Stepanovs
Joseph Jaeger, Akshaya Kumar, and Igors Stepanovs
Incompressible Functional Encryption
Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, and Aman Verma
Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, and Aman Verma
Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming
Joseph Jaeger
Joseph Jaeger
Weak Consistency mode in Key Transparency: OPTIKS
Esha Ghosh and Melissa Chase
Esha Ghosh and Melissa Chase
New Limits of Provable Security and Applications to ElGamal Encryption
Sven Schäge
Sven Schäge
Detecting Rogue Decryption in (Threshold) Encryption via Self-Incriminating Proofs
James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Arup Mondal, and Esra Yeniaras
James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Arup Mondal, and Esra Yeniaras
Hide-and-Seek and the Non-Resignability of the BUFF Transform
Jelle Don, Serge Fehr, Yu-Hsuan Huang, Jyun-Jie Liao, and Patrick Struck
Jelle Don, Serge Fehr, Yu-Hsuan Huang, Jyun-Jie Liao, and Patrick Struck
Stickel's Key Agreement Algebraic Variation
Daniel Nager
Daniel Nager
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, and Qingju Wang
Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, and Qingju Wang
Physical Ring Signature
Xavier Bultel
Xavier Bultel
Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF
Yaxi Yang, Xiaojian Liang, Xiangfu Song, Linting Huang, Hongyu Ren, Changyu Dong, and Jianying Zhou
Yaxi Yang, Xiaojian Liang, Xiangfu Song, Linting Huang, Hongyu Ren, Changyu Dong, and Jianying Zhou
A Fault-Resistant NTT by Polynomial Evaluation and Interpolation
Sven Bauer, Fabrizio De Santis, Kristjane Koleci, and Anita Aghaie
Sven Bauer, Fabrizio De Santis, Kristjane Koleci, and Anita Aghaie
A new attack against search-LWE using Diophantine approximations
Robin Frot and Daniel Zentai
Robin Frot and Daniel Zentai
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit
Fukang Liu, Mohammad Mahzoun, and Willi Meier
Fukang Liu, Mohammad Mahzoun, and Willi Meier
SmartBean: Transparent, Concretely Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs that Runs on Any Group
Frank Y.C. Lu
Frank Y.C. Lu
Universal Blockchain Assets
Owen Vaughan
Owen Vaughan
Differential Cryptanalysis on Quantum Computers
Kyungbae Jang, Yujin Oh, and Hwajeong Seo
Kyungbae Jang, Yujin Oh, and Hwajeong Seo
Relating Code Equivalence to Other Isomorphism Problems
Huck Bennett and Kaung Myat Htay Win
Huck Bennett and Kaung Myat Htay Win
Doubly-Efficient Batch Verification in Statistical Zero-Knowledge
Or Keret, Ron D. Rothblum, and Prashant Nalini Vasudevan
Or Keret, Ron D. Rothblum, and Prashant Nalini Vasudevan
Information-theoretic Multi-server Private Information Retrieval with Client Preprocessing
Jaspal Singh, Yu Wei, and Vassilis Zikas
Jaspal Singh, Yu Wei, and Vassilis Zikas
Elliptic Curve Cryptography for the masses: Simple and fast finite field arithmetic
Michael Scott
Michael Scott
Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign
Hiroshi Onuki and Kohei Nakagawa
Hiroshi Onuki and Kohei Nakagawa
Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model
Jiangxia Ge, Heming Liao, and Rui Xue
Jiangxia Ge, Heming Liao, and Rui Xue
Instance-Hiding Interactive Proofs
Changrui Mu and Prashant Nalini Vasudevan
Changrui Mu and Prashant Nalini Vasudevan
Spec-o-Scope: Cache Probing at Cache Speed
Gal Horowitz, Eyal Ronen, and Yuval Yarom
Gal Horowitz, Eyal Ronen, and Yuval Yarom
Byzantine Reliable Broadcast with One Trusted Monotonic Counter
Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, and Maria Potop-Butucaru
Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, and Maria Potop-Butucaru
SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies
Max Duparc and Tako Boris Fouotsa
Max Duparc and Tako Boris Fouotsa
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation
Oriol Farràs and Miquel Guiot
Oriol Farràs and Miquel Guiot
SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies
Kohei Nakagawa and Hiroshi Onuki
Kohei Nakagawa and Hiroshi Onuki
Sublinear-Round Broadcast without Trusted Setup
Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, and Benedikt Wagner
Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, and Benedikt Wagner
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More
Damiano Abram, Lawrence Roy, and Mark Simkin
Damiano Abram, Lawrence Roy, and Mark Simkin
The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation
Denis Firsov and Benjamin Livshits
Denis Firsov and Benjamin Livshits
Bootstrapping Bits with CKKS
Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, and Damien Stehlé
Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, and Damien Stehlé
Breaking Verifiable Delay Functions in the Random Oracle Model
Ziyi Guan, Artur Riazanov, and Weiqiang Yuan
Ziyi Guan, Artur Riazanov, and Weiqiang Yuan
Information-Theoretic Multi-Server PIR with Global Preprocessing
Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, and Elaine Shi
Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, and Elaine Shi
Decentralized Multi-Client Functional Encryption with Strong Security
Ky Nguyen, David Pointcheval, and Robert Schädlich
Ky Nguyen, David Pointcheval, and Robert Schädlich
Incorporating SIS Problem into Luby-Rackoff Cipher
Yu Morishima and Masahiro Kaminaga
Yu Morishima and Masahiro Kaminaga
Constant-Cost Batched Partial Decryption in Threshold Encryption
Sora Suegami, Shinsaku Ashizawa, and Kyohei Shibano
Sora Suegami, Shinsaku Ashizawa, and Kyohei Shibano
Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage
Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu, and Zongpeng Li
Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu, and Zongpeng Li
SQIsign2D-West: The Fast, the Small, and the Safer
Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, and Benjamin Wesolowski
Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, and Benjamin Wesolowski
Watermarking Language Models for Many Adaptive Users
Aloni Cohen, Alexander Hoover, and Gabe Schoenbach
Aloni Cohen, Alexander Hoover, and Gabe Schoenbach
Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields
John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier Verbel, and Luis Villota
John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier Verbel, and Luis Villota
Formal Definition and Verification for Combined Random Fault and Random Probing Security
Sonia Belaid, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, and Abdul Rahman Taleb
Sonia Belaid, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, and Abdul Rahman Taleb
(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting
Dennis Dayanikli and Anja Lehmann
Dennis Dayanikli and Anja Lehmann
Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice
Barbara Gigerl, Florian Mendel, Martin Schläffer, and Robert Primas
Barbara Gigerl, Florian Mendel, Martin Schläffer, and Robert Primas
Adversary Resilient Learned Bloom Filters
Allison Bishop and Hayder Tirmazi
Allison Bishop and Hayder Tirmazi
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption
Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, and Taeho Jung
Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, and Taeho Jung
More Embedded Curves for SNARK-Pairing-Friendly Curves
Aurore Guillevic
Aurore Guillevic
Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
Prabhanjan Ananth, Fatih Kaleoglu, and Henry Yuen
Prabhanjan Ananth, Fatih Kaleoglu, and Henry Yuen
Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
Xinxin Fan, Veronika Kuchta, Francesco Sica, and Lei Xu
Xinxin Fan, Veronika Kuchta, Francesco Sica, and Lei Xu
Reducing the CRS Size in Registered ABE Systems
Rachit Garg, George Lu, Brent Waters, and David J. Wu
Rachit Garg, George Lu, Brent Waters, and David J. Wu
PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem
Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, and Marco Palumbi
Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, and Marco Palumbi
Scaling Lattice Sieves across Multiple Machines
Martin R. Albrecht and Joe Rowell
Martin R. Albrecht and Joe Rowell
The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS
Céline Chevalier, Guirec Lebrun, Ange Martinelli, and Jérôme Plût
Céline Chevalier, Guirec Lebrun, Ange Martinelli, and Jérôme Plût
FRAST: TFHE-friendly Cipher Based on Random S-boxes
Mingyu Cho, Woohyuk Chung, Jincheol Ha, Jooyoung Lee, Eun-Gyeol Oh, and Mincheol Son
Mingyu Cho, Woohyuk Chung, Jincheol Ha, Jooyoung Lee, Eun-Gyeol Oh, and Mincheol Son
An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator
Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, and Kentaro Mihara
Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, and Kentaro Mihara
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings -- with a Break-Fix Strategy
Kai Hu
Kai Hu
Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy
David Pointcheval
David Pointcheval
A Deniability Analysis of Signal's Initial Handshake PQXDH
Rune Fiedler and Christian Janson
Rune Fiedler and Christian Janson
Multi-Client Functional Encryption with Public Inputs and Strong Security
Ky Nguyen, Duong Hieu Phan, and David Pointcheval
Ky Nguyen, Duong Hieu Phan, and David Pointcheval
BGJ15 Revisited: Sieving with Streamed Memory Access
Ziyu Zhao, Jintai Ding, and Bo-Yin Yang
Ziyu Zhao, Jintai Ding, and Bo-Yin Yang
Quantum Key-Revocable Dual-Regev Encryption, Revisited
Prabhanjan Ananth, Zihan Hu, and Zikuan Huang
Prabhanjan Ananth, Zihan Hu, and Zikuan Huang
Mutable Batch Arguments and Applications
Rishab Goyal
Rishab Goyal
Secret Sharing with Certified Deletion
James Bartusek and Justin Raizes
James Bartusek and Justin Raizes
Secure Multiparty Computation in the Presence of Covert Adaptive Adversaries
Isheeta Nargis and Anwar Hasan
Isheeta Nargis and Anwar Hasan
Proof of Stake and Activity: Rewarding On-Chain Activity Through Consensus
Aram Jivanyan and Karen Terjanian
Aram Jivanyan and Karen Terjanian
Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
Zhongtang Luo, Yanxue Jia, Yaobin Shen, and Aniket Kate
Zhongtang Luo, Yanxue Jia, Yaobin Shen, and Aniket Kate
Compact Encryption based on Module-NTRU problems
Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, and Jinwei Zheng
Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, and Jinwei Zheng
Toward Full $n$-bit Security and Nonce Misuse Resistance of Block Cipher-based MACs
Wonseok Choi, Jooyoung Lee, and Yeongmin Lee
Wonseok Choi, Jooyoung Lee, and Yeongmin Lee
New Solutions to Delsarte's Dual Linear Programs
André Chailloux and Thomas Debris-Alazard
André Chailloux and Thomas Debris-Alazard
Covert Adaptive Adversary Model: A New Adversary Model for Multiparty Computation
Isheeta Nargis and Anwar Hasan
Isheeta Nargis and Anwar Hasan
Relativized Succinct Arguments in the ROM Do Not Exist
Annalisa Barbara, Alessandro Chiesa, and Ziyi Guan
Annalisa Barbara, Alessandro Chiesa, and Ziyi Guan
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
Joseph Jaeger
Joseph Jaeger
Challenger: Blockchain-based Massively Multiplayer Online Game Architecture
Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, and Serge Fdida
Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, and Serge Fdida
Multi User Security of LightMAC and LightMAC_Plus
Nilanjan Datta, Shreya Dey, Avijit Dutta, and Devdutto Kanungo
Nilanjan Datta, Shreya Dey, Avijit Dutta, and Devdutto Kanungo
zkSNARKs in the ROM with Unconditional UC-Security
Alessandro Chiesa and Giacomo Fenzi
Alessandro Chiesa and Giacomo Fenzi
$\mathsf{OPA}$: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning
Harish Karthikeyan and Antigoni Polychroniadou
Harish Karthikeyan and Antigoni Polychroniadou
Ultrametric integral cryptanalysis
Tim Beyne and Michiel Verbauwhede
Tim Beyne and Michiel Verbauwhede
Real-world Universal zkSNARKs are non-malleable
Antonio Faonio, Dario Fiore, and Luigi Russo
Antonio Faonio, Dario Fiore, and Luigi Russo
Multivariate Blind Signatures Revisited
Ward Beullens
Ward Beullens
Client-Efficient Online-Offline Private Information Retrieval
Hoang-Dung Nguyen, Jorge Guajardo, and Thang Hoang
Hoang-Dung Nguyen, Jorge Guajardo, and Thang Hoang
PAC-Private Algorithms
Mayuri Sridhar, Hanshen Xiao, and Srinivas Devadas
Mayuri Sridhar, Hanshen Xiao, and Srinivas Devadas
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, and Ida Tucker
Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, and Ida Tucker
Unclonable Secret Sharing
Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, and Qipeng Liu
Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, and Qipeng Liu
A New Cryptographic Algorithm
Ali Mahdoum
Ali Mahdoum
Learning with Quantization: Construction, Hardness, and Applications
Shanxiang Lyu, Ling Liu, and Cong Ling
Shanxiang Lyu, Ling Liu, and Cong Ling
Analyzing Pump and jump BKZ algorithm using dynamical systems
Leizhang Wang
Leizhang Wang
Quantum NV Sieve on Grover for Solving Shortest Vector Problem
Hyunji Kim, Kyungbae Jang, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, and Hwajeong Seo
Hyunji Kim, Kyungbae Jang, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, and Hwajeong Seo
Non-Transferable Anonymous Tokens by Secret Binding
F. Betül Durak, Laurane Marco, Abdullah Talayhan, and Serge Vaudenay
F. Betül Durak, Laurane Marco, Abdullah Talayhan, and Serge Vaudenay
BUFFing FALCON without Increasing the Signature Size
Samed Düzlü, Rune Fiedler, and Marc Fischlin
Samed Düzlü, Rune Fiedler, and Marc Fischlin
Masked Computation the Floor Function and its Application to the FALCON Signature
Pierre-Augustin Berthet, Justine Paillet, and Cédric Tavernier
Pierre-Augustin Berthet, Justine Paillet, and Cédric Tavernier
Automated Generation of Fault-Resistant Circuits
Nicolai Müller and Amir Moradi
Nicolai Müller and Amir Moradi
Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators
Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, and Rosario Cammarota
Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, and Rosario Cammarota
Linicrypt in the Ideal Cipher Model
Zahra Javar and Bruce M. Kapron
Zahra Javar and Bruce M. Kapron
Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users
Remco Bloemen, Bryan Gillespie, Daniel Kales, Philipp Sippl, and Roman Walch
Remco Bloemen, Bryan Gillespie, Daniel Kales, Philipp Sippl, and Roman Walch
Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains
Krishnendu Chatterjee, Amirali Ebrahim-Zadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, and Djordje Zikelic
Krishnendu Chatterjee, Amirali Ebrahim-Zadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, and Djordje Zikelic
An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks
Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, and Jiaheng Zhang
Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, and Jiaheng Zhang
Security Analysis of Signal's PQXDH Handshake
Rune Fiedler and Felix Günther
Rune Fiedler and Felix Günther
Quantum Unpredictability
Tomoyuki Morimae, Shogo Yamada, and Takashi Yamakawa
Tomoyuki Morimae, Shogo Yamada, and Takashi Yamakawa
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over $\mathbb{Z}_{2^k}$ Without Ring Extensions
Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, and Yifan Song
Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, and Yifan Song
An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization
Elijah Pelofske
Elijah Pelofske
Private Computations on Streaming Data
Vladimir Braverman, Kevin Garbe, Eli Jaffe, and Rafail Ostrovsky
Vladimir Braverman, Kevin Garbe, Eli Jaffe, and Rafail Ostrovsky
LINE: Cryptosystem based on linear equations for logarithmic signatures
Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, and Oleksandr Sievierinov
Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, and Oleksandr Sievierinov
A Theoretical Take on a Practical Consensus Protocol
Victor Shoup
Victor Shoup
Beale Cipher 1 and Cipher 3: Numbers With No Messages
Richard Wassmer
Richard Wassmer
Lower-Bounds on Public-Key Operations in PIR
Jesko Dujmovic and Mohammad Hajiabadi
Jesko Dujmovic and Mohammad Hajiabadi
A Note on Gröbner Bases for Anemoi
Pierre Briaud
Pierre Briaud
Blink: An Optimal Proof of Proof-of-Work
Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, and Dionysis Zindros
Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, and Dionysis Zindros
White-box filtering attacks breaking SEL masking: from exponential to polynomial time
Alex Charlès and Aleksei Udovenko
Alex Charlès and Aleksei Udovenko
LPN-based Attacks in the White-box Setting
Alex Charlès and Aleksei Udovenko
Alex Charlès and Aleksei Udovenko
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models
Elijah Pelofske, Vincent Urias, and Lorie M. Liebrock
Elijah Pelofske, Vincent Urias, and Lorie M. Liebrock
Succinct Functional Commitments for Circuits from k-Lin
Hoeteck Wee and David J. Wu
Hoeteck Wee and David J. Wu
Lower Bounds for Levin–Kolmogorov Complexity
Nicholas Brandt
Nicholas Brandt
Unstructured Inversions of New Hope
Ian Malloy
Ian Malloy
Committing AVID with Partial Retrieval and Optimal Storage
Nicolas Alhaddad, Leonid Reyzin, and Mayank Varia
Nicolas Alhaddad, Leonid Reyzin, and Mayank Varia
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains
Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc V. Le, Mohsen Minaei, Ranjit Kumaresan, and Mahdi Zamani
Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc V. Le, Mohsen Minaei, Ranjit Kumaresan, and Mahdi Zamani
A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Approximate PSI with Near-Linear Communication
Wutichai Chongchitmate, Steve Lu, and Rafail Ostrovsky
Wutichai Chongchitmate, Steve Lu, and Rafail Ostrovsky
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security
Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, and Saraswathy RV
Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, and Saraswathy RV
Universal Vector Commitments
Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, and Aayush Yadav
Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, and Aayush Yadav
Isotropic Quadratic Forms, Diophantine equations and Digital Signatures, DEFIv2
Martin Feussner and Igor Semaev
Martin Feussner and Igor Semaev
Quantum-Safe Account Recovery for WebAuthn
Douglas Stebila and Spencer Wilson
Douglas Stebila and Spencer Wilson
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography
Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, and Victor Shoup
Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, and Victor Shoup
Composing Timed Cryptographic Protocols: Foundations and Applications
Karim Eldefrawy, Benjamin Terner, and Moti Yung
Karim Eldefrawy, Benjamin Terner, and Moti Yung
Privacy-Preserving Blueprints via Succinctly Verifiable Computation over Additively-Homomorphically Encrypted Data
Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, and Meghna Sengupta
Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, and Meghna Sengupta
SigmaSuite: How to Minimize Foreign Arithmetic in ZKP Circuits While Keeping Succinct Final Verification.
Wyatt Benno
Wyatt Benno
Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B
Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
Secure Coded Distributed Computing and Extensions to Multiple Access Setting
Shanuja Sasi and Onur Gunlu
Shanuja Sasi and Onur Gunlu
Exploiting Internal Randomness for Privacy in Vertical Federated Learning
Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, and Asja Fischer
Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, and Asja Fischer
Secure Implementation of SRAM PUF for Private Key Generation
Raja Adhithan Radhakrishnan
Raja Adhithan Radhakrishnan
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses
Arka Rai Choudhuri, Sanjam Garg, Julien Piet, and Guru-Vamsi Policharla
Arka Rai Choudhuri, Sanjam Garg, Julien Piet, and Guru-Vamsi Policharla
Blockchain Price vs. Quantity Controls
Abdoulaye Ndiaye
Abdoulaye Ndiaye
Agile, Post-quantum Secure Cryptography in Avionics
Karolin Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, and Alice Bowman
Karolin Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, and Alice Bowman
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs
Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, and Raluca Ada Popa
Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, and Raluca Ada Popa
Homomorphic Evaluation of LWR-based PRFs and Application to Transciphering
Amit Deo, Marc Joye, Benoit Libert, Benjamin R. Curtis, and Mayeul de Bellabre
Amit Deo, Marc Joye, Benoit Libert, Benjamin R. Curtis, and Mayeul de Bellabre
Pando: Extremely Scalable BFT Based on Committee Sampling
Xin Wang, Haochen Wang, Haibin Zhang, and Sisi Duan
Xin Wang, Haochen Wang, Haibin Zhang, and Sisi Duan
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size
Xinwei Yong, Jiaojiao Wu, and Jianfeng Wang
Xinwei Yong, Jiaojiao Wu, and Jianfeng Wang
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption
Kelong Cong, Jiayi Kang, Georgio Nicolas, and Jeongeun Park
Kelong Cong, Jiayi Kang, Georgio Nicolas, and Jeongeun Park
On amortization techniques for FRI-based SNARKs
Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, and Michał Zając
Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, and Michał Zając
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption
Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, and Antonis Michalas
Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, and Antonis Michalas
Secure Latent Dirichlet Allocation
Thijs Veugen, Vincent Dunning, Michiel Marcus, and Bart Kamphorst
Thijs Veugen, Vincent Dunning, Michiel Marcus, and Bart Kamphorst
Information-theoretic security with asymmetries
Tim Beyne and Yu Long Chen
Tim Beyne and Yu Long Chen
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs
Anaïs Barthoulot, Olivier Blazy, and Sébastien Canard
Anaïs Barthoulot, Olivier Blazy, and Sébastien Canard
Cryptanalytic Audit of the XHash Sponge Function and its Components
Vincent Rijmen
Vincent Rijmen
Implementation and Performance Analysis of Homomorphic Signature Schemes
Davide Carnemolla, Dario Catalano, Mario Di Raimondo, and Federico Savasta
Davide Carnemolla, Dario Catalano, Mario Di Raimondo, and Federico Savasta
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification
Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, and Melek Önen
Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, and Melek Önen
Aether: Approaching the Holy Grail in Asynchronous BFT
Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, and Ling Ren
Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, and Ling Ren
Compact and Secure Zero-Knowledge Proofs for Quantum-Resistant Cryptography from Modular Lattice Innovations
Samuel Lavery
Samuel Lavery
A New Hash-based Enhanced Privacy ID Signature Scheme
Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, and Yalan Wang
Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, and Yalan Wang
Hash-based Direct Anonymous Attestation
Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, and Yalan Wang
Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, and Yalan Wang
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
Liqun Chen, Changyu Dong, Christopher J. P. Newton, and Yalan Wang
Liqun Chen, Changyu Dong, Christopher J. P. Newton, and Yalan Wang
Encrypted KNN Implementation on Distributed Edge Device Network
B Pradeep Kumar Reddy, Ruchika Meel, and Ayantika Chatterjee
B Pradeep Kumar Reddy, Ruchika Meel, and Ayantika Chatterjee
Weightwise (almost) perfectly balanced functions based on total orders
Pierrick Méaux
Pierrick Méaux
Efficient Quantum Algorithm for SUBSET-SUM Problem
Sanchita Ghosh, Anant Sharma, Sreetama Das, and Shibdas Roy
Sanchita Ghosh, Anant Sharma, Sreetama Das, and Shibdas Roy
Toward Key Independent Encryption based on Q-Problem
Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh, and Abdullah T. Al-Essa
Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh, and Abdullah T. Al-Essa
Jumping for Bernstein-Yang Inversion
Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, and Ming-Shing Chen
Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, and Ming-Shing Chen
Key-Homomorphic and Aggregate Verifiable Random Functions
Giulio Malavolta
Giulio Malavolta
GraphOS: Towards Oblivious Graph Processing
Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili
Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili
Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon
Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, and Sisi Duan
Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, and Sisi Duan
On Proving Pairings
Andrija Novakovic and Liam Eagen
Andrija Novakovic and Liam Eagen
Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning
Dustin Ray and Caroline El Jazmi
Dustin Ray and Caroline El Jazmi
A note on ``a lightweight mutual and transitive authentication mechanism for IoT network''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity
Marshall Ball, Juan Garay, Peter Hall, Aggelos Kiayias, and Giorgos Panagiotakos
Marshall Ball, Juan Garay, Peter Hall, Aggelos Kiayias, and Giorgos Panagiotakos
Regev Factoring Beyond Fibonacci: Optimizing Prefactors
Seyoon Ragavan
Seyoon Ragavan
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption
Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, and Hoda Maleki
Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, and Hoda Maleki
NTRU-based FHE for Larger Key and Message Space
Robin Jadoul, Axel Mertens, Jeongeun Park, and Hilder V. L. Pereira
Robin Jadoul, Axel Mertens, Jeongeun Park, and Hilder V. L. Pereira
Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields
Tomer Ashur, Mohammad Mahzoun, Jim Posen, and Danilo Šijačić
Tomer Ashur, Mohammad Mahzoun, Jim Posen, and Danilo Šijačić
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences
Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, and Debiao He
Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, and Debiao He
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
Tahoura Mosavirik and Shahin Tajik
Tahoura Mosavirik and Shahin Tajik
Conditional disclosure of secrets with quantum resources
Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, and Chris Waddell
Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, and Chris Waddell
Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms
Cédric Pilatte
Cédric Pilatte
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications
Bernardo David, Rafael Dowsley, Anders Konring, and Mario Larangeira
Bernardo David, Rafael Dowsley, Anders Konring, and Mario Larangeira
Distributed & Scalable Oblivious Sorting and Shuffling
Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, and Dimitrios Papadopoulos
Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, and Dimitrios Papadopoulos
Exponential Quantum Speedup for the Traveling Salesman Problem
Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, and Shibdas Roy
Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, and Shibdas Roy
Interactive Threshold Mercurial Signatures and Applications
Masayuki Abe, Masaya Nanri, Octavio Perez Kempner, and Mehdi Tibouchi
Masayuki Abe, Masaya Nanri, Octavio Perez Kempner, and Mehdi Tibouchi
POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies
Andrea Basso
Andrea Basso
Complete group law for genus 2 Jacobians on Jacobian coordinates
Elif Ozbay Gurler and Huseyin Hisil
Elif Ozbay Gurler and Huseyin Hisil
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols
Roozbeh Sarenche, Svetla Nikova, and Bart Preneel
Roozbeh Sarenche, Svetla Nikova, and Bart Preneel
How to Lose Some Weight - A Practical Template Syndrome Decoding Attack
Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, and Antonia Wachter-Zeh
Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, and Antonia Wachter-Zeh
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation
Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, and Meiqin Wang
Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, and Meiqin Wang
BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison
Huiqiang Liang, Haining Lu, and Geng Wang
Huiqiang Liang, Haining Lu, and Geng Wang
Efficient KZG-based Univariate Sum-check and Lookup Argument
Yuncong Zhang, Shi-Feng Sun, and Dawu Gu
Yuncong Zhang, Shi-Feng Sun, and Dawu Gu
Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions and Constructions
Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, and Min Xie
Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, and Min Xie
$\mathsf{Cougar}$: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption
Hyeonbum Lee, Seunghun Paik, Hyunjung Son, and Jae Hong Seo
Hyeonbum Lee, Seunghun Paik, Hyunjung Son, and Jae Hong Seo
Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA
Jialiu Cheng, Yi Wang, Rongmao Chen, and Xinyi Huang
Jialiu Cheng, Yi Wang, Rongmao Chen, and Xinyi Huang
Non-interactive Blind Signatures: Post-quantum and Stronger Security
Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, and Aayush Yadav
Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, and Aayush Yadav
Hadamard Product Argument from Lagrange-Based Univariate Polynomials
Jie Xie, Yuncong Hu, and Yu Yu
Jie Xie, Yuncong Hu, and Yu Yu
FHERMA: Building the Open-Source FHE Components Library for Practical Use
Gurgen Arakelov, Nikita Kaskov, Daria Pianykh, and Yuriy Polyakov
Gurgen Arakelov, Nikita Kaskov, Daria Pianykh, and Yuriy Polyakov
A Security Analysis of Restricted Syndrome Decoding Problems
Ward Beullens, Pierre Briaud, and Morten Øygarden
Ward Beullens, Pierre Briaud, and Morten Øygarden
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation
Min Xie, Peichen Ju, Yanqi Zhao, Zoe Lin Jiang, Junbin Fang, Yong Yu, Xuan Wang, and Man Ho Au
Min Xie, Peichen Ju, Yanqi Zhao, Zoe Lin Jiang, Junbin Fang, Yong Yu, Xuan Wang, and Man Ho Au
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes
Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, and Brice Minaud
Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, and Brice Minaud
The Practical Advantage of RSA over ECC and Pairings
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Low-latency Secure Integrated Sensing and Communication with Transmitter Actions
Truman Welling, Onur Gunlu, and Aylin Yener
Truman Welling, Onur Gunlu, and Aylin Yener
Classical Commitments to Quantum States
Sam Gunn, Yael Tauman Kalai, Anand Natarajan, and Agi Villanyi
Sam Gunn, Yael Tauman Kalai, Anand Natarajan, and Agi Villanyi
Security Analysis of XHASH8/12
Léo Perrin
Léo Perrin
Generic MitM Attack Frameworks on Sponge Constructions
Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, and Xiaoyun Wang
Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, and Xiaoyun Wang
Worst-Case to Average-Case Hardness of LWE: An Alternative Perspective
Divesh Aggarwal, Leong Jin Ming, and Alexandra Veliche
Divesh Aggarwal, Leong Jin Ming, and Alexandra Veliche
Secret-Sharing Schemes for High Slices
Amos Beimel, Oriol Farràs, and Oded Nir
Amos Beimel, Oriol Farràs, and Oded Nir
Improved Provable Reduction of NTRU and Hypercubic Lattices
Henry Bambury and Phong Q. Nguyen
Henry Bambury and Phong Q. Nguyen
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
Mustafa Khairallah
Mustafa Khairallah
Probabilistically Checkable Arguments for all NP
Shany Ben-David
Shany Ben-David
Decryption Indistinguishability under Chosen Control Flow
Ganyuan Cao
Ganyuan Cao
Blockchain-based decentralized identity system: Design and security analysis
Gewu BU, Serge Fdida, Maria Potop-Butucaru, and Bilel Zaghdoudi
Gewu BU, Serge Fdida, Maria Potop-Butucaru, and Bilel Zaghdoudi
Cryptanalysis of signature schemes based on the root extraction problem over braid group
Djimnaibeye Sidoine, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Tieudjo Daniel, and Djiby Sow
Djimnaibeye Sidoine, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Tieudjo Daniel, and Djiby Sow
Analysis of Multivariate Encryption Schemes: Application to Dob and C*
Morten Øygarden, Patrick Felke, and Håvard Raddum
Morten Øygarden, Patrick Felke, and Håvard Raddum
Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation
Enrico Bottazzi
Enrico Bottazzi
The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem
George Teseleanu
George Teseleanu
Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
Daniel J. Bernstein
Daniel J. Bernstein
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures
Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, and Maximiliane Weishäupl
Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, and Maximiliane Weishäupl
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks
Quan Yuan, Chao Sun, and Tsuyoshi Takagi
Quan Yuan, Chao Sun, and Tsuyoshi Takagi
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
Xunyue Hu, Quentin L. Meunier, and Emmanuelle Encrenaz
Xunyue Hu, Quentin L. Meunier, and Emmanuelle Encrenaz
Digital Signatures for Authenticating Compressed JPEG Images
Simon Erfurth
Simon Erfurth
Hidden $\Delta$-fairness: A Novel Notion for Fair Secure Two-Party Computation
Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, and Jörn Müller-Quade
Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, and Jörn Müller-Quade
Encryption Based Covert Channel for Large Language Models
Yongge Wang
Yongge Wang
A Complete Beginner Guide to the Number Theoretic Transform (NTT)
Ardianto Satriawan, Rella Mareta, and Hanho Lee
Ardianto Satriawan, Rella Mareta, and Hanho Lee
Efficient Implementations of Square-root Vélu's Formulas
Jianming Lin, Weize Wang, Chang-An Zhao, and Yuhao Zheng
Jianming Lin, Weize Wang, Chang-An Zhao, and Yuhao Zheng
A Note on Quantum Algorithms for Lattice Problems
Omri Shmueli
Omri Shmueli
Improved Alternating-Moduli PRFs and Post-Quantum Signatures
Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, and Peter Rindal
Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, and Peter Rindal
Fault Attack on SQIsign
JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, Heeseok Kim, and Seokhie Hong
JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, Heeseok Kim, and Seokhie Hong
Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model
Duy Nguyen
Duy Nguyen
Tight Multi-user Security of Ascon and Its Large Key Extension
Bishwajit Chakraborty, Chandranan Dhar, and Mridul Nandi
Bishwajit Chakraborty, Chandranan Dhar, and Mridul Nandi
Assessing the quality of Random Number Generators through Neural Networks
José Luis Crespo, Javier González-Villa, Jaime Gutierrez, and Angel Valle
José Luis Crespo, Javier González-Villa, Jaime Gutierrez, and Angel Valle
Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box
Said Eddahmani and Sihem Mesnager
Said Eddahmani and Sihem Mesnager
On complexity of the problem of solving systems of tropical polynomial equations of degree two
Ivan Buchinskiy, Matvei Kotov, and Alexander Treier
Ivan Buchinskiy, Matvei Kotov, and Alexander Treier
Pairing Optimizations for Isogeny-based Cryptosystems
Shiping Cai, Kaizhan Lin, and Chang-An Zhao
Shiping Cai, Kaizhan Lin, and Chang-An Zhao
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
Jannik Zeitschner and Amir Moradi
Jannik Zeitschner and Amir Moradi
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy
Arnab Bag, Sikhar Patranabis, and Debdeep Mukhopadhyay
Arnab Bag, Sikhar Patranabis, and Debdeep Mukhopadhyay
Split Gröbner Bases for Satisfiability Modulo Finite Fields
Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark Barrett, and Işil Dillig
Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark Barrett, and Işil Dillig
MiniCast: Minimizing the Communication Complexity of Reliable Broadcast
Thomas Locher and Victor Shoup
Thomas Locher and Victor Shoup
Actively Secure Private Set Intersection in the Client-Server Setting
Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, and Xiao Wang
Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, and Xiao Wang
An overview of symmetric fuzzy PAKE protocols
Johannes Ottenhues
Johannes Ottenhues
Communication-Efficient Multi-Party Computation for RMS Programs
Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, and Lisa Kohl
Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, and Lisa Kohl
Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting
Aron van Baarsen and Marc Stevens
Aron van Baarsen and Marc Stevens
A $3$-Round Near-Linear Third-Party Private Set Intersection Protocol
Foo Yee Yeo and Jason H. M. Ying
Foo Yee Yeo and Jason H. M. Ying
On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver
Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun
Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun
Multiple Group Action Dlogs with(out) Precomputation
Alexander May and Massimo Ostuzzi
Alexander May and Massimo Ostuzzi
A Note on Related-Tweakey Impossible Differential Attacks
Xavier Bonnetain and Virginie Lallemand
Xavier Bonnetain and Virginie Lallemand
Practical Proofs of Parsing for Context-free Grammars
Harjasleen Malvai, Siam Hussain, Gregory Neven, and Andrew Miller
Harjasleen Malvai, Siam Hussain, Gregory Neven, and Andrew Miller
SQIAsignHD: SQIsignHD Adaptor Signature
Farzin Renan and Péter Kutas
Farzin Renan and Péter Kutas
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Robin Berger, Felix Dörre, Alexander Koch
Robin Berger, Felix Dörre, Alexander Koch
Convolution-Friendly Image Compression in FHE
Axel Mertens, Georgio Nicolas, Sergi Rovira
Axel Mertens, Georgio Nicolas, Sergi Rovira
Scoring the predictions: a way to improve profiling side-channel attacks
Damien Robissout, Lilian Bossuet, Amaury Habrard
Damien Robissout, Lilian Bossuet, Amaury Habrard
Permutation-Based Hash Chains with Application to Password Hashing
Charlotte Lefevre and Bart Mennink
Charlotte Lefevre and Bart Mennink
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage
Leonie Reichert, Gowri R Chandran, Phillipp Schoppmann, Thomas Schneider, and Björn Scheuermann
Leonie Reichert, Gowri R Chandran, Phillipp Schoppmann, Thomas Schneider, and Björn Scheuermann
Quantum Algorithms for Lattice Problems
Yilei Chen
Yilei Chen
Leakage-Abuse Attacks Against Structured Encryption for SQL
Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song
Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations
Yuxi Xue, Xingye Lu, Man Ho Au, and Chengru Zhang
Yuxi Xue, Xingye Lu, Man Ho Au, and Chengru Zhang
Insights from building a blockchain-based metaverse
Mario Yaksetig
Mario Yaksetig
Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography
Nimish Mishra, Debdeep Mukhopadhyay
Nimish Mishra, Debdeep Mukhopadhyay
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV
Mustafa Khairallah
Mustafa Khairallah
Integral Attack on the Full FUTURE Block Cipher
Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang
Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang
Efficient isochronous fixed-weight sampling with applications to NTRU
Décio Luiz Gazzoni Filho, Tomás S. R. Silva, and Julio López
Décio Luiz Gazzoni Filho, Tomás S. R. Silva, and Julio López
Efficient Permutation Correlations and Batched Random Access for Two-Party Computation
Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, and Harshal Shah
Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, and Harshal Shah
Share with Care: Breaking E2EE in Nextcloud
Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson
Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson
Optimal Asynchronous Byzantine Consensus with Fair Separability
Vincent Gramoli, Zhenliang Lu, Qiang Tang, and Pouriya Zarbafian
Vincent Gramoli, Zhenliang Lu, Qiang Tang, and Pouriya Zarbafian
A post-quantum Distributed OPRF from the Legendre PRF
Novak Kaluderovic, Nan Cheng, and Katerina Mitrokotsa
Novak Kaluderovic, Nan Cheng, and Katerina Mitrokotsa
A Note on the Common Haar State Model
Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin
Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin
Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack
Jun Xu, Zhiwei Li, and Lei Hu
Jun Xu, Zhiwei Li, and Lei Hu
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank
Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, and Matthieu Rivain
Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, and Matthieu Rivain
Lattice-Based Timed Cryptography
Russell W. F. Lai and Giulio Malavolta
Russell W. F. Lai and Giulio Malavolta
Supersingular Hashing using Lattès Maps
Daniel Larsson
Daniel Larsson
A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99
Qiping Lin and Fengmei Liu
Qiping Lin and Fengmei Liu
Confidential and Verifiable Machine Learning Delegations on the Cloud
Wenxuan Wu, Soamar Homsi, and Yupeng Zhang
Wenxuan Wu, Soamar Homsi, and Yupeng Zhang
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification
Mihir Bellare, Doreen Riepel, and Laura Shea
Mihir Bellare, Doreen Riepel, and Laura Shea
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree
Tianxiang Dai, Yufan Jiang, Yong Li, and Fei Mei
Tianxiang Dai, Yufan Jiang, Yong Li, and Fei Mei
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model
Simon Jeanteur, Laura Kovács, Matteo Maffei, and Michael Rawson
Simon Jeanteur, Laura Kovács, Matteo Maffei, and Michael Rawson
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation
Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, and Hossein Yalame
Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, and Hossein Yalame
Analysing Cryptography in the Wild - A Retrospective
Martin R. Albrecht and Kenneth G. Paterson
Martin R. Albrecht and Kenneth G. Paterson
Avoiding Trusted Setup in Isogeny-based Commitments
Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, and Célestin Nkuimi-Jugnia
Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, and Célestin Nkuimi-Jugnia
An efficient key generation algorithm for GR-NTRU over dihedral group
Vikas Kumar, Ali Raya, and Aditi Kar Gangopadhyay
Vikas Kumar, Ali Raya, and Aditi Kar Gangopadhyay
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest
Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, and Younho Lee
Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, and Younho Lee
The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences
Momonari Kudo and Kazuhiro Yokoyama
Momonari Kudo and Kazuhiro Yokoyama
Slice more? It leaks: Analysis on the paper ``On the Feasibility of Sliced Garbling''
Taechan Kim
Taechan Kim
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero-Knowledge
Yi-Hsiu Chen and Yehuda Lindell
Yi-Hsiu Chen and Yehuda Lindell
Privacy Preserving Biometric Authentication for Fingerprints and Beyond
Marina Blanton and Dennis Murphy
Marina Blanton and Dennis Murphy
A Time-Space Tradeoff for the Sumcheck Prover
Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, and Andrew Zitek-Estrada
Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, and Andrew Zitek-Estrada
Unbindable Kemmy Schmidt: ML-KEM is neither MAL-BIND-K-CT nor MAL-BIND-K-PK
Sophie Schmieg
Sophie Schmieg
Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs
Mahender Kumar
Mahender Kumar
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram
Tomoki Moriya
Tomoki Moriya
A note on securing insertion-only Cuckoo filters
Fernando Virdia and Mia Filić
Fernando Virdia and Mia Filić
On implementation of Stickel's key exchange protocol over max-min and max-$T$ semirings
Sulaiman Alhussaini and Serge˘ı Sergeev
Sulaiman Alhussaini and Serge˘ı Sergeev
Software-Defined Cryptography: A Design Feature of Cryptographic Agility
Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, and Beumjin Cho
Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, and Beumjin Cho
Fast pairings via biextensions and cubical arithmetic
Damien Robert
Damien Robert
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages
Björn Ho, Huanhuan Chen, Zeshun Shi, and Kaitai Liang
Björn Ho, Huanhuan Chen, Zeshun Shi, and Kaitai Liang
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE
Manning Zhang, Zeshun Shi, Huanhuan Chen, and Kaitai Liang
Manning Zhang, Zeshun Shi, Huanhuan Chen, and Kaitai Liang
Zero-Knowledge Proof Vulnerability Analysis and Security Auditing
Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, and Shixiao Sun
Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, and Shixiao Sun
Quantum Implementation and Analysis of SHA-2 and SHA-3
Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, and Hwajeong Seo
Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, and Hwajeong Seo
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, and Shuyi Chen
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, and Shuyi Chen
A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes
Cezary Pilaszewicz, Lea R. Muth, and Marian Margraf
Cezary Pilaszewicz, Lea R. Muth, and Marian Margraf
Snake-eye Resistance from LWE for Oblivious Message Retrieval and Robust Encryption
Zeyu Liu, Katerina Sotiraki, Eran Tromer, and Yunhao Wang
Zeyu Liu, Katerina Sotiraki, Eran Tromer, and Yunhao Wang
Distribution of cycles in supersingular $\ell$-isogeny graphs
Eli Orvis
Eli Orvis
Secure Multi-Party Linear Algebra with Perfect Correctness
Jules Maire and Damien Vergnaud
Jules Maire and Damien Vergnaud
An Efficient SNARK for Field-Programmable and RAM Circuits
Jehyuk Jang and Jamie Judd
Jehyuk Jang and Jamie Judd
A Decentralized Federated Learning using Reputation
Olive Chakraborty and Aymen Boudguiga
Olive Chakraborty and Aymen Boudguiga
RSA-Based Dynamic Accumulator without Hashing into Primes
Victor Youdom Kemmoe and Anna Lysyanskaya
Victor Youdom Kemmoe and Anna Lysyanskaya
Polylogarithmic Proofs for Multilinears over Binary Towers
Benjamin E. Diamond and Jim Posen
Benjamin E. Diamond and Jim Posen
Two Levels are Better than One: Dishonest Majority MPC with $\widetilde{O}(|C|)$ Total Communication
Alexander Bienstock and Kevin Yeo
Alexander Bienstock and Kevin Yeo
Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain
Neyire Deniz Sarier
Neyire Deniz Sarier
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation
Kwangsu Lee
Kwangsu Lee
Side Channel Resistant Sphincs+
Scott Fluhrer
Scott Fluhrer
CCA Secure Updatable Encryption from Non-Mappable Group Actions
Jonas Meers and Doreen Riepel
Jonas Meers and Doreen Riepel
Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology
Jingwei Hu, Yuhong Fang, and Wangchen Dai
Jingwei Hu, Yuhong Fang, and Wangchen Dai
On the Security of Data Markets and Private Function Evaluation
István Vajda
István Vajda
Two-Round Threshold Signature from Algebraic One-More Learning with Errors
Thomas Espitau, Shuichi Katsumata, and Kaoru Takemure
Thomas Espitau, Shuichi Katsumata, and Kaoru Takemure
Reducing Signature Size of Matrix-code-based Signature Schemes
Tung Chou, Ruben Niederhagen, Lars Ran, and Simona Samardjiska
Tung Chou, Ruben Niederhagen, Lars Ran, and Simona Samardjiska
HW-token-based Common Random String Setup
István Vajda
István Vajda
Reckle Trees: Updatable Merkle Batch Proofs with Applications
Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, and Stjepan Golemac
Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, and Stjepan Golemac
Statistical testing of random number generators and their improvement using randomness extraction
Cameron Foreman, Richie Yeung, and Florian J. Curchod
Cameron Foreman, Richie Yeung, and Florian J. Curchod
Updatable Policy-Compliant Signatures
Christian Badertscher, Monosij Maitra, Christian Matt, and Hendrik Waldner
Christian Badertscher, Monosij Maitra, Christian Matt, and Hendrik Waldner
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures
Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, and Peter Scholl
Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, and Peter Scholl
Guess and Determine Analysis Based on Set Split
Zhe CEN, Xiutao FENG, Zhangyi WANG, Yamin ZHU, and Chunping CAO
Zhe CEN, Xiutao FENG, Zhangyi WANG, Yamin ZHU, and Chunping CAO
Improving Generic Attacks Using Exceptional Functions
Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, and André Schrottenloher
Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, and André Schrottenloher
Real-Valued Somewhat-Pseudorandom Unitaries
Zvika Brakerski and Nir Magrafta
Zvika Brakerski and Nir Magrafta
Anamorphic Encryption: New Constructions and Homomorphic Realizations
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
Dario Catalano, Emanuele Giunta, and Francesco Migliaro
A Variation on Knellwolf and Meier's Attack on the Knapsack Generator
Florette Martinez
Florette Martinez
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives
Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, and Shivam Bhasin
Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, and Shivam Bhasin
Lower data attacks on Advanced Encryption Standard
Orhun Kara
Orhun Kara
$\textsf{ThorPIR}$: Single Server PIR via Homomorphic Thorp Shuffles
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, and Charalampos Papamanthou
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, and Charalampos Papamanthou
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation
Charlotte Hoffmann and Krzysztof Pietrzak
Charlotte Hoffmann and Krzysztof Pietrzak
Folding-based zkLLM
Wilbert W
Wilbert W
Making Hash-based MVBA Great Again
Hanwen Feng, Zhenliang Lu, Tiancheng Mai, and Qiang Tang
Hanwen Feng, Zhenliang Lu, Tiancheng Mai, and Qiang Tang
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions
Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, and Jian Wang
Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, and Jian Wang
Large Language Models for Blockchain Security: A Systematic Literature Review
Zheyuan He, Zihao Li, Sen Yang, Ao Qiao, Xiaosong Zhang, Xiapu Luo, and Ting Chen
Zheyuan He, Zihao Li, Sen Yang, Ao Qiao, Xiaosong Zhang, Xiapu Luo, and Ting Chen
OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning
Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, and Jinsong Han
Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, and Jinsong Han
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs
Matthew Gregoire, Rachel Thomas, and Saba Eskandarian
Matthew Gregoire, Rachel Thomas, and Saba Eskandarian
Accumulation without Homomorphism
Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, and William Wang
Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, and William Wang
Extremely Simple (Almost) Fail-Stop ECDSA Signatures
Mario Yaksetig
Mario Yaksetig
Sailfish: Towards Improving the Latency of DAG-based BFT
Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, and Kartik Nayak
Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, and Kartik Nayak
Knot-based Key Exchange protocol
Silvia Sconza and Arno Wildi
Silvia Sconza and Arno Wildi
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, and Damien Vergnaud
Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, and Damien Vergnaud
Malicious Security for Sparse Private Histograms
Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, and Karn Seth
Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, and Karn Seth
Zero-Dimensional Gröbner Bases for Rescue-XLIX
Matthias Johann Steiner
Matthias Johann Steiner
Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
Arctic: Lightweight and Stateless Threshold Schnorr Signatures
Chelsea Komlo and Ian Goldberg
Chelsea Komlo and Ian Goldberg
Shorter VOLEitH Signature from Multivariate Quadratic
Dung Bui
Dung Bui
ON THE IMPLEMENTATION OF A LATTICE-BASED DAA FOR VANET SYSTEM
Doryan Lesaignoux and Mikael Carmona
Doryan Lesaignoux and Mikael Carmona
Security Guidelines for Implementing Homomorphic Encryption
Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, and Donggeon Yhee
Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, and Donggeon Yhee
Perfect Zero-Knowledge PCPs for #P
Tom Gur, Jack O'Connor, and Nicholas Spooner
Tom Gur, Jack O'Connor, and Nicholas Spooner
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy
Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, and Tucker Balch
Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, and Tucker Balch
Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption
Lorenzo Rovida and Alberto Leporati
Lorenzo Rovida and Alberto Leporati
Isogeny problems with level structure
Luca De Feo, Tako Boris Fouotsa, and Lorenz Panny
Luca De Feo, Tako Boris Fouotsa, and Lorenz Panny
Classical and Quantum Generic Attacks on 6-round Feistel Schemes
Maya Chartouny, Benoit Cogliati, and Jacques Patarin
Maya Chartouny, Benoit Cogliati, and Jacques Patarin
Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern
Lena Heimberger, Florian Lugstein, and Christian Rechberger
Lena Heimberger, Florian Lugstein, and Christian Rechberger
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, and Muthuramakrishnan Venkitasubramaniam
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, and Muthuramakrishnan Venkitasubramaniam
Anonymous Complaint Aggregation for Secure Messaging
Connor Bell and Saba Eskandarian
Connor Bell and Saba Eskandarian
The Systemic Errors of Banded Quantum Fourier Transformation
Zhengjun Cao and Zhenfu Cao
Zhengjun Cao and Zhenfu Cao
Verifiable Information-Theoretic Function Secret Sharing
Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, and Liang Feng Zhang
Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, and Liang Feng Zhang
Modeling Mobile Crash in Byzantine Consensus
Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, and Jiangshan Yu
Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, and Jiangshan Yu
Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2
Louis Tremblay Thibault and Michael Walter
Louis Tremblay Thibault and Michael Walter
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
Ward Beullens, Lucas Dodgson, Sebastian Faller, and Julia Hesse
Ward Beullens, Lucas Dodgson, Sebastian Faller, and Julia Hesse
Practical Lattice-Based Distributed Signatures for a Small Number of Signers
Nabil Alkeilani Alkadri, Nico Döttling, and Sihang Pu
Nabil Alkeilani Alkadri, Nico Döttling, and Sihang Pu
Differential Cryptanalysis of a Lightweight Block Cipher LELBC
Manjeet Kaur, Tarun Yadav, Manoj Kumar, and Dhananjoy Dey
Manjeet Kaur, Tarun Yadav, Manoj Kumar, and Dhananjoy Dey
ORIGO: Proving Provenance of Sensitive Data with Constant Communication
Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, and Sebastian Steinhorst
Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, and Sebastian Steinhorst
Estimating the Unpredictability of Multi-Bit Strong PUF Classes
Ahmed Bendary, Wendson A. S. Barbosa, Andrew Pomerance, and C. Emre Koksal
Ahmed Bendary, Wendson A. S. Barbosa, Andrew Pomerance, and C. Emre Koksal
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions
Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, and Jenit Tomy
Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, and Jenit Tomy
A trust-minimized e-cash for cryptocurrencies
Mario Yaksetig
Mario Yaksetig
The cool and the cruel: separating hard parts of LWE secrets
Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, Francois Charton, and Kristin Lauter
Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, Francois Charton, and Kristin Lauter
Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking
Kostas Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, and Joy Wang
Kostas Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, and Joy Wang
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, and Alexandre Wallet
Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, and Alexandre Wallet
Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA
Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, and Antoine Loiseau
Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, and Antoine Loiseau
Threshold implementations of cryptographic functions between finite Abelian groups
Enrico Piccione
Enrico Piccione
EFFLUX-F2: A High Performance Hardware Security Evaluation Board
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, and Somitra Kumar Sanadhya
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, and Somitra Kumar Sanadhya
Insecurity of MuSig and Bellare-Neven Multi-Signatures with Delayed Message Selection
Sela Navot
Sela Navot
Re-Randomized FROST
Conrado P. L. Gouvea and Chelsea Komlo
Conrado P. L. Gouvea and Chelsea Komlo
Unbiasable Verifiable Random Functions
Emanuele Giunta and Alistair Stewart
Emanuele Giunta and Alistair Stewart
Parameter-Hiding Order-Revealing Encryption without Pairings
Cong Peng, Rongmao Chen, Yi Wang, Debiao He, and Xinyi Huang
Cong Peng, Rongmao Chen, Yi Wang, Debiao He, and Xinyi Huang
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience
Rabiah Alnashwan, Prosanta Gope, and Benjamin Dowling
Rabiah Alnashwan, Prosanta Gope, and Benjamin Dowling
Perfect Asynchronous MPC with Linear Communication Overhead
Ittai Abraham, Gilad Asharov, Shravani Patil, and Arpita Patra
Ittai Abraham, Gilad Asharov, Shravani Patil, and Arpita Patra
Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version
Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, and François-Xavier Standaert
Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, and François-Xavier Standaert
SoK: Zero-Knowledge Range Proofs
Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, and Joy Wang
Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, and Joy Wang
FOLEAGE: $\mathbb{F}_4$OLE-Based Multi-Party Computation for Boolean Circuits
Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, and Sacha Servan-Schreiber
Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, and Sacha Servan-Schreiber
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V
Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, and Debayan Das
Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, and Debayan Das
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes
Hermann Seuschek, Johann Heyszl, and Fabrizio De Santis
Hermann Seuschek, Johann Heyszl, and Fabrizio De Santis
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, and Xiao Wang
Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, and Xiao Wang
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement
Marshall Ball, Yanyi Liu, Noam Mazor, and Rafael Pass
Marshall Ball, Yanyi Liu, Noam Mazor, and Rafael Pass
Revisiting the Security of Approximate FHE with Noise-Flooding Countermeasures
Flavio Bergamaschi, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, and Rui Tang
Flavio Bergamaschi, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, and Rui Tang
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores
Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, and Ileana Buhan
Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, and Ileana Buhan
A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
Deepak Kumar Dalai and Krishna Mallick
Deepak Kumar Dalai and Krishna Mallick
LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup
Xiangyu Hui and Sid Chi-Kin Chau
Xiangyu Hui and Sid Chi-Kin Chau
Gap MCSP is not (Levin) NP-complete in Obfustopia
Noam Mazor and Rafael Pass
Noam Mazor and Rafael Pass
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs
Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, and Anat Paskin-Cherniavsky
Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, and Anat Paskin-Cherniavsky
Atomic and Fair Data Exchange via Blockchain
Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, and Valeria Nikolaenko
Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, and Valeria Nikolaenko
An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic
Hongyuan Qu and Guangwu Xu
Hongyuan Qu and Guangwu Xu
Mangrove: A Scalable Framework for Folding-based SNARKs
Wilson Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, and Dan Boneh
Wilson Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, and Dan Boneh
Column-wise Garbling, and How to Go Beyond the Linear Model
Lei Fan, Zhenghao Lu, and Hong-Sheng Zhou
Lei Fan, Zhenghao Lu, and Hong-Sheng Zhou
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations
Joseph Carolan and Alexander Poremba
Joseph Carolan and Alexander Poremba
Bent functions construction using extended Maiorana-McFarland’s class
Juan Carlos Ku-Cauich, Javier Diaz-Vargas, and Sara Mandujano-Velazquez
Juan Carlos Ku-Cauich, Javier Diaz-Vargas, and Sara Mandujano-Velazquez
Quasi-Optimal Permutation Ranking and Applications to PERK
Slim Bettaieb, Alessandro Budroni, Marco Palumbi, and Décio Luiz Gazzoni Filho
Slim Bettaieb, Alessandro Budroni, Marco Palumbi, and Décio Luiz Gazzoni Filho
Polytopes in the Fiat-Shamir with Aborts Paradigm
Henry Bambury, Hugo Beguinet, Thomas Ricosset, and Eric Sageloli
Henry Bambury, Hugo Beguinet, Thomas Ricosset, and Eric Sageloli
Recent Progress in Quantum Computing Relevant to Internet Security
Hilarie Orman
Hilarie Orman
Nebula: A Privacy-First Platform for Data Backhaul
Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, and Raluca Ada Popa
Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, and Raluca Ada Popa
Stateless and Verifiable Execution Layer for Meta-Protocols on Bitcoin
Hongbo Wen, Hanzhi Liu, Shuyang Tang, Tianyue Li, Shuhan Cao, Domo, Yanju Chen, and Yu Feng
Hongbo Wen, Hanzhi Liu, Shuyang Tang, Tianyue Li, Shuhan Cao, Domo, Yanju Chen, and Yu Feng
Permutation-Based Hashing Beyond the Birthday Bound
Charlotte Lefevre and Bart Mennink
Charlotte Lefevre and Bart Mennink
Some notes on algorithms for abelian varieties
Damien Robert
Damien Robert
Traceable Secret Sharing: Strong Security and Efficient Constructions
Dan Boneh, Aditi Partap, and Lior Rotem
Dan Boneh, Aditi Partap, and Lior Rotem
Breaking the DECT Standard Cipher with Lower Time Cost
Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, and Zheng Wu
Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, and Zheng Wu
DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication
Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, and Manuel Vidigueira
Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, and Manuel Vidigueira
Efficient Unbalanced Quorum PSI from Homomorphic Encryption
Xinpeng Yang, Liang Cai, Yinghao Wang, Yinghao Wang, Lu Sun, and Jingwei Hu
Xinpeng Yang, Liang Cai, Yinghao Wang, Yinghao Wang, Lu Sun, and Jingwei Hu
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, and Ron Steinfeld
Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, and Ron Steinfeld
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks
Max Duparc, Tako Boris Fouotsa, and Serge Vaudenay
Max Duparc, Tako Boris Fouotsa, and Serge Vaudenay
A Direct PRF Construction from Kolmogorov Complexity
Yanyi Liu and Rafael Pass
Yanyi Liu and Rafael Pass
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK
Oana Ciobotaru, Maxim Peter, and Vesselin Velichkov
Oana Ciobotaru, Maxim Peter, and Vesselin Velichkov
Exponent-VRFs and Their Applications
Dan Boneh, Iftach Haitner, and Yehuda Lindell
Dan Boneh, Iftach Haitner, and Yehuda Lindell
On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology
Theresa Krüger
Theresa Krüger
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators
Jiajun Xin, Arman Haghighi, Xiangan Tian, and Dimitrios Papadopoulos
Jiajun Xin, Arman Haghighi, Xiangan Tian, and Dimitrios Papadopoulos
A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System
Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, and Hongwei Wang
Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, and Hongwei Wang
Solving McEliece-1409 in One Day --- Cryptanalysis with the Improved BJMM Algorithm
Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, and Kazuhide Fukushima
Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, and Kazuhide Fukushima
Heuristic Ideal Obfuscation Based on Evasive LWR
Zhuang Shan, Leyou Zhang, and Qiqi Lai
Zhuang Shan, Leyou Zhang, and Qiqi Lai
On Information-Theoretic Secure Multiparty Computation with Local Repairability
Daniel Escudero, Ivan Tjuawinata, and Chaoping Xing
Daniel Escudero, Ivan Tjuawinata, and Chaoping Xing
STIR: Reed–Solomon Proximity Testing with Fewer Queries
Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, and Eylon Yogev
Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, and Eylon Yogev
On the Feasibility of Sliced Garbling
Tomer Ashur, Carmit Hazay, and Rahul Satish
Tomer Ashur, Carmit Hazay, and Rahul Satish
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding
Yijian Zhang, Yunhao Ling, Jie Chen, and Luping Wang
Yijian Zhang, Yunhao Ling, Jie Chen, and Luping Wang
Ceno: Non-uniform, Segment and Parallel Zero-knowledge Virtual Machine
Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, and Ye Zhang
Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, and Ye Zhang
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings
Christopher Harth-Kitzerow, Ajith Suresh, Yongqin Wang, Hossein Yalame, Georg Carle, and Murali Annavaram
Christopher Harth-Kitzerow, Ajith Suresh, Yongqin Wang, Hossein Yalame, Georg Carle, and Murali Annavaram
A New Public Key Cryptosystem Based on the Cubic Pell Curve
Michel Seck and Abderrahmane Nitaj
Michel Seck and Abderrahmane Nitaj
Transmitter Actions for Secure Integrated Sensing and Communication
Truman Welling, Onur Gunlu, and Aylin Yener
Truman Welling, Onur Gunlu, and Aylin Yener
Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers
Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, and Manoj Prabhakaran
Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, and Manoj Prabhakaran
Decentralized Access Control Infrastructure for Enterprise Digital Asset Management
Chirag Madaan, Rohan Agarwal, Vipul Saini, and Ujjwal Kumar
Chirag Madaan, Rohan Agarwal, Vipul Saini, and Ujjwal Kumar
Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure
Haotian Shi and Xiutao Feng
Haotian Shi and Xiutao Feng
Collision Resistance from Multi-Collision Resistance for all Constant Parameters
Jan Buzek and Stefano Tessaro
Jan Buzek and Stefano Tessaro
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity
Elizabeth Crites, Aggelos Kiayias, Markulf Kohlweiss, and Amirreza Sarencheh
Elizabeth Crites, Aggelos Kiayias, Markulf Kohlweiss, and Amirreza Sarencheh
Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips
Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, and Ulrich Rührmair
Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, and Ulrich Rührmair
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, and François-Xavier Standaert
Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, and François-Xavier Standaert
Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS
Gilad Asharov and Anirudh Chandramouli
Gilad Asharov and Anirudh Chandramouli
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
Reo Eriguchi, Kaoru Kurosawa, and Koji Nuida
Reo Eriguchi, Kaoru Kurosawa, and Koji Nuida
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
You Lyu, Shengli Liu, and Shuai Han
You Lyu, Shengli Liu, and Shuai Han
Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries
Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, and Uri Stemmer
Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, and Uri Stemmer
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
Pedro Branco, Nico Döttling, and Akshayaram Srinivasan
Pedro Branco, Nico Döttling, and Akshayaram Srinivasan
Preimage Attacks on Reduced-Round Ascon-Xof
Seungjun Baek, Giyoon Kim, and Jongsung Kim
Seungjun Baek, Giyoon Kim, and Jongsung Kim
Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
Daniel Escudero, Yifan Song, and Wenhao Wang
Daniel Escudero, Yifan Song, and Wenhao Wang
Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts
David Heath, Vladimir Kolesnikov, and Lucien K. L. Ng
David Heath, Vladimir Kolesnikov, and Lucien K. L. Ng
Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants
Anand Kumar Narayanan, Youming Qiao, and Gang Tang
Anand Kumar Narayanan, Youming Qiao, and Gang Tang
Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Key Recovery Attack on the Partial Vandermonde Knapsack Problem
Dipayan Das and Antoine Joux
Dipayan Das and Antoine Joux
Combined Threshold Implementation
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, and Tim Güneysu
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, and Tim Güneysu
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem
Lars Ran, Simona Samardjiska, and Monika Trimoska
Lars Ran, Simona Samardjiska, and Monika Trimoska
Time-Averaged Analysis of Selfish Mining in Bitcoin
Roozbeh Sarenche, Ren Zhang, Svetla Nikova, and Bart Preneel
Roozbeh Sarenche, Ren Zhang, Svetla Nikova, and Bart Preneel
Integrating Causality in Messaging Channels
Shan Chen and Marc Fischlin
Shan Chen and Marc Fischlin
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation
Jiaxin Pan, Doreen Riepel, and Runzhi Zeng
Jiaxin Pan, Doreen Riepel, and Runzhi Zeng
The NISQ Complexity of Collision Finding
Yassine Hamoudi, Qipeng Liu, and Makrand Sinha
Yassine Hamoudi, Qipeng Liu, and Makrand Sinha
Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique
Caicai Chen and Chris Jones
Caicai Chen and Chris Jones
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication
Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, and Debiao He
Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, and Debiao He
Security analysis of the iMessage PQ3 protocol
Douglas Stebila
Douglas Stebila
On Central Primitives for Quantum Cryptography with Classical Communication
Kai-Min Chung, Eli Goldin, and Matthew Gray
Kai-Min Chung, Eli Goldin, and Matthew Gray
Adaptively Secure Streaming Functional Encryption
Pratish Datta, Jiaxin Guan, Alexis Korb, and Amit Sahai
Pratish Datta, Jiaxin Guan, Alexis Korb, and Amit Sahai
WARPfold : Wrongfield ARithmetic for Protostar folding
Lev Soukhanov
Lev Soukhanov
FuLeakage: Breaking FuLeeca by Learning Attacks
Felicitas Hörmann and Wessel van Woerden
Felicitas Hörmann and Wessel van Woerden
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, and Tianyu Zhang
Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, and Tianyu Zhang
Improved Differential Meet-In-The-Middle Cryptanalysis
Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, and María Naya-Plasencia
Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, and María Naya-Plasencia
Automating Collision Attacks on RIPEMD-160
Yingxin Li, Fukang Liu, and Gaoli Wang
Yingxin Li, Fukang Liu, and Gaoli Wang
New Records in Collision Attacks on SHA-2
Yingxin Li, Fukang Liu, and Gaoli Wang
Yingxin Li, Fukang Liu, and Gaoli Wang
A Computational Tsirelson's Theorem for the Value of Compiled XOR Games
David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, and Tina Zhang
David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, and Tina Zhang
The Algebraic Freelunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives
Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, and Håvard Raddum
Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, and Håvard Raddum
A data aggregation protocol based on TFHE
Maria Ferrara, Antonio Tortora, and Maria Tota
Maria Ferrara, Antonio Tortora, and Maria Tota
An Efficient Adaptive Attack Against FESTA
Guoqing Zhou and Maozhi Xu
Guoqing Zhou and Maozhi Xu
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, and Jian Weng
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, and Jian Weng
Partial Differential Fault Analysis on Ascon
Yang Gao
Yang Gao
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
Jiahui He, Kai Hu, Hao Lei, and Meiqin Wang
Jiahui He, Kai Hu, Hao Lei, and Meiqin Wang
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
Leo de Castro and Keewoo Lee
Leo de Castro and Keewoo Lee
A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors
Brent Waters
Brent Waters
From Random Probing to Noisy Leakages Without Field-Size Dependence
Gianluca Brian, Stefan Dziembowski, and Sebastian Faust
Gianluca Brian, Stefan Dziembowski, and Sebastian Faust
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis
Itai Dinur
Itai Dinur
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme
Valerie Gilchrist, Laurane Marco, Christophe Petit, and Gang Tang
Valerie Gilchrist, Laurane Marco, Christophe Petit, and Gang Tang
RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs
Khai Hanh Tang, Minh Pham, and Chan Nam Ngo
Khai Hanh Tang, Minh Pham, and Chan Nam Ngo
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages
Naresh Goud Boddu, Vipul Goyal, Rahul Jain, and João Ribeiro
Naresh Goud Boddu, Vipul Goyal, Rahul Jain, and João Ribeiro
The Impact of Reversibility on Parallel Pebbling
Jeremiah Blocki, Blake Holman, and Seunghoon Lee
Jeremiah Blocki, Blake Holman, and Seunghoon Lee
Practical Attack on All Parameters of the DME Signature Scheme
Pierre Briaud, Maxime Bros, Ray Perlner, and Daniel Smith-Tone
Pierre Briaud, Maxime Bros, Ray Perlner, and Daniel Smith-Tone
Leakage-Tolerant Circuits
Yuval Ishai and Yifan Song
Yuval Ishai and Yifan Song
Transaction Fee Mechanism Design in a Post-MEV World
Maryam Bahrani, Pranav Garimidi, and Tim Roughgarden
Maryam Bahrani, Pranav Garimidi, and Tim Roughgarden
Fuzzy Private Set Intersection with Large Hyperballs
Aron van Baarsen and Sihang Pu
Aron van Baarsen and Sihang Pu
How to Validate a Verification?
Houda Ferradi
Houda Ferradi
Attribute-Based Signatures with Advanced Delegation, and Tracing
Cécile Delerablée, Lénaïck Gouriou, and David Pointcheval
Cécile Delerablée, Lénaïck Gouriou, and David Pointcheval
Registered Functional Encryptions from Pairings
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, and Haifeng Qian
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, and Haifeng Qian
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications
Nicolas Alhaddad, Mayank Varia, and Ziling Yang
Nicolas Alhaddad, Mayank Varia, and Ziling Yang
Proofs for Deep Thought: Accumulation for large memories and deterministic computations
Benedikt Bünz and Jessica Chen
Benedikt Bünz and Jessica Chen
Under What Conditions Is Encrypted Key Exchange Actually Secure?
Jake Januzelli, Lawrence Roy, and Jiayu Xu
Jake Januzelli, Lawrence Roy, and Jiayu Xu
Circuit Bootstrapping: Faster and Smaller
Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, and Kunpeng Wang
Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, and Kunpeng Wang
Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis
Weixi Zheng, Liu Zhang, and Zilong Wang
Weixi Zheng, Liu Zhang, and Zilong Wang
Formal Verification of Emulated Floating-Point Arithmetic in Falcon
Vincent Hwang
Vincent Hwang
POPSTAR: Lightweight Threshold Reporting with Reduced Leakage
Hanjun Li, Sela Navot, and Stefano Tessaro
Hanjun Li, Sela Navot, and Stefano Tessaro
On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings $Z_{2^s}, s>1$.
Vasyl Ustimenko
Vasyl Ustimenko
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs
Alexander Hoover, Sarvar Patel, Giuseppe Persiano, and Kevin Yeo
Alexander Hoover, Sarvar Patel, Giuseppe Persiano, and Kevin Yeo
Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus
Giovanni Deligios and Mose Mizrahi Erbes
Giovanni Deligios and Mose Mizrahi Erbes
Threshold Garbled Circuits with Low Overhead
Schuyler Rosefield, abhi shelat, and LaKyah Tyner
Schuyler Rosefield, abhi shelat, and LaKyah Tyner
Alternative Key Schedules for the AES
Christina Boura, Patrick Derbez, and Margot Funk
Christina Boura, Patrick Derbez, and Margot Funk
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, and Sujoy Sinha Roy
Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, and Sujoy Sinha Roy
The Complexity of Algebraic Algorithms for LWE
Matthias Johann Steiner
Matthias Johann Steiner
Trapdoor Memory-Hard Functions
Benedikt Auerbach, Christoph U. Günther, and Krzysztof Pietrzak
Benedikt Auerbach, Christoph U. Günther, and Krzysztof Pietrzak
Aggregating Falcon Signatures with LaBRADOR
Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, and Akira Takahashi
Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, and Akira Takahashi
A Zero-Dimensional Gröbner Basis for Poseidon
Matthias Johann Steiner
Matthias Johann Steiner
NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack
Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, and Ozgur Sinanoglu
Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, and Ozgur Sinanoglu
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM
Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, and Marjan Skrobot
Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, and Marjan Skrobot
SweetPAKE: Key exchange with decoy passwords
Afonso Arriaga, Peter Y.A. Ryan, and Marjan Skrobot
Afonso Arriaga, Peter Y.A. Ryan, and Marjan Skrobot
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions
Intak Hwang, Jinyeong Seo, and Yongsoo Song
Intak Hwang, Jinyeong Seo, and Yongsoo Song
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance
Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, and Yongluan Zhou
Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, and Yongluan Zhou
Single Pass Client-Preprocessing Private Information Retrieval
Arthur Lazzaretti and Charalampos Papamanthou
Arthur Lazzaretti and Charalampos Papamanthou
Simple constructions of linear-depth t-designs and pseudorandom unitaries
Tony Metger, Alexander Poremba, Makrand Sinha, and Henry Yuen
Tony Metger, Alexander Poremba, Makrand Sinha, and Henry Yuen
Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device
David Lubicz and Viktor FIscher
David Lubicz and Viktor FIscher
Diving Deep into the Preimage Security of AES-like Hashing
Shiyao Chen, Jian Guo, Eik List, Danping Shi, and Tianyu Zhang
Shiyao Chen, Jian Guo, Eik List, Danping Shi, and Tianyu Zhang
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Robin Leander Schröder, Stefan Gast, and Qian Guo
Robin Leander Schröder, Stefan Gast, and Qian Guo
New Models for the Cryptanalysis of ASCON
Mathieu Degré, Patrick Derbez, Lucie Lahaye, and André Schrottenloher
Mathieu Degré, Patrick Derbez, Lucie Lahaye, and André Schrottenloher
Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography
ABHISAR, Madhav Yadav, and Girish Mishra
ABHISAR, Madhav Yadav, and Girish Mishra
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks
Yiming Gao, Jinghui Wang, Honggang Hu, and Binang He
Yiming Gao, Jinghui Wang, Honggang Hu, and Binang He
An Efficient Hash Function for Imaginary Class Groups
Kostas Kryptos Chalkias, Jonas Lindstrøm, and Arnab Roy
Kostas Kryptos Chalkias, Jonas Lindstrøm, and Arnab Roy
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
Thomas Peters, Yaobin Shen, and François-Xavier Standaert
Thomas Peters, Yaobin Shen, and François-Xavier Standaert
Registered Attribute-Based Signature
Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, and Jie Chen
Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, and Jie Chen
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON
Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, and Xue Liu
Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, and Xue Liu
Quantum Pseudorandomness Cannot Be Shrunk In a Black-Box Way
Samuel Bouaziz--Ermann and Garazi Muguruza
Samuel Bouaziz--Ermann and Garazi Muguruza
Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading
Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, and Onur Gunlu
Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, and Onur Gunlu
SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice
Dilara Toprakhisar, Svetla Nikova, and Ventzislav Nikov
Dilara Toprakhisar, Svetla Nikova, and Ventzislav Nikov
A generic algorithm for efficient key recovery in differential attacks – and its associated tool
Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, and María Naya-Plasencia
Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, and María Naya-Plasencia
CAPABARA: A Combined Attack on CAPA
Dilara Toprakhisar, Svetla Nikova, and Ventzislav Nikov
Dilara Toprakhisar, Svetla Nikova, and Ventzislav Nikov
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
Jules Maire and Damien Vergnaud
Jules Maire and Damien Vergnaud
Mirrored Commitment: Fixing ``Randomized Partial Checking'' and Applications
Paweł Lorek, Moti Yung, and Filip Zagórski
Paweł Lorek, Moti Yung, and Filip Zagórski
Practical Improvements to Statistical Ineffective Fault Attacks
Barış Ege, Bob Swinkels, Dilara Toprakhisar, and Praveen Kumar Vadnala
Barış Ege, Bob Swinkels, Dilara Toprakhisar, and Praveen Kumar Vadnala
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling
Carmit Hazay and Yibin Yang
Carmit Hazay and Yibin Yang
A Concrete Analysis of Wagner's $k$-List Algorithm over $\mathbb{Z}_p$
Antoine Joux, Hunter Kippen, and Julian Loss
Antoine Joux, Hunter Kippen, and Julian Loss
Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup
Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, and Hoeteck Wee
Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, and Hoeteck Wee
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures
Renas Bacho, Julian Loss, Gilad Stern, and Benedikt Wagner
Renas Bacho, Julian Loss, Gilad Stern, and Benedikt Wagner
Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$
River Moreira Ferreira and Ludovic Perret
River Moreira Ferreira and Ludovic Perret
Circle STARKs
Ulrich Haböck, David Levit, and Shahar Papini
Ulrich Haböck, David Levit, and Shahar Papini
Fault Attacks on UOV and Rainbow
Juliane Krämer and Mirjam Loiero
Juliane Krämer and Mirjam Loiero
Reduce and Prange: Revisiting Prange's ISD for Solving LPN/RSD over Large Fields
Jiseung Kim and Changmin Lee
Jiseung Kim and Changmin Lee
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
Chun Guo, Xiao Wang, Xiang Xie, and Yu Yu
Chun Guo, Xiao Wang, Xiang Xie, and Yu Yu
Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption
Heewon Chung, Hyojun Kim, Young-Sik Kim, and Yongwoo Lee
Heewon Chung, Hyojun Kim, Young-Sik Kim, and Yongwoo Lee
Information-Theoretic 2-Party Computation from Additive Somewhat Homomorphic Encryption
Jonathan Trostle
Jonathan Trostle
Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers
Narendra Kumar Patel and Hemraj Shobharam Lamkuche
Narendra Kumar Patel and Hemraj Shobharam Lamkuche
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem
Janice Jianing Si, Tanusree Sharma, and Kanye Ye Wang
Janice Jianing Si, Tanusree Sharma, and Kanye Ye Wang
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing
Samir Jordan Menon and David J. Wu
Samir Jordan Menon and David J. Wu
A note on PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks
Milad Seddigh and Seyed Hamid Baghestani
Milad Seddigh and Seyed Hamid Baghestani
A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More
Minki Hhan
Minki Hhan
zkPi: Proving Lean Theorems in Zero-Knowledge
Evan Laufer, Alex Ozdemir, and Dan Boneh
Evan Laufer, Alex Ozdemir, and Dan Boneh
WhisPIR: Stateless Private Information Retrieval with Low Communication
Leo de Castro, Kevin Lewi, and Edward Suh
Leo de Castro, Kevin Lewi, and Edward Suh
Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits
Michele Orrù, George Kadianakis, Mary Maller, and Greg Zaverucha
Michele Orrù, George Kadianakis, Mary Maller, and Greg Zaverucha
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT
Nils Fleischhacker, Mathias Hall-Andersen, and Mark Simkin
Nils Fleischhacker, Mathias Hall-Andersen, and Mark Simkin
Threshold Encryption with Silent Setup
Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang
Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang
Note on the cryptanalysis of Speedy
Tim Beyne and Addie Neyt
Tim Beyne and Addie Neyt
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility
Véronique Cortier, Alexandre Debant, Anselme Goetschmann, and Lucca Hirschi
Véronique Cortier, Alexandre Debant, Anselme Goetschmann, and Lucca Hirschi
Kleptographic Attacks against Implicit Rejection
Antoine Joux, Julian Loss, and Benedikt Wagner
Antoine Joux, Julian Loss, and Benedikt Wagner
Anonymity on Byzantine-Resilient Decentralized Computing
Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, and Xiuzhen Cheng
Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, and Xiuzhen Cheng
SoK: Decentralized Storage Network
Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, and Xiuzhen Cheng
Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, and Xiuzhen Cheng
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems
Dan Boneh and Binyi Chen
Dan Boneh and Binyi Chen
Fiat-Shamir for Bounded-Depth Adversaries
Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, and Yiding Zhang
Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, and Yiding Zhang
Revisiting Differential-Linear Attacks via a Boomerang Perspective With Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hosein Hadipour, Patrick Derbez, and Maria Eichlseder
Hosein Hadipour, Patrick Derbez, and Maria Eichlseder
Adaptive Security in SNARGs via iO and Lossy Functions
Brent Waters and Mark Zhandry
Brent Waters and Mark Zhandry
2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC
Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, and Avishay Yanai
Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, and Avishay Yanai
Faster Signatures from MPC-in-the-Head
Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, and Antoine Joux
Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, and Antoine Joux
Communication-Optimal Convex Agreement
Diana Ghinea, Chen-Da Liu-Zhang, and Roger Wattenhofer
Diana Ghinea, Chen-Da Liu-Zhang, and Roger Wattenhofer
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Katharina Koschatko, Reinhard Lüftenegger, and Christian Rechberger
Katharina Koschatko, Reinhard Lüftenegger, and Christian Rechberger
Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes
Nir Bitansky and Sapir Freizeit
Nir Bitansky and Sapir Freizeit
FRIDA: Data Availability Sampling from FRI
Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Simon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, and Stefan Mangard
Simon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, and Stefan Mangard
OCash: Fully Anonymous Payments between Blockchain Light Clients
Adam Blatchley Hansen, Jesper Buus Nielsen, and Mark Simkin
Adam Blatchley Hansen, Jesper Buus Nielsen, and Mark Simkin
Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience
Xiaoyu Ji, Junru Li, and Yifan Song
Xiaoyu Ji, Junru Li, and Yifan Song
Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems
Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, and Mukul Kulkarni
Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, and Mukul Kulkarni
Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience
Vipul Goyal, Chen-Da Liu-Zhang, and Yifan Song
Vipul Goyal, Chen-Da Liu-Zhang, and Yifan Song
Perfectly-Secure MPC with Constant Online Communication Complexity
Yifan Song and Xiaxi Ye
Yifan Song and Xiaxi Ye
Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings
Kaisei Kajita, Go Ohtake, and Tsuyoshi Takagi
Kaisei Kajita, Go Ohtake, and Tsuyoshi Takagi
Implementation of Cryptanalytic Programs Using ChatGPT
Nobuyuki Sugio
Nobuyuki Sugio
Simulation-Secure Threshold PKE from Standard (Ring-)LWE
Hiroki Okada and Tsuyoshi Takagi
Hiroki Okada and Tsuyoshi Takagi
A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium
Sönke Jendral
Sönke Jendral
Collusion-Resilience in Transaction Fee Mechanism Design
Hao Chung, Tim Roughgarden, and Elaine Shi
Hao Chung, Tim Roughgarden, and Elaine Shi
Public-Key Cryptography through the Lens of Monoid Actions
Hart Montgomery and Sikhar Patranabis
Hart Montgomery and Sikhar Patranabis
Pseudorandom Error-Correcting Codes
Miranda Christ and Sam Gunn
Miranda Christ and Sam Gunn
Bare PAKE: Universally Composable Key Exchange from just Passwords
Manuel Barbosa, Kai Gellert, Julia Hesse, and Stanislaw Jarecki
Manuel Barbosa, Kai Gellert, Julia Hesse, and Stanislaw Jarecki
Cayley hashing with cookies
Vladimir Shpilrain and Bianca Sosnovski
Vladimir Shpilrain and Bianca Sosnovski
On the Security of Nova Recursive Proof System
Hyeonbum Lee and Jae Hong Seo
Hyeonbum Lee and Jae Hong Seo
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices
Eugene Frimpong, Alexandros Bakas, Camille Foucault, and Antonis Michalas
Eugene Frimpong, Alexandros Bakas, Camille Foucault, and Antonis Michalas
Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM
Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, and Hansol Ryu
Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, and Hansol Ryu
Strong Batching for Non-Interactive Statistical Zero-Knowledge
Changrui Mu, Shafik Nassar, Ron D. Rothblum, and Prashant Nalini Vasudevan
Changrui Mu, Shafik Nassar, Ron D. Rothblum, and Prashant Nalini Vasudevan
On the Untapped Potential of the Quantum FLT-based Inversion
Ren Taguchi and Atsushi Takayasu
Ren Taguchi and Atsushi Takayasu
Adaptively Sound Zero-Knowledge SNARKs for UP
Surya Mathialagan, Spencer Peters, and Vinod Vaikuntanathan
Surya Mathialagan, Spencer Peters, and Vinod Vaikuntanathan
Attribute-based Keyed (Fully) Homomorphic Encryption
Keita Emura, Shingo Sato, and Atsushi Takayasu
Keita Emura, Shingo Sato, and Atsushi Takayasu
Universal Computational Extractors from Lattice Assumptions
Yilei Chen and Xinyu Mao
Yilei Chen and Xinyu Mao
Amplification of Non-Interactive Zero Knowledge, Revisited
Nir Bitansky and Nathan Geier
Nir Bitansky and Nathan Geier
Game-Theoretically Fair Distributed Sampling
Sri AravindaKrishnan Thyagarajan, Ke Wu, and Pratik Soni
Sri AravindaKrishnan Thyagarajan, Ke Wu, and Pratik Soni
Reducing the Number of Qubits in Quantum Factoring
Clémence Chevignard, Pierre-Alain Fouque, and André Schrottenloher
Clémence Chevignard, Pierre-Alain Fouque, and André Schrottenloher
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, and Nektarios Georgios Tsoutsos
Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, and Nektarios Georgios Tsoutsos
Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3
John Preuß Mattsson
John Preuß Mattsson
Singular points of UOV and VOX
Pierre Pébereau
Pierre Pébereau
Lightweight Leakage-Resilient PRNG from TBCs using Superposition
Mustafa Khairallah, Srinivasan Yadhunathan, and Shivam Bhasin
Mustafa Khairallah, Srinivasan Yadhunathan, and Shivam Bhasin
Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption
David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, and Ingrid Verbauwhede
David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, and Ingrid Verbauwhede
Rate-1 Fully Local Somewhere Extractable Hashing from DDH
Pedro Branco, Nico Döttling, Akshayaram Srinivasan, and Riccardo Zanotto
Pedro Branco, Nico Döttling, Akshayaram Srinivasan, and Riccardo Zanotto
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression
Alexander Bienstock, Sarvar Patel, Joon Young Seo, and Kevin Yeo
Alexander Bienstock, Sarvar Patel, Joon Young Seo, and Kevin Yeo
Distributed Fiat-Shamir Transform: from Threshold Identification Protocols to Signatures
Michele Battagliola and Andrea Flamini
Michele Battagliola and Andrea Flamini
A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes
Charlotte Lefevre
Charlotte Lefevre
Analysis of a Programmable Quantum Annealer as a Random Number Generator
Elijah Pelofske
Elijah Pelofske
INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems
Tao Zhang, Shang Shi, Md Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, and Mark Tehranipoor
Tao Zhang, Shang Shi, Md Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, and Mark Tehranipoor
Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers
Dionysis Zindros, Apostolos Tzinas, and David Tse
Dionysis Zindros, Apostolos Tzinas, and David Tse
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption
Konstantinos Brazitikos and Vassilis Zikas
Konstantinos Brazitikos and Vassilis Zikas
Asymmetric Cryptography from Number Theoretic Transformations
Samuel Lavery
Samuel Lavery
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness
Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, and Brent Waters
Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, and Brent Waters
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead
Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, and Mauro Conti
Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, and Mauro Conti
A Generalized Distributed RSA Key Generation
ChihYun Chuang, IHung Hsu, and TingFang Lee
ChihYun Chuang, IHung Hsu, and TingFang Lee
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation
Zeyu Liu, Eran Tromer, and Yunhao Wang
Zeyu Liu, Eran Tromer, and Yunhao Wang
Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use
Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, and Yuriy Polyakov
Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, and Yuriy Polyakov
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability
Mark Manulis and Jérôme Nguyen
Mark Manulis and Jérôme Nguyen
Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders
Antonio Sanso
Antonio Sanso
A Better Proof-of-Work Fork Choice Rule
Karl Kreder, Shreekara Shastry, Apostolos Tzinas, Sriram Vishwanath, and Dionysis Zindros
Karl Kreder, Shreekara Shastry, Apostolos Tzinas, Sriram Vishwanath, and Dionysis Zindros
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing
Julien Béguinot, Wei Cheng, Sylvain Guilley, and Olivier Rioul
Julien Béguinot, Wei Cheng, Sylvain Guilley, and Olivier Rioul
Distributed Randomness using Weighted VUFs
Sourav Das, Benny Pinkas, Alin Tomescu, and Zhuolun Xiang
Sourav Das, Benny Pinkas, Alin Tomescu, and Zhuolun Xiang
Alba: The Dawn of Scalable Bridges for Blockchains
Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, and Matteo Maffei
Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, and Matteo Maffei
Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform
Pierre Pébereau
Pierre Pébereau
PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs
Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac A. Canales-Martínez, Jorge Chávez-Saab, and Julio López
Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac A. Canales-Martínez, Jorge Chávez-Saab, and Julio López
Helium: Scalable MPC among Lightweight Participants and under Churn
Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, and Carmela Troncoso
Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, and Carmela Troncoso
MQ Does Not Reduce to TUOV
Laura Maddison
Laura Maddison
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism
Elette Boyle, Lisa Kohl, Zhe Li, and Peter Scholl
Elette Boyle, Lisa Kohl, Zhe Li, and Peter Scholl
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions
Steven Galbraith, Yi-Fu Lai, and Hart Montgomery
Steven Galbraith, Yi-Fu Lai, and Hart Montgomery
Constructing Committing and Leakage-Resilient Authenticated Encryption
Patrick Struck and Maximiliane Weishäupl
Patrick Struck and Maximiliane Weishäupl
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution
Haoqian Zhang, Michelle Yeo, Vero Estrada-Galinanes, and Bryan Ford
Haoqian Zhang, Michelle Yeo, Vero Estrada-Galinanes, and Bryan Ford
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
Yanxue Jia, Varun Madathil, and Aniket Kate
Yanxue Jia, Varun Madathil, and Aniket Kate
On the bijectivity of the map $\chi$
Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, and Gohar M. Kyureghyan
Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, and Gohar M. Kyureghyan
RAD-FS: Remote Timing and Power SCA Security in DVFS-Augmented Ultra-Low-Power Embedded Systems
Daniel Dobkin, Nimrod Cever, and Itamar Levi
Daniel Dobkin, Nimrod Cever, and Itamar Levi
Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge
Alexandre Belling, Azam Soleimanian, and Bogdan Ursu
Alexandre Belling, Azam Soleimanian, and Bogdan Ursu
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
Rafael del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, and Markku-Juhani Saarinen
Rafael del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, and Markku-Juhani Saarinen
On Security Proofs of Existing Equivalence Class Signature Schemes
Balthazar Bauer, Georg Fuchsbauer, and Fabian Regen
Balthazar Bauer, Georg Fuchsbauer, and Fabian Regen
FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network
Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, and Yipu Wu
Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, and Yipu Wu
Functional Bootstrapping for Packed Ciphertexts via Homomorphic LUT Evaluation
Dongwon Lee, Seonhong Min, and Yongsoo Song
Dongwon Lee, Seonhong Min, and Yongsoo Song
Exploiting RPMB authentication in a closed source TEE implementation
Aya Fukami, Richard Buurke, and Zeno Geradts
Aya Fukami, Richard Buurke, and Zeno Geradts
Traitor Tracing without Trusted Authority from Registered Functional Encryption
Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, and Ivy K. Y. Woo
Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, and Ivy K. Y. Woo
Fast Public-Key Silent OT and More from Constrained Naor-Reingold
Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, and Mahshid Riahinia
Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, and Mahshid Riahinia
Registered Functional Encryption for Quadratic Functions from MDDH
Qiaohan Chu, Li Lin, Chen Qian, and Jie Chen
Qiaohan Chu, Li Lin, Chen Qian, and Jie Chen
The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections
Panos Kampanakis and Will Childs-Klein
Panos Kampanakis and Will Childs-Klein
Lossy Cryptography from Code-Based Assumptions
Quang Dao and Aayush Jain
Quang Dao and Aayush Jain
QPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation Group
Randy Kuang
Randy Kuang
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions
Helger Lipmaa, Roberto Parisella, and Janno Siim
Helger Lipmaa, Roberto Parisella, and Janno Siim
Relaxed Functional Bootstrapping: A New Perspective on BGV/BFV Bootstrapping
Zeyu Liu and Yunhao Wang
Zeyu Liu and Yunhao Wang
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption
Tairong Huang, Shihe Ma, Anyu Wang, and XiaoYun Wang
Tairong Huang, Shihe Ma, Anyu Wang, and XiaoYun Wang
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis
Trevor Yap Hong Eng, Shivam Bhasin, and Léo Weissbart
Trevor Yap Hong Eng, Shivam Bhasin, and Léo Weissbart
Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM
Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, and Anupam Chattopadhyay
Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, and Anupam Chattopadhyay
Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency
Hanwen Feng, Zhenliang Lu, and Qiang Tang
Hanwen Feng, Zhenliang Lu, and Qiang Tang
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack
Trevor Yap and Dirmanto Jap
Trevor Yap and Dirmanto Jap
A Practical MinRank Attack Against VOX
Hao Guo and Jintai Ding
Hao Guo and Jintai Ding
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
Brent Waters and David J. Wu
Brent Waters and David J. Wu
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT
Shihe Ma, Tairong Huang, Anyu Wang, and Xiaoyun Wang
Shihe Ma, Tairong Huang, Anyu Wang, and Xiaoyun Wang
On Tweakable Correlation Robust Hashing against Key Leakages
Chun Guo, Xiao Wang, Kang Yang, and Yu Yu
Chun Guo, Xiao Wang, Kang Yang, and Yu Yu
Zero-Knowledge Proofs of Training for Deep Neural Networks
Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, and Dimitrios Papadopoulos
Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, and Dimitrios Papadopoulos
zkMatrix: Batched Short Proof for Committed Matrix Multiplication
Mingshu Cong, Tsz Hon Yuen, and Siu Ming Yiu
Mingshu Cong, Tsz Hon Yuen, and Siu Ming Yiu
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast
Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, and Hai Jin
Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, and Hai Jin
Logstar: Efficient Linear* Time Secure Merge
Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, and Peter Rindal
Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, and Peter Rindal
HiSE: Hierarchical (Threshold) Symmetric-key Encryption
Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, and Rohit Sinha
Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, and Rohit Sinha
Delphi: sharing assessments of cryptographic assumptions
Jeroen van de Graaf and Arjen K. Lenstra
Jeroen van de Graaf and Arjen K. Lenstra
Homomorphic sign evaluation with a RNS representation of integers
Philippe Chartier, Michel Koskas, Mohammed Lemou, and Florian Méhats
Philippe Chartier, Michel Koskas, Mohammed Lemou, and Florian Méhats
Fully Homomorphic Encryption on large integers
Philippe Chartier, Michel Koskas, Mohammed Lemou, and Florian Méhats
Philippe Chartier, Michel Koskas, Mohammed Lemou, and Florian Méhats
Broadcast Encryption using Sum-Product decomposition of Boolean functions
Aurélien Dupin and Simon Abelard
Aurélien Dupin and Simon Abelard
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
Robin Geelen
Robin Geelen
Equivalence of Generalised Feistel Networks
Patrick Derbez and Marie Euler
Patrick Derbez and Marie Euler
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing
Antonio Flórez-Gutiérrez and Yosuke Todo
Antonio Flórez-Gutiérrez and Yosuke Todo
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors
Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, Francois Charton, and Kristin Lauter
Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, Francois Charton, and Kristin Lauter
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks
Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, and Zhiyuan Zhang
Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, and Zhiyuan Zhang
Preliminary Cryptanalysis of the Biscuit Signature Scheme
Charles Bouillaguet and Julia Sauvage
Charles Bouillaguet and Julia Sauvage
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks
Thorben Moos, Sayandeep Saha, and François-Xavier Standaert
Thorben Moos, Sayandeep Saha, and François-Xavier Standaert
Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications
Jonathan Komada Eriksen and Antonin Leroux
Jonathan Komada Eriksen and Antonin Leroux
Practical Batch Proofs of Exponentiation
Charlotte Hoffmann, Pavel Hubáček, and Svetlana Ivanova
Charlotte Hoffmann, Pavel Hubáček, and Svetlana Ivanova
Efficient (3,3)-isogenies on fast Kummer surfaces
Maria Corte-Real Santos, Craig Costello, and Benjamin Smith
Maria Corte-Real Santos, Craig Costello, and Benjamin Smith
Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security
Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, and Xiaohu Yang
Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, and Xiaohu Yang
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency
Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, and Hai Jin
Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, and Hai Jin
Secure Statistical Analysis on Multiple Datasets: Join and Group-By
Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, and Junichi Tomida
Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, and Junichi Tomida
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
Binbin Tu, Min Zhang, and Yu Chen
Binbin Tu, Min Zhang, and Yu Chen
Efficient Arithmetic in Garbled Circuits
David Heath
David Heath
Correction Fault Attacks on Randomized CRYSTALS-Dilithium
Elisabeth Krahmer, Peter Pessl, Georg Land, and Tim Güneysu
Elisabeth Krahmer, Peter Pessl, Georg Land, and Tim Güneysu
Sleepy Consensus in the Known Participation Model
Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, and Xiuzhen Cheng
Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, and Xiuzhen Cheng
Secure Transformer Inference Made Non-interactive
Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, and Xiaohu Yang
Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, and Xiaohu Yang
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks
Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, and Liehuang Zhu
Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, and Liehuang Zhu
Byzantine Fault Tolerance with Non-Determinism, Revisited
Yue Huang, Huizhong Li, Yi Sun, and Sisi Duan
Yue Huang, Huizhong Li, Yi Sun, and Sisi Duan
Optimizing Implementations of Boolean Functions
Meltem Sonmez Turan
Meltem Sonmez Turan
SimpleFT: A Simple Byzantine Fault Tolerant Consensus
Rui Hao, Chenglong Yi, Weiqi Dai, and Zhaonan Zhang
Rui Hao, Chenglong Yi, Weiqi Dai, and Zhaonan Zhang
Practical Post-Quantum Signatures for Privacy
Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, and Olivier Sanders
Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, and Olivier Sanders
HADES: Automated Hardware Design Exploration for Cryptographic Primitives
Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, and Tim Güneysu
Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, and Tim Güneysu
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers
Gideon Samid
Gideon Samid
Non-Binding (Designated Verifier) Signature
Ehsan Ebrahimi
Ehsan Ebrahimi
Attacks Against the INDCPA-D Security of Exact FHE Schemes
Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, and Elias Suvanto
Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, and Elias Suvanto
Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK
Emanuele Bellini, David Gerault, Matteo Protopapa, and Matteo Rossi
Emanuele Bellini, David Gerault, Matteo Protopapa, and Matteo Rossi
New self-orthogonal codes from weakly regular plateaued functions and their application in LCD codes
Melike Çakmak, Ahmet Sınak, and Oğuz Yayla
Melike Çakmak, Ahmet Sınak, and Oğuz Yayla
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks
Akira Ito, Rei Ueno, and Naofumi Homma
Akira Ito, Rei Ueno, and Naofumi Homma
Memory Checking Requires Logarithmic Overhead
Elette Boyle, Ilan Komargodski, and Neekon Vafa
Elette Boyle, Ilan Komargodski, and Neekon Vafa
SPRITE: Secure and Private Routing in Payment Channel Networks
Gaurav Panwar, Roopa Vishwanathan, George Torres, and Satyajayant Misra
Gaurav Panwar, Roopa Vishwanathan, George Torres, and Satyajayant Misra
An acceleration of the AKS prime identification algorithm
Stephen Meredith Williams
Stephen Meredith Williams
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, and Serge Vaudenay
Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, and Serge Vaudenay
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE
Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, and Rajeev Raghunath
Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, and Rajeev Raghunath
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption
Charles Gouert and Nektarios Georgios Tsoutsos
Charles Gouert and Nektarios Georgios Tsoutsos
Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes
Alex Pellegrini and Giovanni Tognolini
Alex Pellegrini and Giovanni Tognolini
On the practical CPAD security of “exact” and threshold FHE schemes and libraries
Marina Checri, Renaud Sirdey, Aymen Boudguiga, and Jean-Paul Bultel
Marina Checri, Renaud Sirdey, Aymen Boudguiga, and Jean-Paul Bultel
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
Shihe Ma, Tairong Huang, Anyu Wang, and Xiaoyun Wang
Shihe Ma, Tairong Huang, Anyu Wang, and Xiaoyun Wang
X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for $d+1$ shares in Hardware
Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, and Ingrid Verbauwhede
Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, and Ingrid Verbauwhede
Improved Linear Key Recovery Attacks on PRESENT
Wenhui Wu, Muzhou Li, and Meiqin Wang
Wenhui Wu, Muzhou Li, and Meiqin Wang
pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers
Matthias J. Kannwischer, Markus Krausz, Richard Petri, and Shang-Yi Yang
Matthias J. Kannwischer, Markus Krausz, Richard Petri, and Shang-Yi Yang
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation
Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, and Huaxin Wang
Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, and Huaxin Wang
Cryptanalysis of the SNOVA signature scheme
Peigen Li and Jintai Ding
Peigen Li and Jintai Ding
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS
Jaehyung Kim, Jinyeong Seo, and Yongsoo Song
Jaehyung Kim, Jinyeong Seo, and Yongsoo Song
Some Improvements for the PIOP for ZeroCheck
Angus Gruen
Angus Gruen
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency
Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, and Antonio Marcedone
Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, and Antonio Marcedone
A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy
Ibrahim Yakut and Huseyin Polat
Ibrahim Yakut and Huseyin Polat
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives
Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gerault, Paul Huynh, Simone Pelizzola, Sergio Polese, and Andrea Visconti
Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gerault, Paul Huynh, Simone Pelizzola, Sergio Polese, and Andrea Visconti
AnonPSI: An Anonymity Assessment Framework for PSI
Bo Jiang, Jian Du, and Qiang Yan
Bo Jiang, Jian Du, and Qiang Yan
ChaCha related 64 bit oriented ARX cipher
Daniel Nager
Daniel Nager
Laconic Branching Programs from the Diffie-Hellman Assumption
Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, and Alice Murphy
Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, and Alice Murphy
Unconditional Security using (Random) Anonymous Bulletin Board
Albert Yu, Hai H. Nguyen, Aniket Kate, and Hemanta K. Maji
Albert Yu, Hai H. Nguyen, Aniket Kate, and Hemanta K. Maji
IrisLock: Iris Biometric Key Derivation with 42 bits of security
Sohaib Ahmad, Sixia Chen, Luke Demarest, Benjamin Fuller, Caleb Manicke, Alexander Russell, and Amey Shukla
Sohaib Ahmad, Sixia Chen, Luke Demarest, Benjamin Fuller, Caleb Manicke, Alexander Russell, and Amey Shukla
Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains
Alberto Garoffolo, Dmytro Kaidalov, and Roman Oliynykov
Alberto Garoffolo, Dmytro Kaidalov, and Roman Oliynykov
Theoretical differential fault attacks on FLIP and FiLIP
Pierrick Méaux and Dibyendu Roy
Pierrick Méaux and Dibyendu Roy
Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures
Dung Bui, Kelong Cong, and Cyprien Delpech de Saint Guilhem
Dung Bui, Kelong Cong, and Cyprien Delpech de Saint Guilhem
Revisiting the security analysis of SNOVA
Yasuhiko Ikematsu and Rika Akiyama
Yasuhiko Ikematsu and Rika Akiyama
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches
Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, and Jingqiang Lin
Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, and Jingqiang Lin
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions
Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, and Jörn Müller-Quade
Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, and Jörn Müller-Quade
Short Code-based One-out-of-Many Proofs and Applications
Xindong Liu and Li-Ping Wang
Xindong Liu and Li-Ping Wang
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries
Sofía Celi and Alex Davidson
Sofía Celi and Alex Davidson
On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography
Vasyl Ustimenko
Vasyl Ustimenko
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection
Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, and Suzanne Weller
Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, and Suzanne Weller
Two-party GOST in two parts: fruitless search and fruitful synthesis
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, and Stanislav Smyshlyaev
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, and Stanislav Smyshlyaev
Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices
Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, and Lucas Pandolfo Perin
Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, and Lucas Pandolfo Perin
Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption
Jung Hee Cheon, Hyeongmin Choe, and Jai Hyun Park
Jung Hee Cheon, Hyeongmin Choe, and Jai Hyun Park
On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases
Momonari Kudo and Kazuhiro Yokoyama
Momonari Kudo and Kazuhiro Yokoyama
Simultaneously simple universal and indifferentiable hashing to elliptic curves
Dmitrii Koshelev
Dmitrii Koshelev
Efficient Instances of Docked Double Decker With AES, and Application to Authenticated Encryption
Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, and Alexander Tereschenko
Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, and Alexander Tereschenko
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers
Tianren Liu, Angelos Pelecanos, Stefano Tessaro, and Vinod Vaikuntanathan
Tianren Liu, Angelos Pelecanos, Stefano Tessaro, and Vinod Vaikuntanathan
Quantum State Obfuscation from Classical Oracles
James Bartusek, Zvika Brakerski, and Vinod Vaikuntanathan
James Bartusek, Zvika Brakerski, and Vinod Vaikuntanathan
SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness
Yulin Zhao, Hualin Zhou, and Zhiguo Wan
Yulin Zhao, Hualin Zhou, and Zhiguo Wan
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions
Samuel Jaques
Samuel Jaques
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform
Yanze Yang, Yiran Jia, and Guangwu Xu
Yanze Yang, Yiran Jia, and Guangwu Xu
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process
Pedram Hosseyni, Ralf Kuesters, and Tim Würtele
Pedram Hosseyni, Ralf Kuesters, and Tim Würtele
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, and Aleksei Udovenko
Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, and Aleksei Udovenko
A provably masked implementation of BIKE Key Encapsulation Mechanism
Loïc Demange and Mélissa Rossi
Loïc Demange and Mélissa Rossi
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting
Moumita Dutta, Chaya Ganesh, and Neha Jawalkar
Moumita Dutta, Chaya Ganesh, and Neha Jawalkar
PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers
Beyza Bozdemir, Betül Aşkın Özdemir, and Melek Önen
Beyza Bozdemir, Betül Aşkın Özdemir, and Melek Önen
A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications
Lipeng He
Lipeng He
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits
Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, and Fatemeh Ganji
Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, and Fatemeh Ganji
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis
Seyedmohammad Nouraniboosjin and Fatemeh Ganji
Seyedmohammad Nouraniboosjin and Fatemeh Ganji
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs
Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, and Jian Weng
Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, and Jian Weng
SDitH in Hardware
Sanjay Deshpande, James Howe, Jakub Szefer, and Dongze Yue
Sanjay Deshpande, James Howe, Jakub Szefer, and Dongze Yue
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation
Fangqi Dong, Zihan Hao, Ethan Mook, and Daniel Wichs
Fangqi Dong, Zihan Hao, Ethan Mook, and Daniel Wichs
A Refined Hardness Estimation of LWE in Two-step Mode
Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, and Baocang Wang
Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, and Baocang Wang
Exploiting the Central Reduction in Lattice-Based Cryptography
Tolun Tosun, Amir Moradi, and Erkay Savas
Tolun Tosun, Amir Moradi, and Erkay Savas
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation
Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, and Jan Veldsink
Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, and Jan Veldsink
Extreme Algebraic Attacks
Pierrick Méaux and Qingju Wang
Pierrick Méaux and Qingju Wang
A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms
Julien Maillard, Thomas Hiscock, Maxime Lecomte, and Christophe Clavier
Julien Maillard, Thomas Hiscock, Maxime Lecomte, and Christophe Clavier
Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol
WenBin Hsieh
WenBin Hsieh
Partial Key Exposure Attack on Common Prime RSA
Mengce Zheng
Mengce Zheng
The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform
Julius Hermelink, Kai-Chun Ning, Richard Petri, and Emanuele Strieder
Julius Hermelink, Kai-Chun Ning, Richard Petri, and Emanuele Strieder
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors
Oren Ganon and Itamar Levi
Oren Ganon and Itamar Levi
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions
Sacha Servan-Schreiber
Sacha Servan-Schreiber
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs
Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, and Rui Hou
Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, and Rui Hou
Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion
Youcef Mokrani and David Jao
Youcef Mokrani and David Jao
Multi-Hop Fine-Grained Proxy Re-Encryption
Yunxiao Zhou, Shengli Liu, and Shuai Han
Yunxiao Zhou, Shengli Liu, and Shuai Han
FEASE: Fast and Expressive Asymmetric Searchable Encryption
Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, and Suhui Liu
Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, and Suhui Liu
Anonymous Homomorphic IBE with Application to Anonymous Aggregation
Michael Clear, Ciaran McGoldrick, and Hitesh Tewari
Michael Clear, Ciaran McGoldrick, and Hitesh Tewari
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash
SAHIBA SURYAWANSHI, Shibam Ghosh, Dhiman Saha, and Prathamesh Ram
SAHIBA SURYAWANSHI, Shibam Ghosh, Dhiman Saha, and Prathamesh Ram
Limits on Authenticated Encryption Use in TLS
Atul Luykx and Kenneth G. Paterson
Atul Luykx and Kenneth G. Paterson
Do You Need a Zero Knowledge Proof?
Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, and Arthur Gervais
Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, and Arthur Gervais
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis
Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, and Liehuang Zhu
Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, and Liehuang Zhu
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries
Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, and Duong Hieu Phan
Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, and Duong Hieu Phan
On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing
Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, and Stefano Trevisani
Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, and Stefano Trevisani
Quantum-Secure Hybrid Communication for Aviation Infrastructure
Benjamin Dowling and Bhagya Wimalasiri
Benjamin Dowling and Bhagya Wimalasiri
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion
Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, and Leibo Liu
Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, and Leibo Liu
Adaptive Distributional Security for Garbling Schemes with $\mathcal{O}(|x|)$ Online Complexity
Estuardo Alpírez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, and Kirthivaasan Puniamurthy
Estuardo Alpírez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, and Kirthivaasan Puniamurthy
Fuzzy Identity Based Encryption with a flexible threshold value
Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, and Seyed Mohammad Hossein Moattar
Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, and Seyed Mohammad Hossein Moattar
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
Jan Bobolz, Jesus Diaz, and Markulf Kohlweiss
Jan Bobolz, Jesus Diaz, and Markulf Kohlweiss
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault
Aikata Aikata, Ahaan Dabholkar, Dhiman Saha, and Sujoy Sinha Roy
Aikata Aikata, Ahaan Dabholkar, Dhiman Saha, and Sujoy Sinha Roy
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, and Kaiyi Zhang
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, and Kaiyi Zhang
X-Wing: The Hybrid KEM You’ve Been Looking For
Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, and Bas Westerbaan
Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, and Bas Westerbaan
On Computing the Multidimensional Scalar Multiplication on Elliptic Curves
Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, and Leila Ben Abdelghani
Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, and Leila Ben Abdelghani
Computing $2$-isogenies between Kummer lines
Damien Robert and Nicolas Sarkis
Damien Robert and Nicolas Sarkis
Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack
Jian Wang, Weiqiong Cao, Hua Chen, and Haoyuan Li
Jian Wang, Weiqiong Cao, Hua Chen, and Haoyuan Li
A New Approach to Efficient and Secure Fixed-point Computation
Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, and Anne Dorte Spangsberg
Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, and Anne Dorte Spangsberg
How (not) to hash into class groups of imaginary quadratic fields?
István András Seres, Péter Burcsi, and Péter Kutas
István András Seres, Péter Burcsi, and Péter Kutas
Security analysis and improvements on a semi-quantum electronic voting protocol
Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, and Li Fagen
Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, and Li Fagen
Verifiable FHE via Lattice-based SNARKs
Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, and Jannik Spiessens
Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, and Jannik Spiessens
Feldman's Verifiable Secret Sharing for a Dishonest Majority
Yi-Hsiu Chen and Yehuda Lindell
Yi-Hsiu Chen and Yehuda Lindell
Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs
Thomas Debris-Alazard, Pouria Fallahpour, and Damien Stehlé
Thomas Debris-Alazard, Pouria Fallahpour, and Damien Stehlé
YouChoose: A Lightweight Anonymous Proof of Account Ownership
Aarav Varshney, Prashant Agrawal, and Mahabir Prasad Jhanwar
Aarav Varshney, Prashant Agrawal, and Mahabir Prasad Jhanwar
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis
Hoeteck Wee and David J. Wu
Hoeteck Wee and David J. Wu
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice
Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, and Zoe L. Jiang
Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, and Zoe L. Jiang
Towards Compact Identity-based Encryption on Ideal Lattices
Huiwen Jia, Yupu Hu, Chunming Tang, and Lin Wang
Huiwen Jia, Yupu Hu, Chunming Tang, and Lin Wang
Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures
Siavash Riahi and Orfeas Stefanos Thyfronitis Litos
Siavash Riahi and Orfeas Stefanos Thyfronitis Litos
FlexHi: A Flexible Hierarchical Threshold Signature Scheme
Muhammed Ali Bingol, Sermin Kocaman, Ali Dogan, and Sibel Kurt Toplu
Muhammed Ali Bingol, Sermin Kocaman, Ali Dogan, and Sibel Kurt Toplu
CCA Security with Short AEAD Tags
Mustafa Khairallah
Mustafa Khairallah
Fully Dynamic Attribute-Based Signatures for Circuits from Codes
San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, and Yanhong Xu
San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, and Yanhong Xu
Designing homomorphic encryptions with rational functions
Gerald Gavin and Sandrine Tainturier
Gerald Gavin and Sandrine Tainturier
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy
Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, and Christiane Weis
Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, and Christiane Weis
Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes
Randy Kuang, Maria Perepechaenko, Dafu Lou, and Brinda Tank
Randy Kuang, Maria Perepechaenko, Dafu Lou, and Brinda Tank
Smaller Sphincs+
Scott Fluhrer and Quynh Dang
Scott Fluhrer and Quynh Dang
PT-symmetric mapping of three states and its implementation on a cloud quantum processor
Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, and Sang-Yoon Chang
Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, and Sang-Yoon Chang
Reducing the computational complexity of fuzzy identity-based encryption from lattice
Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, and Seyed Mohammad Hossein Moattar
Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, and Seyed Mohammad Hossein Moattar
Unconditionally secure MPC for Boolean circuits with constant online communication
Zhenkai Hu, Kang Yang, and Yu Yu
Zhenkai Hu, Kang Yang, and Yu Yu
A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup
Ahmet Ramazan Ağırtaş and Oğuz YAYLA
Ahmet Ramazan Ağırtaş and Oğuz YAYLA
A note on ``intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Two-Round ID-PAKE with strong PFS and single pairing operation
Behnam Zahednejad and Gao Chong-zhi
Behnam Zahednejad and Gao Chong-zhi
MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication
Brett Hemenway Falk, Daniel Noble, and Rafail Ostrovsky
Brett Hemenway Falk, Daniel Noble, and Rafail Ostrovsky
On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs
Sulaiman Alhussaini, Craig Collett, and Serge˘ı Sergeev
Sulaiman Alhussaini, Craig Collett, and Serge˘ı Sergeev
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
Aviad Ben Arie and Tamir Tassa
Aviad Ben Arie and Tamir Tassa
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography
Alessandro Budroni, Isaac A. Canales-Martínez, and Lucas Pandolfo Perin
Alessandro Budroni, Isaac A. Canales-Martínez, and Lucas Pandolfo Perin
Password Protected Universal Thresholdizer
Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, and Willy Susilo
Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, and Willy Susilo
Towards general-purpose program obfuscation via local mixing
Ran Canetti, Claudio Chamon, Eduardo Mucciolo, and Andrei Ruckenstein
Ran Canetti, Claudio Chamon, Eduardo Mucciolo, and Andrei Ruckenstein
The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols
Tamir Tassa and Avishay Yanai
Tamir Tassa and Avishay Yanai
Practical Two-party Computational Differential Privacy with Active Security
Fredrik Meisingseth, Christian Rechberger, and Fabian Schmid
Fredrik Meisingseth, Christian Rechberger, and Fabian Schmid
Simple Soundness Proofs
Alex Kampa
Alex Kampa
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
Décio Luiz Gazzoni Filho, Guilherme Brandão, and Julio López
Décio Luiz Gazzoni Filho, Guilherme Brandão, and Julio López
On short digital signatures with Eulerian transformations
Vasyl Ustimenko
Vasyl Ustimenko
Combinatorially Homomorphic Encryption
Yuval Ishai, Eyal Kushnir, and Ron D. Rothblum
Yuval Ishai, Eyal Kushnir, and Ron D. Rothblum
Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness
Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, and Amit Sahai
Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, and Amit Sahai
The Planck Constant and Quantum Fourier Transformation
Zhengjun Cao and Zhenfu Cao
Zhengjun Cao and Zhenfu Cao
Efficient Hardware Implementation for Maiorana-McFarland type Functions
Anupam Chattopadhyay, Subhamoy Maitra, Bimal Mandal, Manmatha Roy, and Deng Tang
Anupam Chattopadhyay, Subhamoy Maitra, Bimal Mandal, Manmatha Roy, and Deng Tang
Secure and Practical Functional Dependency Discovery in Outsourced Databases
Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, and Kui Ren
Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, and Kui Ren
Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
Kelsey A. Jackson, Carl A. Miller, and Daochen Wang
Kelsey A. Jackson, Carl A. Miller, and Daochen Wang
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption
Shafik Nassar, Brent Waters, and David J. Wu
Shafik Nassar, Brent Waters, and David J. Wu
How to Make Rational Arguments Practical and Extractable
Matteo Campanelli, Chaya Ganesh, and Rosario Gennaro
Matteo Campanelli, Chaya Ganesh, and Rosario Gennaro
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience
Shuai Han, Shengli Liu, and Dawu Gu
Shuai Han, Shengli Liu, and Dawu Gu
Maypoles: Lightning Striking Twice
Clara Shikhelman
Clara Shikhelman
A Small Serving of Mash: (Quantum) Algorithms for SPDH-Sign with Small Parameters
Andrew Mendelsohn, Edmund Dable-Heath, and Cong Ling
Andrew Mendelsohn, Edmund Dable-Heath, and Cong Ling
A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems
Vincent Hwang
Vincent Hwang
On The Practical Advantage of Committing Challenges in Zero-Knowledge Protocols
David Naccache and Ofer Yifrach-Stav
David Naccache and Ofer Yifrach-Stav
Post Quantum Sphinx
David Anthony Stainton
David Anthony Stainton
On the notion of carries of numbers $2^n-1$ and Scholz conjecture
Theophilus Agama
Theophilus Agama
Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14
Yu Dai, Debiao He, Cong Peng, Zhijian Yang, and Chang-an Zhao
Yu Dai, Debiao He, Cong Peng, Zhijian Yang, and Chang-an Zhao
Chosen Ciphertext Security via BARGs
Takahiro Matsuda
Takahiro Matsuda
A Signature Scheme from Full-Distance Syndrome Decoding
Abdelhaliem Babiker
Abdelhaliem Babiker
Barrett Multiplication for Dilithium on Embedded Devices
Vincent Hwang, YoungBeom Kim, and Seog Chung Seo
Vincent Hwang, YoungBeom Kim, and Seog Chung Seo
Fiat-Shamir Goes Tropical
Rémi Géraud-Stewart, David Naccache, and Ofer Yifrach-Stav
Rémi Géraud-Stewart, David Naccache, and Ofer Yifrach-Stav
Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem
Muhammad Imran and Gábor Ivanyos
Muhammad Imran and Gábor Ivanyos
Overview and Discussion of Attacks on CRYSTALS-Kyber
Stone Li
Stone Li
Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework
Paula Arnold, Sebastian Berndt, Jörn Müller-Quade, and Astrid Ottenhues
Paula Arnold, Sebastian Berndt, Jörn Müller-Quade, and Astrid Ottenhues
GigaDORAM: Breaking the Billion Address Barrier
Brett Falk, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
Brett Falk, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical
Diego F. Aranha, Anamaria Costache, Antonio Guimarães, and Eduardo Soria-Vazquez
Diego F. Aranha, Anamaria Costache, Antonio Guimarães, and Eduardo Soria-Vazquez
PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments
Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, and Chaddy Huussin
Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, and Chaddy Huussin
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures
Marloes Venema and Leon Botros
Marloes Venema and Leon Botros
SnarkFold: Efficient Proof Aggregation from Incrementally Verifiable Computation and Applications
Xun Liu, Shang Gao, Tianyu Zheng, Yu Guo, and Bin Xiao
Xun Liu, Shang Gao, Tianyu Zheng, Yu Guo, and Bin Xiao
The Fiat--Shamir Transformation of $(\Gamma_1,\dots,\Gamma_\mu)$-Special-Sound Interactive Proofs
Thomas Attema, Serge Fehr, Michael Klooß, and Nicolas Resch
Thomas Attema, Serge Fehr, Michael Klooß, and Nicolas Resch
Revisiting The Multiple of Property for SKINNY The Exact Computation of the number of right pairs
Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, and Seokhie Hong
Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, and Seokhie Hong
Distinguisher and Related-Key Attack on HALFLOOP-96
Jinpeng Liu and Ling Sun
Jinpeng Liu and Ling Sun
Traceable mixnets
Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, and Subhashis Banerjee
Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, and Subhashis Banerjee
Upgrading Fuzzy Extractors
Chloe Cachet, Ariel Hamlin, Maryam Rezapour, and Benjamin Fuller
Chloe Cachet, Ariel Hamlin, Maryam Rezapour, and Benjamin Fuller
Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm
Sreyosi Bhattacharyya and Palash Sarkar
Sreyosi Bhattacharyya and Palash Sarkar
Applications of Neural Network-Based AI in Cryptography
Abderrahmane Nitaj and Tajjeeddine Rachidi
Abderrahmane Nitaj and Tajjeeddine Rachidi
Batch Arguments to NIZKs from One-Way Functions
Eli Bradley, Brent Waters, and David J. Wu
Eli Bradley, Brent Waters, and David J. Wu
Revocable Quantum Digital Signatures
Tomoyuki Morimae, Alexander Poremba, and Takashi Yamakawa
Tomoyuki Morimae, Alexander Poremba, and Takashi Yamakawa
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking
Hanjun Li, Huijia Lin, Antigoni Polychroniadou, and Stefano Tessaro
Hanjun Li, Huijia Lin, Antigoni Polychroniadou, and Stefano Tessaro
The Splitting Field of $Y^n-2$, Two-Variable NTT and Lattice-Based Cryptography
Wenzhe Yang
Wenzhe Yang
More efficient comparison protocols for MPC
Wicher Malten, Mehmet Ugurbil, and Miguel de Vega
Wicher Malten, Mehmet Ugurbil, and Miguel de Vega
Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols
Cas Cremers, Alexander Dax, and Niklas Medinger
Cas Cremers, Alexander Dax, and Niklas Medinger
Multipars: Reduced-Communication MPC over Z2k
Sebastian Hasler, Pascal Reisert, Marc Rivinius, and Ralf Küsters
Sebastian Hasler, Pascal Reisert, Marc Rivinius, and Ralf Küsters
Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
Ruize Wang, Kalle Ngo, Joel Gärtner, and Elena Dubrova
Ruize Wang, Kalle Ngo, Joel Gärtner, and Elena Dubrova
Toward A Practical Multi-party Private Set Union
Jiahui Gao, Son Nguyen, and Ni Trieu
Jiahui Gao, Son Nguyen, and Ni Trieu
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages
Damiano Abram, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, and Varun Narayanan
Damiano Abram, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, and Varun Narayanan
Unconditionally Secure Quantum Bit Commitment and Quantum Oblivious Transfer
Ping Wang, Yikang Lei, and Yiting Su
Ping Wang, Yikang Lei, and Yiting Su
Holepunch: Fast, Secure File Deletion with Crash Consistency
Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, and Ryan Williams
Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, and Ryan Williams
NOTRY: deniable messaging with retroactive avowal
Faxing Wang, Shaanan Cohney, Riad Wahby, and Joseph Bonneau
Faxing Wang, Shaanan Cohney, Riad Wahby, and Joseph Bonneau
VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme
Anindya ganguly, Angshuman Karmakar, and Nitin Saxena
Anindya ganguly, Angshuman Karmakar, and Nitin Saxena
Analyzing the complexity of reference post-quantum software: the case of lattice-based KEMs
Daniel J. Bernstein
Daniel J. Bernstein
Differential Fault Attack on Ascon Cipher
Amit Jana
Amit Jana
One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis
Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, and Guilherme Perin
Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, and Guilherme Perin
Automated Issuance of Post-Quantum Certificates: a New Challenge
Alexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, and Víctor Mateu
Alexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, and Víctor Mateu
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities
Luke Harrison, Samiran Bag, and Feng Hao
Luke Harrison, Samiran Bag, and Feng Hao
When and How to Aggregate Message Authentication Codes on Lossy Channels?
Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC
Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, and Ajith Suresh
Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, and Ajith Suresh
Regularized PolyKervNets: Optimizing Expressiveness and Efficiency for Private Inference in Deep Neural Networks
Toluwani Aremu
Toluwani Aremu
Sing a song of Simplex
Victor Shoup
Victor Shoup
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies
Poulami Das, Andreas Erwig, Michael Meyer, and Patrick Struck
Poulami Das, Andreas Erwig, Michael Meyer, and Patrick Struck
Efficient Low-Latency Masking of Ascon without Fresh Randomness
Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, and Rishub Nagpal
Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, and Rishub Nagpal
Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software
Prasanna Ravi, Arpan Jati, and Shivam Bhasin
Prasanna Ravi, Arpan Jati, and Shivam Bhasin
Dishonest Majority Multiparty Computation over Matrix Rings
Hongqing Liu, Chaoping Xing, Chen Yuan, and Taoxu Zou
Hongqing Liu, Chaoping Xing, Chen Yuan, and Taoxu Zou
Non-Interactive Classical Verification of Quantum Depth: A Fine-Grained Characterization
Nai-Hui Chia and Shih-Han Hung
Nai-Hui Chia and Shih-Han Hung
Failed crypto: Matrices over non-standard arithmetic
Daniel R. L. Brown
Daniel R. L. Brown
Ratel: MPC-extensions for Smart Contracts
Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, and Andrew Miller
Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, and Andrew Miller
PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin
Amirreza Sarencheh, Aggelos Kiayias, and Markulf Kohlweiss
Amirreza Sarencheh, Aggelos Kiayias, and Markulf Kohlweiss
Integral Cryptanalysis Using Algebraic Transition Matrices
Tim Beyne and Michiel Verbauwhede
Tim Beyne and Michiel Verbauwhede
Exploring SIDH-based Signature Parameters
Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, and Gustave Tchoffo Saah
Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, and Gustave Tchoffo Saah
Oops, I did it again revisited: another look at reusing one-time signatures
Scott Fluhrer
Scott Fluhrer
Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Tropical Circulant Matrices
Sulaiman Alhussaini, Craig Collett, and Serge˘ı Sergeev
Sulaiman Alhussaini, Craig Collett, and Serge˘ı Sergeev
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users
Céline Chevalier, Guirec Lebrun, Ange Martinelli, and Abdul Rahman Taleb
Céline Chevalier, Guirec Lebrun, Ange Martinelli, and Abdul Rahman Taleb
A Transaction-Level Model for Blockchain Privacy
François-Xavier Wicht, Zhipeng Wang, Duc V. Le, and Christian Cachin
François-Xavier Wicht, Zhipeng Wang, Duc V. Le, and Christian Cachin
Middle-Products of Skew Polynomials and Learning with Errors
Cong Ling and Andrew Mendelsohn
Cong Ling and Andrew Mendelsohn
Conan: Distributed Proofs of Compliance for Anonymous Data Collection
Mingxun Zhou, Elaine Shi, and Giulia Fanti
Mingxun Zhou, Elaine Shi, and Giulia Fanti
Allowing Blockchain Loans with Low Collateral
Tom Azoulay, Uri Carl, and Ori Rottenstreich
Tom Azoulay, Uri Carl, and Ori Rottenstreich
An Empirical Study of Cross-chain Arbitrage in Decentralized Exchanges
Ori Mazor and Ori Rottenstreich
Ori Mazor and Ori Rottenstreich
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures
Sajin Sasy, Adithya Vadapalli, and Ian Goldberg
Sajin Sasy, Adithya Vadapalli, and Ian Goldberg
Selective Delegation of Attributes in Mercurial Signature Credentials
Colin Putman and Keith M. Martin
Colin Putman and Keith M. Martin
The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm
Clément Hoffmann, Pierrick Méaux, and François-Xavier Standaert
Clément Hoffmann, Pierrick Méaux, and François-Xavier Standaert
Hardness of Range Avoidance and Remote Point for Restricted Circuits via Cryptography
Yilei Chen and Jiatu Li
Yilei Chen and Jiatu Li
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers
Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, and Thomas Schneider
Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, and Thomas Schneider
Asymptotics of hybrid primal lattice attacks
Daniel J. Bernstein
Daniel J. Bernstein
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, and Yongbin Zhou
Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, and Yongbin Zhou
Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries
Tianpei Lu, Bingsheng Zhang, Lichun Li, and Kui Ren
Tianpei Lu, Bingsheng Zhang, Lichun Li, and Kui Ren
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure against Side Channel Attack and its Complexity Verification.
Jong-Yeon Park, Dongsoo Lee, Seonggyeom Kim, Wonil lee, Bo Gyeong Kang, and Kouichi Sakurai
Jong-Yeon Park, Dongsoo Lee, Seonggyeom Kim, Wonil lee, Bo Gyeong Kang, and Kouichi Sakurai
Reverie: an end-to-end accumulation scheme from Cyclefold
Lev Soukhanov
Lev Soukhanov
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity
Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, and Dimitrios Papachristoudis
Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, and Dimitrios Papachristoudis
Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, and Jess Woods
Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, and Jess Woods
Falcon Takes Off - A Hardware Implementation of the Falcon Signature Scheme
Michael Schmid, Dorian Amiet, Jan Wendler, Paul Zbinden, and Tao Wei
Michael Schmid, Dorian Amiet, Jan Wendler, Paul Zbinden, and Tao Wei
Multi-Signatures for Ad-hoc and Privacy-Preserving Group Signing
Anja Lehmann and Cavit Özbay
Anja Lehmann and Cavit Özbay
The statistical nature of leakage in SSE schemes and its role in passive attacks
Marc Damie, Jean-Benoist Leger, Florian Hahn, and Andreas Peter
Marc Damie, Jean-Benoist Leger, Florian Hahn, and Andreas Peter
Lattice Based Signatures with Additional Functionalities
Swati Rawal, Sahadeo Padhye, and Debiao He
Swati Rawal, Sahadeo Padhye, and Debiao He
Blockchain Governance via Sharp Anonymous Multisignatures
Wonseok Choi, Xiangyu Liu, and Vassilis Zikas
Wonseok Choi, Xiangyu Liu, and Vassilis Zikas
Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work
Chris Peikert and Yi Tang
Chris Peikert and Yi Tang
A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem
Daniel Zentai, Mihail Plesa, and Robin Frot
Daniel Zentai, Mihail Plesa, and Robin Frot
Predicting performance for post-quantum encrypted-file systems
Daniel J. Bernstein
Daniel J. Bernstein
Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps
George Teseleanu
George Teseleanu
Thwarting Last-Minute Voter Coercion
Rosario Giustolisi, Maryam Sheikhi Garjan, and Carsten Schuermann
Rosario Giustolisi, Maryam Sheikhi Garjan, and Carsten Schuermann
The Blockwise Rank Syndrome Learning problem and its applications to cryptography
Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit, and Adrien Vinçotte
Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit, and Adrien Vinçotte
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
George Teseleanu
George Teseleanu
SoK: Post-Quantum TLS Handshake
Nouri Alnahawi, Johannes Müller, Jan Oupický, and Alexander Wiesmaier
Nouri Alnahawi, Johannes Müller, Jan Oupický, and Alexander Wiesmaier
Integral Multiset: A Novel Framework for Integral Attacks over Finite Fields
Weizhe Wang and Deng Tang
Weizhe Wang and Deng Tang
B2T: The Third Logical Value of a Bit
Dipesh, Vishesh Mishra, and Urbi chatterjee
Dipesh, Vishesh Mishra, and Urbi chatterjee
An Improved Method for Evaluating Secret Variables and Its Application to WAGE
Weizhe Wang, Haoyang Wang, and Deng Tang
Weizhe Wang, Haoyang Wang, and Deng Tang
Accountable Bulletin Boards: Definition and Provably Secure Implementation
Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, and Marcel Flinspach
Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, and Marcel Flinspach
COMMON: Order Book with Privacy
Albert Garreta, Adam Gągol, Aikaterini-Panagiota Stouka, Damian Straszak, and Michal Zajac
Albert Garreta, Adam Gągol, Aikaterini-Panagiota Stouka, Damian Straszak, and Michal Zajac
Different Flavours of HILL Pseudoentropy and Yao Incompressibility Entropy
Pihla Karanko
Pihla Karanko
When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, and Shuo Sun
Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, and Shuo Sun
Projective Space Stern Decoding and Application to SDitH
Kevin Carrier, Valérian Hatey, and Jean-Pierre Tillich
Kevin Carrier, Valérian Hatey, and Jean-Pierre Tillich
Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses
Julien Maillard, Thomas Hiscock, Maxime Lecomte, and Christophe Clavier
Julien Maillard, Thomas Hiscock, Maxime Lecomte, and Christophe Clavier
Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification
Dongyu Wu, Bei Liang, Zijie Lu, and Jintai Ding
Dongyu Wu, Bei Liang, Zijie Lu, and Jintai Ding
Analyzing UTXO-Based Blockchain Privacy Threats
Simin Ghesmati, Walid Fdhila, and Edgar Weippl
Simin Ghesmati, Walid Fdhila, and Edgar Weippl
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang
Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, and Bo-Yin Yang
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis
Suvadeep Hajra, Siddhartha Chowdhury, and Debdeep Mukhopadhyay
Suvadeep Hajra, Siddhartha Chowdhury, and Debdeep Mukhopadhyay
XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models
Dimitar Jetchev and Marius Vuille
Dimitar Jetchev and Marius Vuille
A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs
Charanjit S Jutla, Eamonn W. Postlethwaite, and Arnab Roy
Charanjit S Jutla, Eamonn W. Postlethwaite, and Arnab Roy
A Simple and Efficient Framework of Proof Systems for NP
Yuyu Wang, Chuanjie Su, Jiaxin Pan, and Yu Chen
Yuyu Wang, Chuanjie Su, Jiaxin Pan, and Yu Chen
Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model
Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, and Limin Fan
Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, and Limin Fan
Demystifying DeFi MEV Activities in Flashbots Bundle
Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, and Ting Chen
Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, and Ting Chen
A note on quantum approximate optimization algorithm
Zhengjun Cao
Zhengjun Cao
Report on evaluation of KpqC candidates
Jolijn Cottaar, Kathrin Hövelmanns, Andreas Hülsing, Tanja Lange, Mohammad Mahzoun, Alex Pellegrini, Alberto Ravagnani, Sven Schäge, Monika Trimoska, and Benne de Weger
Jolijn Cottaar, Kathrin Hövelmanns, Andreas Hülsing, Tanja Lange, Mohammad Mahzoun, Alex Pellegrini, Alberto Ravagnani, Sven Schäge, Monika Trimoska, and Benne de Weger
Reduction from sparse LPN to LPN, Dual Attack 3.0
Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, and Jean-Pierre Tillich
Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, and Jean-Pierre Tillich
Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK
Paul Frixons, Sébastien Canard, and Loïc Ferreira
Paul Frixons, Sébastien Canard, and Loïc Ferreira
Accurate Score Prediction for Dual-Sieve Attacks
Léo Ducas and Ludo N. Pulles
Léo Ducas and Ludo N. Pulles
Lattice-based Programmable Hash Functions and Applications
Jiang Zhang, Yu Chen, and Zhenfeng Zhang
Jiang Zhang, Yu Chen, and Zhenfeng Zhang
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services
Dario Pasquini, Danilo Francati, Giuseppe Ateniese, and Evgenios M. Kornaropoulos
Dario Pasquini, Danilo Francati, Giuseppe Ateniese, and Evgenios M. Kornaropoulos
Cycle Structure and Observability of Two Types of Galois NFSRs
Xianghan Wang, Jianghua Zhong, and Dongdai Lin
Xianghan Wang, Jianghua Zhong, and Dongdai Lin
New Security Proofs and Complexity Records for Advanced Encryption Standard
Orhun Kara
Orhun Kara
Compact Issuer-Hiding Authentication, Application to Anonymous Credential
Olivier Sanders and Jacques Traoré
Olivier Sanders and Jacques Traoré
Unconditionally Secure Commitments with Quantum Auxiliary Inputs
Tomoyuki Morimae, Barak Nehoran, and Takashi Yamakawa
Tomoyuki Morimae, Barak Nehoran, and Takashi Yamakawa
Zero-day vulnerability prevention with recursive feature elimination and ensemble learning
Mike Nkongolo Wa Nkongolo
Mike Nkongolo Wa Nkongolo
Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks
Xihan Xiong, Zhipeng Wang, Xi Chen, William Knottenbelt, and Michael Huth
Xihan Xiong, Zhipeng Wang, Xi Chen, William Knottenbelt, and Michael Huth
Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography
Alper Çakan and Vipul Goyal
Alper Çakan and Vipul Goyal
Unconditionally secure quantum commitments with preprocessing
Luowen Qian
Luowen Qian
Ring-LWE Hardness Based on Non-invertible Ideals
Charanjit S. Jutla and Chengyu Lin
Charanjit S. Jutla and Chengyu Lin
Quantifying risks in cryptographic selection processes
Daniel J. Bernstein
Daniel J. Bernstein
More forging (and patching) of tropical signatures
Daniel R. L. Brown and Chris Monico
Daniel R. L. Brown and Chris Monico
An Incremental PoSW for General Weight Distributions
Hamza Abusalah and Valerio Cini
Hamza Abusalah and Valerio Cini
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs
Apurva K Vangujar, Alia Umrani, and Paolo Palmieri
Apurva K Vangujar, Alia Umrani, and Paolo Palmieri
BBB PRP Security of the Lai-Massey Mode
Ritam Bhaumik and Mohammad Amin Raeisi
Ritam Bhaumik and Mohammad Amin Raeisi
Cryptanalysis of QARMAv2
Hosein Hadipour and Yosuke Todo
Hosein Hadipour and Yosuke Todo
A Note On the Universality of Black-box MKtP Solvers
Noam Mazor and Rafael Pass
Noam Mazor and Rafael Pass
A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics - Extended Version
François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, and Christine Solnon
François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, and Christine Solnon
Vector Commitments with Efficient Updates
Ertem Nusret Tas and Dan Boneh
Ertem Nusret Tas and Dan Boneh
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness
Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, and Antonio Marcedone
Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, and Antonio Marcedone
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions
Yi Wang, Rongmao Chen, Xinyi Huang, and Moti Yung
Yi Wang, Rongmao Chen, Xinyi Huang, and Moti Yung
Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE
Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, and Daniele Venturi
Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, and Daniele Venturi
Load-Balanced Server-Aided MPC in Heterogeneous Computing
Yibiao Lu, Bingsheng Zhang, and Kui Ren
Yibiao Lu, Bingsheng Zhang, and Kui Ren
Towards Unclonable Cryptography in the Plain Model
Céline Chevalier, Paul Hermouet, and Quoc-Huy Vu
Céline Chevalier, Paul Hermouet, and Quoc-Huy Vu
Learning with Errors over Group Rings Constructed by Semi-direct Product
Jiaqi Liu and Fang-Wei Fu
Jiaqi Liu and Fang-Wei Fu
PQC-NN: Post-Quantum Cryptography Neural Network
Abel C. H. Chen
Abel C. H. Chen
Rectangular Attack on VOX
Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Gouin, Robin Larrieu, and Brice Minaud
Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Gouin, Robin Larrieu, and Brice Minaud
Cryptanalysis of TS-Hash
Aleksei Udovenko
Aleksei Udovenko
Chipmunk: Better Synchronized Multi-Signatures from Lattices
Nils Fleischhacker, Gottfried Herold, Mark Simkin, and Zhenfei Zhang
Nils Fleischhacker, Gottfried Herold, Mark Simkin, and Zhenfei Zhang
Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions
Romain Gay and Bogdan Ursu
Romain Gay and Bogdan Ursu
Authenticating Medications with QR-Codes and Compact Digital Signatures
Julien Jainsky, David Naccache, Bassem Ouni, and Ofer Yifrach-Stav
Julien Jainsky, David Naccache, Bassem Ouni, and Ofer Yifrach-Stav
ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain
Tianjian Liu, Dawei Zhang, Wei Wang, and Chang Chen
Tianjian Liu, Dawei Zhang, Wei Wang, and Chang Chen
Accelerating Polynomial Multiplication for RLWE using Pipelined FFT
Neil Thanawala, Hamid Nejatollahi, and Nikil Dutt
Neil Thanawala, Hamid Nejatollahi, and Nikil Dutt
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption
Ahmad Khoureich Ka
Ahmad Khoureich Ka
Early Stopping for Any Number of Corruptions
Julian Loss and Jesper Buus Nielsen
Julian Loss and Jesper Buus Nielsen
The NTT and residues of a polynomial modulo factors of $X^{2^d} + 1$
Sahil Sharma
Sahil Sharma
A note on Failing gracefully: Completing the picture for explicitly rejecting Fujisaki-Okamoto transforms using worst-case correctness
Kathrin Hövelmanns and Christian Majenz
Kathrin Hövelmanns and Christian Majenz
Pairing-Free Blind Signatures from Standard Assumptions in the ROM
Julia Kastner, Ky Nguyen, and Michael Reichle
Julia Kastner, Ky Nguyen, and Michael Reichle
PURED: A unified framework for resource-hard functions
Alex Biryukov and Marius Lombard-Platet
Alex Biryukov and Marius Lombard-Platet
Small Stretch Problem of the DCT Scheme and How to Fix it
Yuchao Chen, Tingting Guo, Lei Hu, Lina Shang, Shuping Mao, and Peng Wang
Yuchao Chen, Tingting Guo, Lei Hu, Lina Shang, Shuping Mao, and Peng Wang
Entrada to Secure Graph Convolutional Networks
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal
Fast and Designated-verifier Friendly zkSNARKs in the BPK Model
Xudong Zhu, Xuyang Song, and Yi Deng
Xudong Zhu, Xuyang Song, and Yi Deng
On the Security of Rate-limited Privacy Pass
Hien Chu, Khue Do, and Lucjan Hanzlik
Hien Chu, Khue Do, and Lucjan Hanzlik
Fully Malicious Authenticated PIR
Marian Dietz and Stefano Tessaro
Marian Dietz and Stefano Tessaro
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation
Gaëtan Leurent and Clara Pernot
Gaëtan Leurent and Clara Pernot
Sublinear-Communication Secure Multiparty Computation does not require FHE
Elette Boyle, Geoffroy Couteau, and Pierre Meyer
Elette Boyle, Geoffroy Couteau, and Pierre Meyer
ForgedAttributes: An Existential Forgery Vulnerability of CMS and PKCS#7 Signatures
Falko Strenzke
Falko Strenzke
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Fukang Liu, Abul Kalam, Santanu Sarkar, and Willi Meier
Fukang Liu, Abul Kalam, Santanu Sarkar, and Willi Meier
BabySpartan: Lasso-based SNARK for non-uniform computation
Srinath Setty and Justin Thaler
Srinath Setty and Justin Thaler
Somewhat Homomorphic Encryption based on Random Codes
Carlos Aguilar-Melchor, Victor Dyseryn, and Philippe Gaborit
Carlos Aguilar-Melchor, Victor Dyseryn, and Philippe Gaborit
A Modular Approach to Unclonable Cryptography
Prabhanjan Ananth and Amit Behera
Prabhanjan Ananth and Amit Behera
Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification
Andersson Calle Viera, Alexandre Berzati, and Karine Heydemann
Andersson Calle Viera, Alexandre Berzati, and Karine Heydemann
Efficiently Testable Circuits without Conductivity
Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak
Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak
Secret-Shared Shuffle with Malicious Security
Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, and Ee-Chien Chang
Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, and Ee-Chien Chang
Accountable Multi-Signatures with Constant Size Public Keys
Dan Boneh, Aditi Partap, and Brent Waters
Dan Boneh, Aditi Partap, and Brent Waters
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones
Daniel Hugenroth, Alberto Sonnino, Sam Cutler, and Alastair R. Beresford
Daniel Hugenroth, Alberto Sonnino, Sam Cutler, and Alastair R. Beresford
Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation
Jamal Mosakheil and Kan Yang
Jamal Mosakheil and Kan Yang
Compromising sensitive information through Padding Oracle and Known Plaintext attacks in Encrypt-then-TLS scenarios
Daniel Espinoza Figueroa
Daniel Espinoza Figueroa
Fast and Secure Oblivious Stable Matching over Arithmetic Circuits
Arup Mondal, Priyam Panda, Shivam Agarwal, Abdelrahaman Aly, and Debayan Gupta
Arup Mondal, Priyam Panda, Shivam Agarwal, Abdelrahaman Aly, and Debayan Gupta
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption
Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, and Damien Stehlé
Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, and Damien Stehlé
Updatable Privacy-Preserving Blueprints
Bernardo David, Felix Engelmann, Tore Frederiksen, Markulf Kohlweiss, Elena Pagnin, and Mikhail Volkhov
Bernardo David, Felix Engelmann, Tore Frederiksen, Markulf Kohlweiss, Elena Pagnin, and Mikhail Volkhov
CASE: A New Frontier in Public-Key Authenticated Encryption
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, and Jayesh Singla
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, and Jayesh Singla
There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation
Yuan Zhang, Yaqing Song, Shiyu Li, Weijia Li, Zeqi Lai, and Qiang Tang
Yuan Zhang, Yaqing Song, Shiyu Li, Weijia Li, Zeqi Lai, and Qiang Tang
Succinct Arguments over Towers of Binary Fields
Benjamin E. Diamond and Jim Posen
Benjamin E. Diamond and Jim Posen
An efficient quantum parallel repetition theorem and applications
John Bostanci, Luowen Qian, Nicholas Spooner, and Henry Yuen
John Bostanci, Luowen Qian, Nicholas Spooner, and Henry Yuen
A Solution to a Conjecture on the Maps $\chi_n^{(k)}$
Kamil Otal
Kamil Otal
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis
Yen-Ting Kuo and Atsushi Takayasu
Yen-Ting Kuo and Atsushi Takayasu
Pairing-Free Blind Signatures from CDH Assumptions
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
Rutchathon Chairattana-Apirom, Stefano Tessaro, and Chenzhi Zhu
Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics
Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, and Qiang Tang
Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, and Qiang Tang
Immunizing Backdoored PRGs
Marshall Ball, Yevgeniy Dodis, and Eli Goldin
Marshall Ball, Yevgeniy Dodis, and Eli Goldin
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model
Jelle Vos, Mauro Conti, and Zekeriya Erkin
Jelle Vos, Mauro Conti, and Zekeriya Erkin
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models
Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, and Boaz Barak
Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, and Boaz Barak
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery
Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, and Kan Yang
Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, and Kan Yang
Decentralized Private Steam Aggregation from Lattices
Uddipana Dowerah and Aikaterini Mitrokotsa
Uddipana Dowerah and Aikaterini Mitrokotsa
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing
Hanwen Feng, Tiancheng Mai, and Qiang Tang
Hanwen Feng, Tiancheng Mai, and Qiang Tang
Robust Combiners and Universal Constructions for Quantum Cryptography
Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
A note on ``HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment''
Zhengjun Cao
Zhengjun Cao
On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial
Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, and Feng Hao
Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, and Feng Hao
A Comprehensive Survey on Non-Invasive Fault Injection Attacks
Amit Mazumder Shuvo, Tao Zhang, Farimah Farahmandi, and Mark Tehranipoor
Amit Mazumder Shuvo, Tao Zhang, Farimah Farahmandi, and Mark Tehranipoor
Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature
Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, and Dafu Lou
Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, and Dafu Lou
The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+
Patrick Karl, Jonas Schupp, and Georg Sigl
Patrick Karl, Jonas Schupp, and Georg Sigl
Introducing Clapoti(s): Evaluating the isogeny class group action in polynomial time
Aurel Page and Damien Robert
Aurel Page and Damien Robert
The Non-Uniform Perebor Conjecture for Time-Bounded Kolmogorov Complexity is False
Noam Mazor and Rafael Pass
Noam Mazor and Rafael Pass
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study
Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, and Shaowei Wang
Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, and Shaowei Wang
Secure Transformer Inference
Mu Yuan, Lan Zhang, Guoliang Xing, and Xiang-Yang Li
Mu Yuan, Lan Zhang, Guoliang Xing, and Xiang-Yang Li
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, and Ning Luo
Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, and Ning Luo
Guardianship in Group Key Exchange for Limited Environments
Elsie Mestl Fondevik, Britta Hale, and Xisen Tian
Elsie Mestl Fondevik, Britta Hale, and Xisen Tian
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials
Luk Bettale, Delaram Kahrobaei, Ludovic Perret, and Javier Verbel
Luk Bettale, Delaram Kahrobaei, Ludovic Perret, and Javier Verbel
Non-Interactive Zero-Knowledge Functional Proofs
Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, and Jian Weng
Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, and Jian Weng
Pulsar: Secure Steganography for Diffusion Models
Tushar M. Jois, Gabrielle Beck, and Gabriel Kaptchuk
Tushar M. Jois, Gabrielle Beck, and Gabriel Kaptchuk
Adaptively Secure Consensus with Linear Complexity and Constant Round under Honest Majority in the Bare PKI Model, and Separation Bounds from the Idealized Message-Authentication Model
Matthieu Rambaud
Matthieu Rambaud
How to Use Quantum Indistinguishability Obfuscation
Andrea Coladangelo and Sam Gunn
Andrea Coladangelo and Sam Gunn
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography
Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, and Michael Reiter
Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, and Michael Reiter
That’s not my Signature! Fail-Stop Signatures for a Post-Quantum World
Cecilia Boschini, Hila Dahari, Moni Naor, and Eyal Ronen
Cecilia Boschini, Hila Dahari, Moni Naor, and Eyal Ronen
Formal verification of the post-quantum security properties of IKEv2 PPK (RFC 8784) using the Tamarin Prover
Sophie Stevens
Sophie Stevens
Secure Encryption and Key Exchange using Arbiter PUF
Raja Adhithan Radhakrishnan
Raja Adhithan Radhakrishnan
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks
Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, and Kouichi Sakurai
Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, and Kouichi Sakurai
Dora: A Simple Approach to Zero-Knowledge for RAM Programs
Aarushi Goel, Mathias Hall-Andersen, and Gabriel Kaptchuk
Aarushi Goel, Mathias Hall-Andersen, and Gabriel Kaptchuk
Forging tropical signatures
Lorenz Panny
Lorenz Panny
An Algorithmic Approach to $(2,2)$-isogenies in the Theta Model and Applications to Isogeny-based Cryptography
Pierrick Dartois, Luciano Maino, Giacomo Pope, and Damien Robert
Pierrick Dartois, Luciano Maino, Giacomo Pope, and Damien Robert
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost
Claude Carlet, Abderrahman Daif, Sylvain Guilley, and Cédric Tavernier
Claude Carlet, Abderrahman Daif, Sylvain Guilley, and Cédric Tavernier
New Public-Key Cryptosystem Blueprints Using Matrix Products in $\mathbb F_p$
Remi Geraud-Stewart and David Naccache
Remi Geraud-Stewart and David Naccache
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version)
Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, and Hossein Yalame
Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, and Hossein Yalame
Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions
Kazumasa Shinagawa and Koji Nuida
Kazumasa Shinagawa and Koji Nuida
Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, and Hendrik Waldner
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, and Hendrik Waldner
Pseudorandom Isometries
Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu, and Yao-Ting Lin
Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu, and Yao-Ting Lin
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase
Miguel de Vega, Andrei Lapets, Stanislaw Jarecki, Wicher Malten, Mehmet Ugurbil, and Wyatt Howe
Miguel de Vega, Andrei Lapets, Stanislaw Jarecki, Wicher Malten, Mehmet Ugurbil, and Wyatt Howe
Broadcast-Optimal Four-Round MPC in the Plain Model
Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, and Sophia Yakoubov
Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, and Sophia Yakoubov
Byzantine Agreement Decomposed: Honest Majority Asynchronous Atomic Broadcast from Reliable Broadcast
Simon Holmgaard Kamp and Jesper Buus Nielsen
Simon Holmgaard Kamp and Jesper Buus Nielsen
On the Security of Succinct Interactive Arguments from Vector Commitments
Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, and Nicholas Spooner
Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, and Nicholas Spooner
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption
Florian Krieger, Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
Florian Krieger, Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
Exploiting the Symmetry of $\mathbb{Z}^n$: Randomization and the Automorphism Problem
Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, and Xiaoyun Wang
Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, and Xiaoyun Wang
Signatures with Memory-Tight Security in the Quantum Random Oracle Model
Keita Xagawa
Keita Xagawa
Hintless Single-Server Private Information Retrieval
Baiyu Li, Daniele Micciancio, Mariana Raykova, and Mark Schultz-Wu
Baiyu Li, Daniele Micciancio, Mariana Raykova, and Mark Schultz-Wu
On the Masking-Friendly Designs for Post-Quantum Cryptography
Suparna Kundu, Angshuman Karmakar, and Ingrid Verbauwhede
Suparna Kundu, Angshuman Karmakar, and Ingrid Verbauwhede
A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer
Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, and Ingrid Verbauwhede
Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, and Ingrid Verbauwhede
Construction-D lattice from Garcia-Stichtenoth tower code
Elena Kirshanova and Ekaterina Malygina
Elena Kirshanova and Ekaterina Malygina
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks
Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, and Murali Annavaram
Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, and Murali Annavaram
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
Daniele Micciancio and Adam Suhl
Daniele Micciancio and Adam Suhl
A Formal Treatment of Envelope Encryption
Shoichi Hirose and Kazuhiko Minematsu
Shoichi Hirose and Kazuhiko Minematsu
CSIDH with Level Structure
Steven D. Galbraith, Derek Perrin, and José Felipe Voloch
Steven D. Galbraith, Derek Perrin, and José Felipe Voloch
Few-weight linear codes over $\mathbb{F}_p$ from $t$-to-one mappings
René Rodríguez-Aldama
René Rodríguez-Aldama
Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing
Dan Boneh, Aditi Partap, and Lior Rotem
Dan Boneh, Aditi Partap, and Lior Rotem
Deterministic Byzantine Agreement with Adaptive $O(n\cdot f)$ Communication
Fatima Elsheimy, Giorgos Tsimos, and Charalampos Papamanthou
Fatima Elsheimy, Giorgos Tsimos, and Charalampos Papamanthou
Quantitative Fault Injection Analysis
Jakob Feldtkeller, Tim Güneysu, and Patrick Schaumont
Jakob Feldtkeller, Tim Güneysu, and Patrick Schaumont
Optimizing S-box Implementations Using SAT Solvers: Revisited
Fuxin Zhang and Zhenyu Huang
Fuxin Zhang and Zhenyu Huang
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud, and Quoc-Huy Vu
Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud, and Quoc-Huy Vu
MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem
Ryad Benadjila, Thibauld Feneuil, and Matthieu Rivain
Ryad Benadjila, Thibauld Feneuil, and Matthieu Rivain
Improved Attacks on LowMC with Algebraic Techniques
Yimeng Sun, Jiamin Cui, and Meiqin Wang
Yimeng Sun, Jiamin Cui, and Meiqin Wang
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies
Elli Androulaki, Marcus Brandenburger, Angelo De Caro, Kaoutar Elkhiyaoui, Alexandros Filios, Liran Funaro, Yacov Manevich, Senthilnathan Natarajan, and Manish Sethi
Elli Androulaki, Marcus Brandenburger, Angelo De Caro, Kaoutar Elkhiyaoui, Alexandros Filios, Liran Funaro, Yacov Manevich, Senthilnathan Natarajan, and Manish Sethi
Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices: Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and More
Yao-Ching Hsieh, Huijia Lin, and Ji Luo
Yao-Ching Hsieh, Huijia Lin, and Ji Luo
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications
Shiyuan Xu, Yibo Cao, Xue Chen, Yu Guo, Yuer Yang, Fangda Guo, and Siu-Ming Yiu
Shiyuan Xu, Yibo Cao, Xue Chen, Yu Guo, Yuer Yang, Fangda Guo, and Siu-Ming Yiu
On Parallel Repetition of PCPs
Alessandro Chiesa, Ziyi Guan, and Burcu Yıldız
Alessandro Chiesa, Ziyi Guan, and Burcu Yıldız
High-assurance zeroization
Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, and Peter Schwabe
Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, and Peter Schwabe
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, and Xiangfu Song
Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, and Xiangfu Song
Passive SSH Key Compromise via Lattices
Keegan Ryan, Kaiwen He, George Arnold Sullivan, and Nadia Heninger
Keegan Ryan, Kaiwen He, George Arnold Sullivan, and Nadia Heninger
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies
Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, and Christophe Petit
Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, and Christophe Petit
Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol
Zhiwei Li, Jun Xu, and Lei Hu
Zhiwei Li, Jun Xu, and Lei Hu
Algebraic properties of the maps $\chi_n$
Jan Schoone and Joan Daemen
Jan Schoone and Joan Daemen
Analysis of four protocols based on tropical circulant matrices
Ivan Buchinskiy, Matvei Kotov, and Alexander Treier
Ivan Buchinskiy, Matvei Kotov, and Alexander Treier
Breaking two PSI-CA protocols in polynomial time
Yang Tan and Bo Lv
Yang Tan and Bo Lv
BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes
Hadas Zeilberger, Binyi Chen, and Ben Fisch
Hadas Zeilberger, Binyi Chen, and Ben Fisch
On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications
Wonseok Choi, Minki Hhan, Yu Wei, and Vassilis Zikas
Wonseok Choi, Minki Hhan, Yu Wei, and Vassilis Zikas
Memory Checking for Parallel RAMs
Surya Mathialagan
Surya Mathialagan
On Quantum Simulation-Soundness
Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, and Quoc-Huy Vu
Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, and Quoc-Huy Vu
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, and Maria Eichlseder
Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, and Maria Eichlseder
Scalable Mixed-Mode MPC
Radhika Garg, Kang Yang, Jonathan Katz, and Xiao Wang
Radhika Garg, Kang Yang, Jonathan Katz, and Xiao Wang
Oblivious Homomorphic Encryption
Osman Biçer and Christian Tschudin
Osman Biçer and Christian Tschudin
Another Look at Side-Channel Resistant Encoding Schemes
Xiaolu Hou, Jakub Breier, and Mladen Kovačević
Xiaolu Hou, Jakub Breier, and Mladen Kovačević
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version)
Zhuolong Zhang, Shiyao Chen, Wei Wang, and Meiqin Wang
Zhuolong Zhang, Shiyao Chen, Wei Wang, and Meiqin Wang
A note on ``a novel authentication and key agreement scheme for Internet of Vehicles''
Zhengjun Cao
Zhengjun Cao
Implementing Arbitrary Maps over Small Finite Domains using Ring Addition and Scalar Multiplication
Andrei Lapets
Andrei Lapets
Predicate Aggregate Signatures and Applications
Tian Qiu and Qiang Tang
Tian Qiu and Qiang Tang
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes
George Teseleanu and Paul Cotan
George Teseleanu and Paul Cotan
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction
Xu An Wang, Lunhai Pan, Hao Liu, and Xiaoyuan Yang
Xu An Wang, Lunhai Pan, Hao Liu, and Xiaoyuan Yang
Some Results on Related Key-IV Pairs of Espresso
George Teseleanu
George Teseleanu
Efficient VOLE based Multi-Party PSI with Lower Communication Cost
Shuqing Zhang
Shuqing Zhang
Revisiting the Boomerang Attack from a Perspective of 3-differential
Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, and Takanori Isobe
Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, and Takanori Isobe
Faster Complete Formulas for the GLS254 Binary Curve
Thomas Pornin
Thomas Pornin
Admissible Parameter Sets and Complexity Estimation of Crossbred Algorithm
Shuhei Nakamura
Shuhei Nakamura
The Quantum Decoding Problem
André Chailloux and Jean-Pierre Tillich
André Chailloux and Jean-Pierre Tillich
MPC in the head using the subfield bilinear collision problem
Janik Huth and Antoine Joux
Janik Huth and Antoine Joux
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication
Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, and Alberto Ibarrondo
Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, and Alberto Ibarrondo
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, and Matthias J. Kannwischer
Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, and Matthias J. Kannwischer
Selective Opening Security in the Quantum Random Oracle Model, Revisited
Jiaxin Pan and Runzhi Zeng
Jiaxin Pan and Runzhi Zeng
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression
Ioana Savu, Marina Krček, Guilherme Perin, Lichao Wu, and Stjepan Picek
Ioana Savu, Marina Krček, Guilherme Perin, Lichao Wu, and Stjepan Picek
On the cryptographic properties of weightwise affine and weightwise quadratic functions
Pierrick Méaux and Yassine Ozaim
Pierrick Méaux and Yassine Ozaim
Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks
Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, and Debdeep Mukhopadhyay
Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, and Debdeep Mukhopadhyay
BumbleBee: Secure Two-party Inference Framework for Large Transformers
Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, and WenGuang Chen
Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, and WenGuang Chen
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
Michele Ciampi and Yu Xia
Michele Ciampi and Yu Xia
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM
Gilad Asharov, Ilan Komargodski, and Yehuda Michelson
Gilad Asharov, Ilan Komargodski, and Yehuda Michelson
Another Look at Differential-Linear Attacks
Orr Dunkelman and Ariel Weizman
Orr Dunkelman and Ariel Weizman
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, and Ingrid Verbauwhede
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, and Ingrid Verbauwhede
Designing Full-Rate Sponge based AEAD modes
Bishwajit Chakraborty, Nilanjan Datta, and Mridul Nandi
Bishwajit Chakraborty, Nilanjan Datta, and Mridul Nandi
Fine-grained Policy Constraints for Distributed Point Function
Keyu Ji, Bingsheng Zhang, and Kui Ren
Keyu Ji, Bingsheng Zhang, and Kui Ren
A note on ``SCPUAK: smart card-based secure protocol for remote user authentication and key agreement''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing
Jörn Kußmaul, Matthew Akram, and Anselme Tueno
Jörn Kußmaul, Matthew Akram, and Anselme Tueno
$\Pi$: A Unified Framework for Verifiable Secret Sharing
Karim Baghery
Karim Baghery
Arithmetization Oriented Encryption
Tomer Ashur and Al Kindi
Tomer Ashur and Al Kindi
Unleashing the Power of Differential Fault Attacks on QARMAv2
Soumya Sahoo, Debasmita Chakraborty, and Santanu Sarkar
Soumya Sahoo, Debasmita Chakraborty, and Santanu Sarkar
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head
Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier Verbel, and Floyd Zweydinger
Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier Verbel, and Floyd Zweydinger
Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, and Debdeep Mukhopadhyay
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, and Debdeep Mukhopadhyay
On the Complexity and Admissible Parameters of the Crossbred Algorithm in $\mathbb{F}_{q\geq2}$
João Diogo Duarte
João Diogo Duarte
Proof-of-Work-based Consensus in Expected-Constant Time
Juan Garay, Aggelos Kiayias, and Yu Shen
Juan Garay, Aggelos Kiayias, and Yu Shen
Families of prime-order endomorphism-equipped embedded curves on pairing-friendly curves
Antonio Sanso and Youssef El Housni
Antonio Sanso and Youssef El Housni
Publicly-Detectable Watermarking for Language Models
Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Mingyuan Wang
Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Mingyuan Wang
FaBFT: Flexible Asynchronous BFT Protocol Using DAG
Yu Song, Yu Long, Xian Xu, and Dawu Gu
Yu Song, Yu Long, Xian Xu, and Dawu Gu
Partial Sums Meet FFT: Improved Attack on 6-Round AES
Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaetan Leurent, Avichai Marmor, and Victor Mollimard
Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaetan Leurent, Avichai Marmor, and Victor Mollimard
On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks
Nilanjan Datta, Avijit Dutta, Eik List, and Sougata Mandal
Nilanjan Datta, Avijit Dutta, Eik List, and Sougata Mandal
PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme
Abel C. H. Chen
Abel C. H. Chen
Privacy-Preserving Digital Vaccine Passport
Thai Duong, Jiahui Gao, Duong Hieu Phan, and Ni Trieu
Thai Duong, Jiahui Gao, Duong Hieu Phan, and Ni Trieu
Approximate Lower Bound Arguments
Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, and Anatoliy Zinovyev
Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, and Anatoliy Zinovyev
On Gaussian sampling, smoothing parameter and application to signatures
Thomas Espitau, Alexandre Wallet, and Yang Yu
Thomas Espitau, Alexandre Wallet, and Yang Yu
QCB is Blindly Unforgeable
Jannis Leuther and Stefan Lucks
Jannis Leuther and Stefan Lucks
On Sigma-Protocols and (packed) Black-Box Secret Sharing Schemes
Claudia Bartoli and Ignacio Cascudo
Claudia Bartoli and Ignacio Cascudo
Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO
Ignacio Cascudo and Bernardo David
Ignacio Cascudo and Bernardo David
An Efficient Algorithm for Solving the MQ Problem using Hilbert Series
Kosuke Sakata and Tsuyoshi Takagi
Kosuke Sakata and Tsuyoshi Takagi
A New Framework for Fast Homomorphic Matrix Multiplication
Xiaopeng Zheng, Hongbo Li, and Dingkang Wang
Xiaopeng Zheng, Hongbo Li, and Dingkang Wang
On-Chain Timestamps Are Accurate
Apostolos Tzinas, Srivatsan Sridhar, and Dionysis Zindros
Apostolos Tzinas, Srivatsan Sridhar, and Dionysis Zindros
Who Watches the Watchers: Attacking Glitch Detection Circuits
Amund Askeland, Svetla Nikova, and Ventzislav Nikov
Amund Askeland, Svetla Nikova, and Ventzislav Nikov
Security Bounds for Proof-Carrying Data from Straightline Extractors
Alessandro Chiesa, Ziyi Guan, Shahar Samocha, and Eylon Yogev
Alessandro Chiesa, Ziyi Guan, Shahar Samocha, and Eylon Yogev
The Dilemma and Prospects of Academic Misconduct in Digital Forensics--A Case Study to Wan's Improved Scheme
Chenglian Liu and Sonia Chien-I Chen
Chenglian Liu and Sonia Chien-I Chen
An End-to-End Framework for Private DGA Detection as a Service
Ricardo Jose Menezes Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, and Ricardo Jacobi
Ricardo Jose Menezes Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, and Ricardo Jacobi
Oblivious Turing Machine
Sofiane Azogagh, Victor Delfour, and Marc-Olivier Killijian
Sofiane Azogagh, Victor Delfour, and Marc-Olivier Killijian
A New Perspective on Key Switching for BGV-like Schemes
Johannes Mono and Tim Güneysu
Johannes Mono and Tim Güneysu
PSKPIR: Symmetric Keyword Private Information Retrieval based on PSI with Payload
Zuodong Wu, Dawei Zhang, Yong Li, and Xu Han
Zuodong Wu, Dawei Zhang, Yong Li, and Xu Han
Quantum Key Leasing for PKE and FHE with a Classical Lessor
Orestis Chardouvelis, Vipul Goyal, Aayush Jain, and Jiahui Liu
Orestis Chardouvelis, Vipul Goyal, Aayush Jain, and Jiahui Liu
Analysis of a Quantum Attack on the Blum-Micali Pseudorandom Number Generator
Tingfei Feng
Tingfei Feng
The One-Wayness of Jacobi Signatures
Henry Corrigan-Gibbs and David J. Wu
Henry Corrigan-Gibbs and David J. Wu
Algorithmic Views of Vectorized Polynomial Multipliers – NTRU
Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, and Bo-Yin Yang
Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, and Bo-Yin Yang
Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval
Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, and Tianwei Zhang
Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, and Tianwei Zhang
Oblivious issuance of proofs
Michele Orrù, Stefano Tessaro, Greg Zaverucha, and Chenzhi Zhu
Michele Orrù, Stefano Tessaro, Greg Zaverucha, and Chenzhi Zhu
On the (In)Security of the BUFF Transform
Jelle Don, Serge Fehr, Yu-Hsuan Huang, and Patrick Struck
Jelle Don, Serge Fehr, Yu-Hsuan Huang, and Patrick Struck
One-time and Revocable Ring Signature with Logarithmic Size in Blockchain
Yang Li, Wei Wang, Dawei Zhang, and Xu Han
Yang Li, Wei Wang, Dawei Zhang, and Xu Han
On Decompositions of Permutations in Quadratic Functions
Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stănică, and Svetla Nikova
Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stănică, and Svetla Nikova
ASKPIR: Authorized Symmetric Keyword Privacy Information Retrieval Protocol Based on DID
Zuodong Wu, Dawei Zhang, Yong Li, and Xu Han
Zuodong Wu, Dawei Zhang, Yong Li, and Xu Han
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure
Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu
Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu
A Note on ``A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme
Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, and Masayuki Abe
Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, and Masayuki Abe
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber
Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, and Shivam Bhasin
Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, and Shivam Bhasin
Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM
Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Sayan Das, and Anupam Chattopadhyay
Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Sayan Das, and Anupam Chattopadhyay
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning
Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, and Liehuang Zhu
Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, and Liehuang Zhu
On the (Not So) Surprising Impact of Multi-Path Payments on Performance and Privacy in the Lightning Network
Charmaine Ndolo and Florian Tschorsch
Charmaine Ndolo and Florian Tschorsch
Concrete Analysis of Quantum Lattice Enumeration
Shi Bai, Maya-Iggy van Hoof, Floyd B. Johnson, Tanja Lange, and Tran Ngo
Shi Bai, Maya-Iggy van Hoof, Floyd B. Johnson, Tanja Lange, and Tran Ngo
Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS
Mingfei Zhang, Rujia Li, and Sisi Duan
Mingfei Zhang, Rujia Li, and Sisi Duan
Withdrawable Signature: How to Call off a Signature
Xin Liu, Joonsang Baek, and Willy Susilo
Xin Liu, Joonsang Baek, and Willy Susilo
Commitments from Quantum One-Wayness
Dakshita Khurana and Kabir Tomer
Dakshita Khurana and Kabir Tomer
Pai: Private Retrieval with Constant Online Time, Communication, and Client-Side Storage for Data Marketplace
Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, and Yuan Hong
Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, and Yuan Hong
Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves
Benjamin Benčina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, and Charlotte Weitkämper
Benjamin Benčina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, and Charlotte Weitkämper
Designing Efficient and Flexible NTT Accelerators
Ahmet MALAL
Ahmet MALAL
DeVoS: Deniable Yet Verifiable Vote Updating
Johannes Mueller, Balazs Pejo, and Ivan Pryvalov
Johannes Mueller, Balazs Pejo, and Ivan Pryvalov
Order vs. Chaos: A Language Model Approach for Side-channel Attacks
Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, and Lejla Batina
Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, and Lejla Batina
New proof systems and an OPRF from CSIDH
Cyprien Delpech de Saint Guilhem and Robi Pedersen
Cyprien Delpech de Saint Guilhem and Robi Pedersen
Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures
Jiaxin Pan and Benedikt Wagner
Jiaxin Pan and Benedikt Wagner
Mitigating MEV via Multiparty Delay Encryption
Amirhossein Khajehpour, Hanzaleh Akbarinodehi, Mohammad Jahanara, and Chen Feng
Amirhossein Khajehpour, Hanzaleh Akbarinodehi, Mohammad Jahanara, and Chen Feng
Power circuits: a new arithmetization for GKR-styled sumcheck
Lev Soukhanov
Lev Soukhanov
An Efficient ZK Compiler from SIMD Circuits to General Circuits
Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu
Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu
How to Prove Statements Obliviously?
Sanjam Garg, Aarushi Goel, and Mingyuan Wang
Sanjam Garg, Aarushi Goel, and Mingyuan Wang
Can Alice and Bob Guarantee Output to Carol?
Bar Alon, Eran Omri, and Muthuramakrishnan Venkitasubramaniam
Bar Alon, Eran Omri, and Muthuramakrishnan Venkitasubramaniam
Crust: Verifiable and Efficient Private Information Retrieval With Sublinear Online Time
Yinghao Wang, Xuanming Liu, Jiawen Zhang, Jian Liu, and Xiaohu Yang
Yinghao Wang, Xuanming Liu, Jiawen Zhang, Jian Liu, and Xiaohu Yang
Efficient Lattice-based Sublinear Arguments for R1CS without Aborts
Intak Hwang, Jinyeong Seo, and Yongsoo Song
Intak Hwang, Jinyeong Seo, and Yongsoo Song
Three Party Secure Computation with Friends and Foes
Bar Alon, Amos Beimel, and Eran Omri
Bar Alon, Amos Beimel, and Eran Omri
Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations
Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, and Fei Yan
Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, and Fei Yan
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures
Shuichi Katsumata, Yi-Fu Lai, and Michael Reichle
Shuichi Katsumata, Yi-Fu Lai, and Michael Reichle
A one-query lower bound for unitary synthesis and breaking quantum cryptography
Alex Lombardi, Fermi Ma, and John Wright
Alex Lombardi, Fermi Ma, and John Wright
The Uber-Knowledge Assumption: A Bridge to the AGM
Balthazar Bauer, Pooya Farshim, Patrick Harasser, and Markulf Kohlweiss
Balthazar Bauer, Pooya Farshim, Patrick Harasser, and Markulf Kohlweiss
Compress: Generate Small and Fast Masked Pipelined Circuits
Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, and Rishub Nagpal
Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, and Rishub Nagpal
Boomy: Batch Opening Of Multivariate polYnomial commitment
Thomas Lavaur and Jérôme Lacan
Thomas Lavaur and Jérôme Lacan
Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller
Léo Weissbart and Stjepan Picek
Léo Weissbart and Stjepan Picek
Computational FHE Circuit Privacy for Free
Anamaria Costache, Lea Nürnberger, and Tjerand Silde
Anamaria Costache, Lea Nürnberger, and Tjerand Silde
A Black Box Attack Using Side Channel Analysis and Hardware Trojans
Raja Adhithan Radhakrishnan
Raja Adhithan Radhakrishnan
CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness
Sofia Celi, Shai Levin, and Joe Rowell
Sofia Celi, Shai Levin, and Joe Rowell
Secure Noise Sampling for DP in MPC with Finite Precision
Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, and Liang Zhao
Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, and Liang Zhao
Multi-Party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN
Quang Dao, Yuval Ishai, Aayush Jain, and Huijia Lin
Quang Dao, Yuval Ishai, Aayush Jain, and Huijia Lin
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
One-way Functions and Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions
Yanyi Liu and Rafael Pass
Yanyi Liu and Rafael Pass
Single trace HQC shared key recovery with SASCA
Guillaume Goy, Julien Maillard, Philippe Gaborit, and Antoine Loiseau
Guillaume Goy, Julien Maillard, Philippe Gaborit, and Antoine Loiseau
Optimized Homomorphic Evaluation of Boolean Functions
Nicolas Bon, David Pointcheval, and Matthieu Rivain
Nicolas Bon, David Pointcheval, and Matthieu Rivain
M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition
Khue Do, Lucjan Hanzlik, and Eugenio Paracucchi
Khue Do, Lucjan Hanzlik, and Eugenio Paracucchi
A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber
Sönke Jendral, Kalle Ngo, Ruize Wang, and Elena Dubrova
Sönke Jendral, Kalle Ngo, Ruize Wang, and Elena Dubrova
On the Round Complexity of Asynchronous Crusader Agreement
Ittai Abraham, Naama Ben-David, Gilad Stern, and Sravya Yandamuri
Ittai Abraham, Naama Ben-David, Gilad Stern, and Sravya Yandamuri
How to Rationally Select Your Delegatee in PoS
Yuzhe Zhang, Qin Wang, Shiping Chen, and Chen Wang
Yuzhe Zhang, Qin Wang, Shiping Chen, and Chen Wang
How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations
Hanjun Li and Tianren Liu
Hanjun Li and Tianren Liu
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
Rachit Garg, George Lu, Brent Waters, and David J. Wu
Rachit Garg, George Lu, Brent Waters, and David J. Wu
Time-Lock Puzzles with Efficient Batch Solving
Jesko Dujmovic, Rachit Garg, and Giulio Malavolta
Jesko Dujmovic, Rachit Garg, and Giulio Malavolta
CryptoZoo: A Viewer for Reduction Proofs
Chris Brzuska, Christoph Egger, and Kirthivaasan Puniamurthy
Chris Brzuska, Christoph Egger, and Kirthivaasan Puniamurthy
Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Prime
Vincent Hwang, Chi-Ting Liu, and Bo-Yin Yang
Vincent Hwang, Chi-Ting Liu, and Bo-Yin Yang
KiloNova: Non-Uniform PCD with Zero-Knowledge Property from Generic Folding Schemes
Tianyu Zheng, Shang Gao, Yu Guo, and Bin Xiao
Tianyu Zheng, Shang Gao, Yu Guo, and Bin Xiao
A Scalable Coercion-resistant Voting Scheme for Blockchain Decision-making
Zeyuan Yin, Bingsheng Zhang, Andrii Nastenko, Roman Oliynykov, and Kui Ren
Zeyuan Yin, Bingsheng Zhang, Andrii Nastenko, Roman Oliynykov, and Kui Ren
Asymptotics and Improvements of Sieving for Codes
Léo Ducas, Andre Esser, Simona Etinski, and Elena Kirshanova
Léo Ducas, Andre Esser, Simona Etinski, and Elena Kirshanova
Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and their Isogeny-based Applications
Bruno Sterner
Bruno Sterner
SoK: Web3 Recovery Mechanisms
Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, and Mainack Mondal
Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, and Mainack Mondal
Efficient Pre-processing PIR Without Public-Key Cryptography
Ashrujit Ghoshal, Mingxun Zhou, and Elaine Shi
Ashrujit Ghoshal, Mingxun Zhou, and Elaine Shi
Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments
Thibauld Feneuil and Matthieu Rivain
Thibauld Feneuil and Matthieu Rivain
Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures
Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, and Emanuele Strieder
Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, and Emanuele Strieder
Key Filtering in Cube Attacks from the Implementation Aspect
Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, and Lin Jiao
Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, and Lin Jiao
Jackpot: Non-Interactive Aggregatable Lotteries
Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation
Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, and Ioanna Karantaidou
Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, and Ioanna Karantaidou
Not Just Regular Decoding: Asymptotics and Improvements of Regular Syndrome Decoding Attacks
Andre Esser and Paolo Santini
Andre Esser and Paolo Santini
Depth-Optimized Quantum Implementation of ARIA
Yujin Yang, Kyungbae Jang, Yujin Oh, and Hwajeong Seo
Yujin Yang, Kyungbae Jang, Yujin Oh, and Hwajeong Seo
Optimized Quantum Implementation of SEED
Yujin Oh, Kyungbae Jang, Yujin Yang, and Hwajeong Seo
Yujin Oh, Kyungbae Jang, Yujin Yang, and Hwajeong Seo
Finding Shortest Vector Using Quantum NV Sieve on Grover
Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn, and Hwajeong Seo
Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn, and Hwajeong Seo
Fast Blind Rotation for Bootstrapping FHEs
Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, and Dengguo Feng
Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, and Dengguo Feng
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks
Akira Ito, Rei Ueno, Rikuma Tanaka, and Naofumi Homma
Akira Ito, Rei Ueno, Rikuma Tanaka, and Naofumi Homma
Generalized Implicit Factorization Problem
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
Yansong Feng, Abderrahmane Nitaj, and Yanbin Pan
LLM for SoC Security: A Paradigm Shift
Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, and Farimah Farahmandi
Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, and Farimah Farahmandi
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun
Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, and Léo Robert
Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, and Léo Robert
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Krijn Reijnders
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, and Krijn Reijnders
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
Siemen Dhooghe, Artemii Ovchinnikov, and Dilara Toprakhisar
Siemen Dhooghe, Artemii Ovchinnikov, and Dilara Toprakhisar
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1
Yanbin Xu, Yonglin Hao, and Mingxing Wang
Yanbin Xu, Yonglin Hao, and Mingxing Wang
Better Safe than Sorry: Recovering after Adversarial Majority
Srivatsan Sridhar, Dionysis Zindros, and David Tse
Srivatsan Sridhar, Dionysis Zindros, and David Tse
Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines
Yuncong Zhang, Shi-Feng Sun, Ren Zhang, and Dawu Gu
Yuncong Zhang, Shi-Feng Sun, Ren Zhang, and Dawu Gu
Cornucopia: Distributed randomness beacons at scale
Miranda Christ, Kevin Choi, and Joseph Bonneau
Miranda Christ, Kevin Choi, and Joseph Bonneau
Adaptively Secure BLS Threshold Signatures from DDH and co-CDH
Sourav Das and Ling Ren
Sourav Das and Ling Ren
Doubly Efficient Batched Private Information Retrieval
Xiuquan Ding, Giulio Malavolta, and Tianwei Zhang
Xiuquan Ding, Giulio Malavolta, and Tianwei Zhang
Evaluating GPT-4’s Proficiency in Addressing Cryptography Examinations
Vasily Mikhalev, Nils Kopal, and Bernhard Esslinger
Vasily Mikhalev, Nils Kopal, and Bernhard Esslinger
A Thorough Evaluation of RAMBAM
Daniel Lammers, Amir Moradi, Nicolai Müller, and Aein Rezaei Shahmirzadi
Daniel Lammers, Amir Moradi, Nicolai Müller, and Aein Rezaei Shahmirzadi
Signature-Free Atomic Broadcast with Optimal $O(n^2)$ Messages and $O(1)$ Expected Time
Xiao Sui, Xin Wang, and Sisi Duan
Xiao Sui, Xin Wang, and Sisi Duan
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs
Carsten Baum, Nikolas Melissaris, Rahul Rachuri, and Peter Scholl
Carsten Baum, Nikolas Melissaris, Rahul Rachuri, and Peter Scholl
Further Improvements of the Estimation of Key Enumeration with Applications to Solving LWE
Alessandro Budroni and Erik Mårtensson
Alessandro Budroni and Erik Mårtensson
PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION SYSTEM
Sudhanshu Sekhar Tripathy and Bichitrananda Behera
Sudhanshu Sekhar Tripathy and Bichitrananda Behera
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium
Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, and Tobias Schneider
Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, and Tobias Schneider
Arithmetic PCA for Encrypted Data
Jung Hee Cheon, Hyeongmin Choe, Saebyul Jung, Duhyeong Kim, Dah Hoon Lee, and Jai Hyun Park
Jung Hee Cheon, Hyeongmin Choe, Saebyul Jung, Duhyeong Kim, Dah Hoon Lee, and Jai Hyun Park
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers
Amit Jana, Mostafizar Rahman, Dhiman Saha, and Goutam Paul
Amit Jana, Mostafizar Rahman, Dhiman Saha, and Goutam Paul
Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees
Yu Dai, Fangguo Zhang, and Chang-an Zhao
Yu Dai, Fangguo Zhang, and Chang-an Zhao
TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores
Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, and Seong Oun Hwang
Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, and Seong Oun Hwang
A Note on ``a two-factor security authentication scheme for wireless sensor networks in IoT environments''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
ELCA: Introducing Enterprise-level Cryptographic Agility for a Post-Quantum Era
Dimitrios Sikeridis, David Ott, Sean Huntley, Shivali Sharma, Vasantha Kumar Dhanasekar, Megha Bansal, Akhilesh Kumar, Anwitha U N, Daniel Beveridge, and Sairam Veeraswamy
Dimitrios Sikeridis, David Ott, Sean Huntley, Shivali Sharma, Vasantha Kumar Dhanasekar, Megha Bansal, Akhilesh Kumar, Anwitha U N, Daniel Beveridge, and Sairam Veeraswamy
Unclonable Commitments and Proofs
Vipul Goyal, Giulio Malavolta, and Justin Raizes
Vipul Goyal, Giulio Malavolta, and Justin Raizes
DEFEND: Towards Verifiable Delay Functions from Endomorphism Rings
Knud Ahrens and Jens Zumbrägel
Knud Ahrens and Jens Zumbrägel
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, and Yuval Yarom
Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, and Yuval Yarom
A Total Break of the 3WISE Digital Signature Scheme
Daniel Smith-Tone
Daniel Smith-Tone
Evolving Secret Sharing Made Short
Danilo Francati and Daniele Venturi
Danilo Francati and Daniele Venturi
On Linear Equivalence, Canonical Forms, and Digital Signatures
Tung Chou, Edoardo Persichetti, and Paolo Santini
Tung Chou, Edoardo Persichetti, and Paolo Santini
Unclonable Non-Interactive Zero-Knowledge
Ruta Jawale and Dakshita Khurana
Ruta Jawale and Dakshita Khurana
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Pierrick Méaux, Jeongeun Park, and Hilder V. L. Pereira
Pierrick Méaux, Jeongeun Park, and Hilder V. L. Pereira
Proofs of Space with Maximal Hardness
Leonid Reyzin
Leonid Reyzin
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux
Elia Anzuoni and Tommaso Gagliardoni
Elia Anzuoni and Tommaso Gagliardoni
Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves
Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, and Zheli Liu
Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, and Zheli Liu
Adaptive Garbled Circuits and Garbled RAM from Non-Programmable Random Oracles
Cruz Barnum, David Heath, Vladimir Kolesnikov, and Rafail Ostrovsky
Cruz Barnum, David Heath, Vladimir Kolesnikov, and Rafail Ostrovsky
Polynomial Time Cryptanalytic Extraction of Neural Network Models
Isaac A. Canales-Martínez, Jorge Chavez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, and Adi Shamir
Isaac A. Canales-Martínez, Jorge Chavez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, and Adi Shamir
Committing AE from Sponges: Security Analysis of the NIST LWC Finalists
Juliane Krämer, Patrick Struck, and Maximiliane Weishäupl
Juliane Krämer, Patrick Struck, and Maximiliane Weishäupl
SoK: Signatures With Randomizable Keys
Sofía Celi, Scott Griffy, Lucjan Hanzlik, Octavio Perez Kempner, and Daniel Slamanig
Sofía Celi, Scott Griffy, Lucjan Hanzlik, Octavio Perez Kempner, and Daniel Slamanig
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching
Seung Geol Choi, Dana Dachman-Soled, Mingyu Liang, Linsheng Liu, and Arkady Yerukhimovich
Seung Geol Choi, Dana Dachman-Soled, Mingyu Liang, Linsheng Liu, and Arkady Yerukhimovich
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA
Shiyu Shen, Hao Yang, Wenqian Li, and Yunlei Zhao
Shiyu Shen, Hao Yang, Wenqian Li, and Yunlei Zhao
A reduced set of submatrices for a faster evaluation of the MDS property of a circulant matrix with entries that are powers of two
Dragan Lambić
Dragan Lambić
Kirby: A Robust Permutation-Based PRF Construction
Charlotte Lefevre, Yanis Belkheyar, and Joan Daemen
Charlotte Lefevre, Yanis Belkheyar, and Joan Daemen
Accountable Decryption made Formal and Practical
Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qi Wang, and Mark Ryan
Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qi Wang, and Mark Ryan
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees
Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, and Helger Lipmaa
Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, and Helger Lipmaa
Threshold Implementations with Non-Uniform Inputs
Siemen Dhooghe and Artemii Ovchinnikov
Siemen Dhooghe and Artemii Ovchinnikov
On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus
Jacob D. Leshno, Rafael Pass, and Elaine Shi
Jacob D. Leshno, Rafael Pass, and Elaine Shi
OPTIKS: An Optimized Key Transparency System
Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, and Radames Cruz Moreno
Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, and Radames Cruz Moreno
Leakage-Free Probabilistic Jasmin Programs
José Bacelar Almeida, Denis Firsov, Tiago Oliveira, and Dominique Unruh
José Bacelar Almeida, Denis Firsov, Tiago Oliveira, and Dominique Unruh
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Marcel Tiepelt, Edward Eaton, and Douglas Stebila
Marcel Tiepelt, Edward Eaton, and Douglas Stebila
List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, and Hendrik Waldner
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, and Hendrik Waldner
Lower bound of costs of formulas to compute image curves of $3$-isogenies in the framework of generalized Montgomery coordinates
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi
Towards Practical Doubly-Efficient Private Information Retrieval
Hiroki Okada, Rachel Player, Simon Pohmann, and Christian Weinert
Hiroki Okada, Rachel Player, Simon Pohmann, and Christian Weinert
Efficient and Usable Coercion-Resistant E-Voting on the Blockchain
Neyire Deniz Sarier
Neyire Deniz Sarier
Provable Dual Attacks on Learning with Errors
Amaury Pouly and Yixin Shen
Amaury Pouly and Yixin Shen
Efficient Agreement Over Byzantine Gossip
Ran Cohen, Julian Loss, and Tal Moran
Ran Cohen, Julian Loss, and Tal Moran
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram
Tomoki Moriya
Tomoki Moriya
PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber
Konstantina Miteloudi, Joppe Bos, Olivier Bronchain, Björn Fay, and Joost Renes
Konstantina Miteloudi, Joppe Bos, Olivier Bronchain, Björn Fay, and Joost Renes
Algebraic Group Model with Oblivious Sampling
Helger Lipmaa, Roberto Parisella, and Janno Siim
Helger Lipmaa, Roberto Parisella, and Janno Siim
zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs
Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, and Michele Orrù
Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, and Michele Orrù
(In)security of stream ciphers against quantum annealing attacks on the example of the Grain 128 and Grain 128a ciphers
Michał Wroński, Elżbieta Burek, and Mateusz Leśniak
Michał Wroński, Elżbieta Burek, and Mateusz Leśniak
Space-Efficient and Noise-Robust Quantum Factoring
Seyoon Ragavan and Vinod Vaikuntanathan
Seyoon Ragavan and Vinod Vaikuntanathan
Holographic SNARGs for P and Batch-NP from (Polynomially Hard) Learning with Errors
Susumu Kiyoshima
Susumu Kiyoshima
Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership
David Pointcheval
David Pointcheval
LWE with Quantum Amplitudes: Algorithm, Hardness, and Oblivious Sampling
Yilei Chen, Zihan Hu, Qipeng Liu, Han Luo, and Yaxin Tu
Yilei Chen, Zihan Hu, Qipeng Liu, Han Luo, and Yaxin Tu
A note on ``authenticated key agreement protocols for dew-assisted IoT systems''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
A Privacy-preserving Central Bank Ledger for Central Bank Digital Currency
Chan Wang Mong Tikvah
Chan Wang Mong Tikvah
Key Committing Security Analysis of AEGIS
Takanori Isobe and Mostafizar Rahman
Takanori Isobe and Mostafizar Rahman
Committing authenticated encryption based on SHAKE
Joan Daemen, Silvia Mella, and Gilles Van Assche
Joan Daemen, Silvia Mella, and Gilles Van Assche
Measuring the Concentration of Control in Contemporary Ethereum
Simon Brown
Simon Brown
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
Jiayu Zhang
Subversion-Resilient Signatures without Random Oracles
Pascal Bemmann, Sebastian Berndt, and Rongmao Chen
Pascal Bemmann, Sebastian Berndt, and Rongmao Chen
Formulations and Constructions of Remote State Preparation with Verifiability, with Applications
Jiayu Zhang
Jiayu Zhang
To Broadcast or Not to Broadcast: Decision-Making Strategies for Mining Empty Blocks
Chon Kit Lao, Rui Jiang, Luyao Zhang, Fan Zhang, and Ye Wang
Chon Kit Lao, Rui Jiang, Luyao Zhang, Fan Zhang, and Ye Wang
SCALLOP-HD: group action from 2-dimensional isogenies
Mingjie Chen, Antonin Leroux, and Lorenz Panny
Mingjie Chen, Antonin Leroux, and Lorenz Panny
A Novel Mathematical Formal Proof in Unreliability Protocol with XOR in Two's Complement System
Chenglian Liu and Sonia Chien-I Chen
Chenglian Liu and Sonia Chien-I Chen
RC4OK. An improvement of the RC4 stream cipher
Khovayko O. and Schelkunov D.
Khovayko O. and Schelkunov D.
How to Physically Hold Your Bitcoins ?
Houda Ferradi, Antoine Houssais, and David Naccache
Houda Ferradi, Antoine Houssais, and David Naccache
Blind signatures from Zero knowledge in the Kummer variety
Paulo L. Barreto, Devin D. Reich, Marcos A. Simplicio Jr., and Gustavo H. M. Zanon
Paulo L. Barreto, Devin D. Reich, Marcos A. Simplicio Jr., and Gustavo H. M. Zanon
Lower Bounds on Anonymous Whistleblowing
Willy Quach, LaKyah Tyner, and Daniel Wichs
Willy Quach, LaKyah Tyner, and Daniel Wichs
Twinkle: Threshold Signatures from DDH with Full Adaptive Security
Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, and Chenzhi Zhu
Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, and Chenzhi Zhu
A Total Break of the Scrap Digital Signature Scheme
Daniel Smith-Tone
Daniel Smith-Tone
The Pre-Shared Key Modes of HPKE
Joël Alwen, Jonas Janneck, Eike Kiltz, and Benjamin Lipp
Joël Alwen, Jonas Janneck, Eike Kiltz, and Benjamin Lipp
Rational Broadcast Protocols against Timid Adversaries
Keigo Yamashita and Kenji Yasunaga
Keigo Yamashita and Kenji Yasunaga
Succinct Proofs and Linear Algebra
Alex Evans and Guillermo Angeris
Alex Evans and Guillermo Angeris
G+G: A Fiat-Shamir Lattice Signature Based on Convolved Gaussians
Julien Devevey, Alain Passelègue, and Damien Stehlé
Julien Devevey, Alain Passelègue, and Damien Stehlé
Auditable Obfuscation
Shalini Banerjee and Steven D. Galbraith
Shalini Banerjee and Steven D. Galbraith
Tropical cryptography III: digital signatures
Jiale Chen, Dima Grigoriev, and Vladimir Shpilrain
Jiale Chen, Dima Grigoriev, and Vladimir Shpilrain
Efficacy and Mitigation of the Cryptanalysis on AIM
Seongkwang Kim, Jincheol Ha, Mincheol Son, and Byeonghak Lee
Seongkwang Kim, Jincheol Ha, Mincheol Son, and Byeonghak Lee
Cicada: A framework for private non-interactive on-chain auctions and voting
Noemi Glaeser, István András Seres, Michael Zhu, and Joseph Bonneau
Noemi Glaeser, István András Seres, Michael Zhu, and Joseph Bonneau
Naysayer proofs
István András Seres, Noemi Glaeser, and Joseph Bonneau
István András Seres, Noemi Glaeser, and Joseph Bonneau
NTRU in Quaternion Algebras of Bounded Discriminant
Cong Ling and Andrew Mendelsohn
Cong Ling and Andrew Mendelsohn
Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer
Cyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, and Barry van Leeuwen
Cyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, and Barry van Leeuwen
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions
Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, and Ngoc Khanh Nguyen
Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, and Ngoc Khanh Nguyen
QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras
Kohei Nakagawa and Hiroshi Onuki
Kohei Nakagawa and Hiroshi Onuki
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, and Takashi Nishide
Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, and Takashi Nishide
On Black-Box Verifiable Outsourcing
Amit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, and Peter Rindal
Amit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, and Peter Rindal
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search
Dominique Dittert, Thomas Schneider, and Amos Treiber
Dominique Dittert, Thomas Schneider, and Amos Treiber
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols
Daniele Cozzo and Emanuele Giunta
Daniele Cozzo and Emanuele Giunta
Aurora: Leaderless State-Machine Replication with High Throughput
Hao Lu, Jian Liu, and Kui Ren
Hao Lu, Jian Liu, and Kui Ren
High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application
Rashmi Agrawal, Jung Ho Ahn, Flavio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, and Wen Wang
Rashmi Agrawal, Jung Ho Ahn, Flavio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, and Wen Wang
Do Private Transaction Pools Mitigate Frontrunning Risk?
Agostino Capponi, Ruizhe Jia, and Ye Wang
Agostino Capponi, Ruizhe Jia, and Ye Wang
Rigorous Foundations for Dual Attacks in Coding Theory
Charles Meyer-Hilfiger and Jean-Pierre Tillich
Charles Meyer-Hilfiger and Jean-Pierre Tillich
Identity-Based Threshold Signatures from Isogenies
Shahla Atapoor
Shahla Atapoor
A Further Study of Vectorial Dual-Bent Functions
Jiaxin Wang, Fang-Wei Fu, Yadi Wei, and Jing Yang
Jiaxin Wang, Fang-Wei Fu, Yadi Wei, and Jing Yang
Provable Security Analysis of the Secure Remote Password Protocol
Dennis Dayanikli and Anja Lehmann
Dennis Dayanikli and Anja Lehmann
The Generating Series of Support Minors MinRank Ideals
Daniel Smith-Tone
Daniel Smith-Tone
Efficient Secure Two Party ECDSA
Sermin Kocaman and Younes Talibi Alaoui
Sermin Kocaman and Younes Talibi Alaoui
Scalable Off-Chain Auctions
Mohsen Minaei, Duc V. Le, Ranjit Kumaresan, Andrew Beams, Pedro Moreno-Sanchez, Yibin Yang, Srinivasan Raghuraman, Panagiotis Chatzigiannis, and Mahdi Zamani
Mohsen Minaei, Duc V. Le, Ranjit Kumaresan, Andrew Beams, Pedro Moreno-Sanchez, Yibin Yang, Srinivasan Raghuraman, Panagiotis Chatzigiannis, and Mahdi Zamani
Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies
Qinggan Fu, Ye Luo, Qianqian Yang, and Ling Song
Qinggan Fu, Ye Luo, Qianqian Yang, and Ling Song
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
Jules Maire and Damien Vergnaud
Jules Maire and Damien Vergnaud
Counting Unpredictable Bits: A Simple PRG from One-way Functions
Noam Mazor and Rafael Pass
Noam Mazor and Rafael Pass
Post-Quantum Fully Homomorphic Encryption with Group Ring Homomorphisms
Christopher Leonardi and Maya Gusak
Christopher Leonardi and Maya Gusak
Truncated Differential Cryptanalysis: New Insights and Application to QARMAv1-n and QARMAv2-64
Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, and María Naya-Plasencia
Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, and María Naya-Plasencia
The supersingular endomorphism ring problem given one endomorphism
Arthur Herlédan Le Merdy and Benjamin Wesolowski
Arthur Herlédan Le Merdy and Benjamin Wesolowski
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
Shuichi Katsumata, Michael Reichle, and Yusuke Sakai
Shuichi Katsumata, Michael Reichle, and Yusuke Sakai
HE$^3$DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption
Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, and Zhenyu Guan
Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, and Zhenyu Guan
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, and Jianwei Liu
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, and Jianwei Liu
On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions
Akshima, Xiaoqi Duan, Siyao Guo, and Qipeng Liu
Akshima, Xiaoqi Duan, Siyao Guo, and Qipeng Liu
Security with Functional Re-Encryption from CPA
Yevgeniy Dodis, Shai Halevi, and Daniel Wichs
Yevgeniy Dodis, Shai Halevi, and Daniel Wichs
Everlasting ROBOT: the Marvin Attack
Hubert Kario
Hubert Kario
Out of the Box Testing
Hubert Kario
Hubert Kario
Comment on Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
Chenglian Liu and Sonia Chien-I Chen
Chenglian Liu and Sonia Chien-I Chen
Dynamic Security Aspects of Onion Routing
Alessandro Melloni, Martijn Stam, and Øyvind Ytrehus
Alessandro Melloni, Martijn Stam, and Øyvind Ytrehus
Private Web Search with Tiptoe
Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, and Nickolai Zeldovich
Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, and Nickolai Zeldovich
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates
YongRyeol Choi, MinGi Kim, YoungBeom Kim, JinGyo Song, JaeHwan Jin, HeeSeok Kim, and Seog Chung Seo
YongRyeol Choi, MinGi Kim, YoungBeom Kim, JinGyo Song, JaeHwan Jin, HeeSeok Kim, and Seog Chung Seo
Cryptanalysis of Elisabeth-4
Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, and Jean-René Reinhard
Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, and Jean-René Reinhard
Identity-Based Matchmaking Encryption, Revisited: Improved Constructions with Strong Security
Sohto Chiku, Keitaro Hashimoto, Keisuke Hara, and Junji Shikata
Sohto Chiku, Keitaro Hashimoto, Keisuke Hara, and Junji Shikata
An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions
Ian McQuoid and Jiayu Xu
Ian McQuoid and Jiayu Xu
A polynomial-time attack on instances of M-SIDH and FESTA
Wouter Castryck and Frederik Vercauteren
Wouter Castryck and Frederik Vercauteren
Populating the Zoo of Rugged Pseudorandom Permutations
Jean Paul Degabriele and Vukašin Karadžić
Jean Paul Degabriele and Vukašin Karadžić
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs
Yaobin Shen, François-Xavier Standaert, and Lei Wang
Yaobin Shen, François-Xavier Standaert, and Lei Wang
A note on ``ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants
Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, and Yunlei Zhao
Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, and Yunlei Zhao
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption
Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, and Yunlei Zhao
Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, and Yunlei Zhao
Efficient Hardware RNS Decomposition for Post-Quantum Signature Scheme FALCON
Samuel Coulon, Pengzhou He, Tianyou Bao, and Jiafeng Xie
Samuel Coulon, Pengzhou He, Tianyou Bao, and Jiafeng Xie
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Aysajan Abidin, Erik Pohle, and Bart Preneel
Aysajan Abidin, Erik Pohle, and Bart Preneel
Popping “R-propping”: breaking hardness assumptions for matrix groups over F_{2^8}
Fernando Virdia
Fernando Virdia
PRIVATON - Privacy Preserving Automaton for Proof of Computations
Bala Subramanyan
Bala Subramanyan
Quantum Lattice Enumeration in Limited Depth
Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, and Fernando Virdia
Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, and Fernando Virdia
Tight Security Bound of 2k-LightMAC Plus
Nilanjan Datta, Avijit Dutta, and Samir Kundu
Nilanjan Datta, Avijit Dutta, and Samir Kundu
Efficient Secure Storage with Version Control and Key Rotation
Long Chen, Hui Guo, Ya-Nan Li, and Qiang Tang
Long Chen, Hui Guo, Ya-Nan Li, and Qiang Tang
Rogue-Instance Security for Batch Knowledge Proofs
Gil Segev, Amit Sharabi, and Eylon Yogev
Gil Segev, Amit Sharabi, and Eylon Yogev
Improving the Rectangle Attack on GIFT-64
Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, and Zhuohui Feng
Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, and Zhuohui Feng
Short Concurrent Covert Authenticated Key Exchange (Short cAKE)
Karim Eldafrawy, Nicholas Genise, and Stanislaw Jarecki
Karim Eldafrawy, Nicholas Genise, and Stanislaw Jarecki
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits
Qun Liu, Bart Preneel, Zheng Zhao, and Meiqin Wang
Qun Liu, Bart Preneel, Zheng Zhao, and Meiqin Wang
On Black-Box Knowledge-Sound Commit-And-Prove SNARKs
Helger Lipmaa
Helger Lipmaa
Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes
Jonathan Bootle, Sebastian Faller, Julia Hesse, Kristina Hostáková, and Johannes Ottenhues
Jonathan Bootle, Sebastian Faller, Julia Hesse, Kristina Hostáková, and Johannes Ottenhues
Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck
Yi Chen, Zhenzhen Bao, and Hongbo Yu
Yi Chen, Zhenzhen Bao, and Hongbo Yu
Scalable Multi-party Private Set Union from Multi-Query Secret-Shared Private Membership Test
Xiang Liu and Ying Gao
Xiang Liu and Ying Gao
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
Zhuang Shan, Leyou Zhang, Qing Wu, and Qiqi Lai
zk-SNARKs from Codes with Rank Metrics
Xuan-Thanh Do, Dang-Truong Mac, and Quoc-Huy Vu
Xuan-Thanh Do, Dang-Truong Mac, and Quoc-Huy Vu
Two Algorithms for Fast GPU Implementation of NTT
Ali Şah Özcan and Erkay Savaş
Ali Şah Özcan and Erkay Savaş
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith
Jonas Meers and Julian Nowakowski
Jonas Meers and Julian Nowakowski
Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques
Jianhua Wang, Lu Qin, and Baofeng Wu
Jianhua Wang, Lu Qin, and Baofeng Wu
Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities
JINGWEI HU, Junyan Chen, Wangchen Dai, and Huaxiong Wang
JINGWEI HU, Junyan Chen, Wangchen Dai, and Huaxiong Wang
Sigmabus: Binding Sigmas in Circuits for Fast Curve Operations
George Kadianakis, Mary Maller, and Andrija Novakovic
George Kadianakis, Mary Maller, and Andrija Novakovic
Lattice-based Succinct Arguments from Vanishing Polynomials
Valerio Cini, Russell W. F. Lai, and Giulio Malavolta
Valerio Cini, Russell W. F. Lai, and Giulio Malavolta
(Verifiable) Delay Functions from Lucas Sequences
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, and Tomáš Krňák
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, and Tomáš Krňák
Searching for ELFs in the Cryptographic Forest
Marc Fischlin and Felix Rohrbach
Marc Fischlin and Felix Rohrbach
Fully Homomorphic Encryption: A Mathematical Introduction
Sara Logsdon
Sara Logsdon
On the Multi-User Security of LWE-based NIKE
Roman Langrehr
Roman Langrehr
Efficient Updatable Public-Key Encryption from Lattices
Calvin Abou Haidar, Alain Passelègue, and Damien Stehlé
Calvin Abou Haidar, Alain Passelègue, and Damien Stehlé
The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
Aurel Page and Benjamin Wesolowski
Aurel Page and Benjamin Wesolowski
To attest or not to attest, this is the question – Provable attestation in FIDO2
Nina Bindel, Nicolas Gama, Sandra Guasch, and Eyal Ronen
Nina Bindel, Nicolas Gama, Sandra Guasch, and Eyal Ronen
Algebraic Attacks on Round-Reduced RAIN and Full AIM-III
Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, and Hongrui Cui
Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, and Hongrui Cui
Parallel Hardware for Isogeny-based VDF: Attacker's Perspective
David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, and Sujoy Sinha Roy
David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, and Sujoy Sinha Roy
Generic SCARE: reverse engineering without knowing the algorithm nor the machine
Ronan Lashermes and Hélène Le Bouder
Ronan Lashermes and Hélène Le Bouder
Incrementally Verifiable Computation via Rate-1 Batch Arguments
Omer Paneth and Rafael Pass
Omer Paneth and Rafael Pass
OpenVoting: Recoverability from Failures in Dual Voting
Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, and Subhashis Banerjee
Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, and Subhashis Banerjee
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead
Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, and Jian Weng
Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, and Jian Weng
More Insight on Deep Learning-aided Cryptanalysis
Zhenzhen Bao, Jinyu Lu, Yiran Yao, and Liu Zhang
Zhenzhen Bao, Jinyu Lu, Yiran Yao, and Liu Zhang
Comparse: Provably Secure Formats for Cryptographic Protocols
Théophile Wallez, Jonathan Protzenko, and Karthikeyan Bhargavan
Théophile Wallez, Jonathan Protzenko, and Karthikeyan Bhargavan
Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces
Dario Fiore, Dimitris Kolonelos, and Paola de Perthuis
Dario Fiore, Dimitris Kolonelos, and Paola de Perthuis
Sigma Protocols from Verifiable Secret Sharing and Their Applications
Min Zhang, Yu Chen, Chuanzhou Yao, and Zhichao Wang
Min Zhang, Yu Chen, Chuanzhou Yao, and Zhichao Wang
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes
Yongcheng Song, Jiang Zhang, Xinyi Huang, and Wei Wu
Yongcheng Song, Jiang Zhang, Xinyi Huang, and Wei Wu
Improving Privacy of Anonymous Proof-of-Stake Protocols
Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, and Quan Yuan
Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, and Quan Yuan
WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs
David Balbás, Daniel Collins, and Phillip Gajland
David Balbás, Daniel Collins, and Phillip Gajland
Application of Mordell-Weil lattices with large kissing numbers to acceleration of multi-scalar multiplication on elliptic curves
Dmitrii Koshelev
Dmitrii Koshelev
Registered ABE via Predicate Encodings
Ziqi Zhu, Kai Zhang, Junqing Gong, and Haifeng Qian
Ziqi Zhu, Kai Zhang, Junqing Gong, and Haifeng Qian
HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables
Charles Gouert, Dimitris Mouris, and Nektarios Georgios Tsoutsos
Charles Gouert, Dimitris Mouris, and Nektarios Georgios Tsoutsos
Sometimes You Can’t Distribute Random-Oracle-Based Proofs
Jack Doerner, Yashvanth Kondi, and Leah Namisa Rosenbloom
Jack Doerner, Yashvanth Kondi, and Leah Namisa Rosenbloom
Tighter Security for Generic Authenticated Key Exchange in the QROM
Jiaxin Pan, Benedikt Wagner, and Runzhi Zeng
Jiaxin Pan, Benedikt Wagner, and Runzhi Zeng
GLEVIAN and VIGORNIAN: Robust beyond-birthday AEAD modes
Peter Campbell
Peter Campbell
Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography
Benny Applebaum and Oded Nir
Benny Applebaum and Oded Nir
Janus: Fast Privacy-Preserving Data Provenance For TLS 1.3
Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, and Sebastian Steinhorst
Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, and Sebastian Steinhorst
Bootstrapping Homomorphic Encryption via Functional Encryption
Nir bitansky and Tomer Solomon
Nir bitansky and Tomer Solomon
DeepCover DS28C36: A Hardware Vulnerability Identification and Exploitation Using T-Test and Double Laser Fault Injection
Karim M. Abdellatif and Olivier Hériveaux
Karim M. Abdellatif and Olivier Hériveaux
On Weighted-Sum Orthogonal Latin Squares and Secret Sharing
Koji Nuida and Tomoko Adachi
Koji Nuida and Tomoko Adachi
Reframing and Extending the Random Probing Expandibility to Make Probing-Secure Compilers Tolerate a Constant Noise
Giuseppe Manzoni
Giuseppe Manzoni
Cryptographic Key Exchange: An Innovation Outlook
Gideon Samid
Gideon Samid
Oracle Recording for Non-Uniform Random Oracles, and its Applications
Minki Hhan and Aaram Yun
Minki Hhan and Aaram Yun
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals
Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, and Benjamin Wesolowski
Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, and Benjamin Wesolowski
Ramp hyper-invertible matrices and their applications to MPC protocols
Hongqing Liu, Chaoping Xing, Yanjiang Yang, and Chen Yuan
Hongqing Liu, Chaoping Xing, Yanjiang Yang, and Chen Yuan
Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model
Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch, and Alexander Wiesmaier
Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch, and Alexander Wiesmaier
Practical Constructions for Single Input Functionality against a Dishonest Majority
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, and Kui Ren
Compact Frequency Estimators in Adversarial Environments
Sam A. Markelon, Mia Filić, and Thomas Shrimpton
Sam A. Markelon, Mia Filić, and Thomas Shrimpton
On The Black-Box Complexity of Correlation Intractability
Nico Döttling and Tamer Mour
Nico Döttling and Tamer Mour
Convex Consensus with Asynchronous Fallback
Andrei Constantinescu, Diana Ghinea, Roger Wattenhofer, and Floris Westermann
Andrei Constantinescu, Diana Ghinea, Roger Wattenhofer, and Floris Westermann
Amortized NISC over $\mathbb{Z}_{2^k}$ from RMFE
Fuchun Lin, Chaoping Xing, Yizhou Yao, and Chen Yuan
Fuchun Lin, Chaoping Xing, Yizhou Yao, and Chen Yuan
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
David Fifield
David Fifield
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, and Bart Preneel
Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, and Bart Preneel
Payment Splitting in Lightning Network as a Mitigation Against Balance Discovery Attacks
Gijs van Dam
Gijs van Dam
Automated Meet-in-the-Middle Attack Goes to Feistel
Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, and Xiaoyun Wang
Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, and Xiaoyun Wang
The Locality of Memory Checking
Weijie Wang, Yujie Lu, Charalampos Papamanthou, and Fan Zhang
Weijie Wang, Yujie Lu, Charalampos Papamanthou, and Fan Zhang
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
Koustabh Ghosh, Parisa Amiri Eliasi, and Joan Daemen
Koustabh Ghosh, Parisa Amiri Eliasi, and Joan Daemen
Small Private Key Attack Against a Family of RSA-like Cryptosystems
George Teseleanu and Paul Cotan
George Teseleanu and Paul Cotan
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations
Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, and Xiaolei Dong
Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, and Xiaolei Dong
Privacy Preserving Feature Selection for Sparse Linear Regression
Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, and Zohar Yakhini
Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, and Zohar Yakhini
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis
Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, and Mingsheng Wang
Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, and Mingsheng Wang
ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations for High-Order avalanche Tests
Emanuele Bellini, Juan Grados, Mohamed Rachidi, Nitin Satpute, Joan Daemen, and Solane Elhirch
Emanuele Bellini, Juan Grados, Mohamed Rachidi, Nitin Satpute, Joan Daemen, and Solane Elhirch
Bicameral and Auditably Private Signatures
Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, and Yanhong Xu
Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, and Yanhong Xu
On the Security of KZG Commitment for VSS
Atsuki Momose, Sourav Das, and Ling Ren
Atsuki Momose, Sourav Das, and Ling Ren
Communication Lower Bounds of Key-Agreement Protocols via Density Increment Arguments
Mi-Ying (Miryam) Huang, Xinyu Mao, Guangxu Yang, and Jiapeng Zhang
Mi-Ying (Miryam) Huang, Xinyu Mao, Guangxu Yang, and Jiapeng Zhang
Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons
Renas Bacho and Julian Loss
Renas Bacho and Julian Loss
Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation
Aydin Abadi
Aydin Abadi
Street Rep: A Privacy-Preserving Reputation Aggregation System
Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, and Giovanni Vigna
Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, and Giovanni Vigna
Experimenting with Zero-Knowledge Proofs of Training
Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, and Mingyuan Wang
Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, and Mingyuan Wang
Analyzing the Real-World Security of the Algorand Blockchain
Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, and Tal Rabin
Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, and Tal Rabin
Universally Composable Auditable Surveillance
Valerie Fetzer, Michael Klooß, Jörn Müller-Quade, Markus Raiber, and Andy Rupp
Valerie Fetzer, Michael Klooß, Jörn Müller-Quade, Markus Raiber, and Andy Rupp
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing
David Balbás, Dario Fiore, Maria Isabel González Vasco, Damien Robissout, and Claudio Soriente
David Balbás, Dario Fiore, Maria Isabel González Vasco, Damien Robissout, and Claudio Soriente
Combined Private Circuits - Combined Security Refurbished
Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, and François-Xavier Standaert
Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, and François-Xavier Standaert
Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks
Sıla ÖZEREN and Oğuz YAYLA
Sıla ÖZEREN and Oğuz YAYLA
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains
Aniket Kate, Easwar Vivek Mangipudi, Siva Mardana, and Pratyay Mukherjee
Aniket Kate, Easwar Vivek Mangipudi, Siva Mardana, and Pratyay Mukherjee
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning
Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, and Ari Juels
Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, and Ari Juels
SoK: Public Key Encryption with Openings
Carlo Brunetta, Hans Heum, and Martijn Stam
Carlo Brunetta, Hans Heum, and Martijn Stam
Riggs: Decentralized Sealed-Bid Auctions
Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, and David Mazières
Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, and David Mazières
Antrag: Annular NTRU Trapdoor Generation
Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, and Alexandre Wallet
Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, and Alexandre Wallet
A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange
Jiaxin Pan and Runzhi Zeng
Jiaxin Pan and Runzhi Zeng
Neutrosophic Boolean Function and Rejection Sampling in Post Quantum Cryptography
Shashi Kant Pandey
Shashi Kant Pandey
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem
Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, and Abhishek Jain
Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, and Abhishek Jain
Pantheon: Private Retrieval from Public Key-Value Store
Ishtiyaque Ahmad, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta
Ishtiyaque Ahmad, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta
Notes on Small Private Key Attacks on Common Prime RSA
Mengce Zheng
Mengce Zheng
Layered Symbolic Security Analysis in DY$^\star$
Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, and Tim Würtele
Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, and Tim Würtele
Optimizing HE operations via Level-aware Key-switching Framework
Intak Hwang, Jinyeong Seo, and Yongsoo Song
Intak Hwang, Jinyeong Seo, and Yongsoo Song
Fine-Grained Secure Attribute-Based Encryption
Yuyu Wang, Jiaxin Pan, and Yu Chen
Yuyu Wang, Jiaxin Pan, and Yu Chen
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs
Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, and Dawu Gu
Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, and Dawu Gu
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
Florian Helmschmidt, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Clara Waldmann, and Tim Würtele
Florian Helmschmidt, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Clara Waldmann, and Tim Würtele
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
Yunxiao Zhou, Shengli Liu, Shuai Han, and Haibin Zhang
Yunxiao Zhou, Shengli Liu, Shuai Han, and Haibin Zhang
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks
Thomas Chamelot, Damien Couroussé, and Karine Heydemann
Thomas Chamelot, Damien Couroussé, and Karine Heydemann
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge
Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, and Vitor Pereira
Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, and Vitor Pereira
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
Jiaxin Pan, Benedikt Wagner, and Runzhi Zeng
Jiaxin Pan, Benedikt Wagner, and Runzhi Zeng
Practical Privacy-Preserving Machine Learning using Fully Homomorphic Encryption
Michael Brand and Gaëtan Pradel
Michael Brand and Gaëtan Pradel
On the Black-Box Separation Between Ring Signatures and Public Key Encryptions
Kyosuke Yamashita and Keisuke Hara
Kyosuke Yamashita and Keisuke Hara
Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption
Kamil Doruk Gur, Jonathan Katz, and Tjerand Silde
Kamil Doruk Gur, Jonathan Katz, and Tjerand Silde
Pisces: Private and Compliable Cryptocurrency Exchange
Ya-Nan Li, Tian Qiu, and Qiang Tang
Ya-Nan Li, Tian Qiu, and Qiang Tang
Communication Lower Bounds for Cryptographic Broadcast Protocols
Erica Blum, Elette Boyle, Ran Cohen, and Chen-Da Liu-Zhang
Erica Blum, Elette Boyle, Ran Cohen, and Chen-Da Liu-Zhang
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures
Erkan Tairi, Pedro Moreno-Sanchez, and Clara Schneidewind
Erkan Tairi, Pedro Moreno-Sanchez, and Clara Schneidewind
Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24
Gregor Leander, Shahram Rasoolzadeh, and Lukas Stennes
Gregor Leander, Shahram Rasoolzadeh, and Lukas Stennes
Hashing into quadratic residues modulo a safe prime composite
Sietse Ringers
Sietse Ringers
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA
Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, and Chengru Zhang
Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, and Chengru Zhang
Are continuous stop-and-go mixnets provably secure?
Debajyoti Das, Claudia Diaz, Aggelos Kiayias, and Thomas Zacharias
Debajyoti Das, Claudia Diaz, Aggelos Kiayias, and Thomas Zacharias
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE
Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, and Debdeep Mukhopadhyay
Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, and Debdeep Mukhopadhyay
A Lattice-based Publish-Subscribe Communication Protocol using Accelerated Homomorphic Encryption Primitives
Anes Abdennebi and Erkay Savaş
Anes Abdennebi and Erkay Savaş
How to Recover a Cryptographic Secret From the Cloud
David Adei, Chris Orsini, Alessandra Scafuro, and Tanner Verber
David Adei, Chris Orsini, Alessandra Scafuro, and Tanner Verber
Constant-Round Private Decision Tree Evaluation for Secret Shared Data
Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, and Kazunari Tozawa
Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, and Kazunari Tozawa
Single-query Quantum Hidden Shift Attacks
Xavier Bonnetain and André Schrottenloher
Xavier Bonnetain and André Schrottenloher
About “$k$-bit security” of MACs based on hash function Streebog
Vitaly Kiryukhin
Vitaly Kiryukhin
Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping
Hiroki Okada, Rachel Player, and Simon Pohmann
Hiroki Okada, Rachel Player, and Simon Pohmann
On security aspects of CRISP
Vitaly Kiryukhin
Vitaly Kiryukhin
Revisiting the Differential Meet-In-The-Middle Cryptanalysis
Ling Song, Qianqian Yang, and Huimin Liu
Ling Song, Qianqian Yang, and Huimin Liu
Short Paper: Accountable Safety Implies Finality
Joachim Neu, Ertem Nusret Tas, and David Tse
Joachim Neu, Ertem Nusret Tas, and David Tse
Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix’ Core
Martin R. Albrecht, Benjamin Dowling, and Daniel Jones
Martin R. Albrecht, Benjamin Dowling, and Daniel Jones
A New RSA Variant Based on Elliptic Curves
Maher Boudabra and Abderrahmane Nitaj
Maher Boudabra and Abderrahmane Nitaj
NEV: Faster and Smaller NTRU Encryption using Vector Decoding
Jiang Zhang, Dengguo Feng, and Di Yan
Jiang Zhang, Dengguo Feng, and Di Yan
Entropic Quasigroup Based Secret Agreement Using Large Order Automorphisms
Daniel Nager
Daniel Nager
A note on ``blockchain-assisted authentication and key agreement scheme for fog-based smart grid''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks
Yuqing Zhao, Chun Guo, and Weijia Wang
Yuqing Zhao, Chun Guo, and Weijia Wang
PrivMail: A Privacy-Preserving Framework for Secure Emails
Gowri R Chandran, Raine Nieminen, Thomas Schneider, and Ajith Suresh
Gowri R Chandran, Raine Nieminen, Thomas Schneider, and Ajith Suresh
Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era
María Isabel González Vasco, Delaram Kahrobaei, and Eilidh McKemmie
María Isabel González Vasco, Delaram Kahrobaei, and Eilidh McKemmie
Enhancing Data Security: A Study of Grain Cipher Encryption using Deep Learning Techniques
Payal, Pooja, and Girish Mishra
Payal, Pooja, and Girish Mishra
On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited
Yupu Hu, Siyue Dong, Baocang Wang, and Xingting Dong
Yupu Hu, Siyue Dong, Baocang Wang, and Xingting Dong
Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher
Ayan Sajwan and Girish Mishra
Ayan Sajwan and Girish Mishra
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, and Ralf Kuesters
Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, and Ralf Kuesters
An erf Analog for Discrete Gaussian Sampling
Nicolas Gama, Anand Kumar Narayanan, Ryder LiuLin, and Dongze Yue
Nicolas Gama, Anand Kumar Narayanan, Ryder LiuLin, and Dongze Yue
To extend or not to extend: Agile Masking Instructions for PQC
Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, and Lucie Kogelheide
Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, and Lucie Kogelheide
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
Xiaoyang Dong, Shun Li, Phuong Pham, and Guoyan Zhang
Xiaoyang Dong, Shun Li, Phuong Pham, and Guoyan Zhang
Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns
Sujaya Maiyya, Sharath Vemula, Divyakant Agrawal, Amr El Abbadi, and Florian Kerschbaum
Sujaya Maiyya, Sharath Vemula, Divyakant Agrawal, Amr El Abbadi, and Florian Kerschbaum
Improving logarithmic derivative lookups using GKR
Shahar Papini and Ulrich Haböck
Shahar Papini and Ulrich Haböck
A Univariate Attack against the Limited-Data Instance of Ciminion
Augustin Bariant
Augustin Bariant
Proof-Carrying Data from Multi-folding Schemes
Zibo Zhou, Zongyang Zhang, Zhiyu Zhang, and Jin Dong
Zibo Zhou, Zongyang Zhang, Zhiyu Zhang, and Jin Dong
Leveraging Machine Learning for Bidding Strategies in Miner Extractable Value (MEV) Auctions
Christoffer Raun, Benjamin Estermann, Liyi Zhou, Kaihua Qin, Roger Wattenhofer, Arthur Gervais, and Ye Wang
Christoffer Raun, Benjamin Estermann, Liyi Zhou, Kaihua Qin, Roger Wattenhofer, Arthur Gervais, and Ye Wang
Quantum Security of TNT
Shuping Mao, Zhiyu Zhang, Lei Hu, Luying Li, and Peng Wang
Shuping Mao, Zhiyu Zhang, Lei Hu, Luying Li, and Peng Wang
General Non-interactive Quantum Commitments Are Compatible with Quantum Rewinding
Jun Yan
Jun Yan
Compositional Formal Verification of Zero-Knowledge Circuits
Alessandro Coglio, Eric McCarthy, Eric Smith, Collin Chin, Pranav Gaddamadugu, and Michel Dellepere
Alessandro Coglio, Eric McCarthy, Eric Smith, Collin Chin, Pranav Gaddamadugu, and Michel Dellepere
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
Anaïs Barthoulot, Olivier Blazy, and Sébastien Canard
Anaïs Barthoulot, Olivier Blazy, and Sébastien Canard
Witness Authenticating NIZKs and Applications
Hanwen Feng and Qiang Tang
Hanwen Feng and Qiang Tang
Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery
Jacqueline Brendel, Sebastian Clermont, and Marc Fischlin
Jacqueline Brendel, Sebastian Clermont, and Marc Fischlin
ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra
Antonio de la Piedra, Marloes Venema, and Greg Alpár
Antonio de la Piedra, Marloes Venema, and Greg Alpár
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees
Peter Gaži, Aggelos Kiayias, and Alexander Russell
Peter Gaži, Aggelos Kiayias, and Alexander Russell
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
Ashwin Jha, Mustafa Khairallah, Mridul Nandi, and Abishanka Saha
Ashwin Jha, Mustafa Khairallah, Mridul Nandi, and Abishanka Saha
Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs
Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, and Yupeng Zhang
Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, and Yupeng Zhang
Computational Wiretap Coding from Indistinguishability Obfuscation
Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, and Mark Zhandry
Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, and Mark Zhandry
SIGMA: Secure GPT Inference with Function Secret Sharing
Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, and Rahul Sharma
Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, and Rahul Sharma
Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders
Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, and Benjamin Wesolowski
Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, and Benjamin Wesolowski
Whipping the MAYO Signature Scheme using Hardware Platforms
Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, and Sujoy Sinha Roy
Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, and Sujoy Sinha Roy
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach
Huina Li, Le He, Shiyao Chen, Jian Guo, and Weidong Qiu
Huina Li, Le He, Shiyao Chen, Jian Guo, and Weidong Qiu
Key-Agreement with Perfect Completeness from Random Oracles
Noam Mazor
Noam Mazor
An optimization of the addition gate count in Plonkish circuits
Steve Thakur
Steve Thakur
Quantum security analysis of Wave
Johanna Loyer
Johanna Loyer
Phoenixx: Linear consensus with random sampling
David Chaum, Bernardo Cardoso, William Carter, Mario Yaksetig, and Baltasar Aroso
David Chaum, Bernardo Cardoso, William Carter, Mario Yaksetig, and Baltasar Aroso
Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing
Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, and Mehdi Tibouchi
Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, and Mehdi Tibouchi
Public-Key Encryption from Average Hard NP Language
Hongda Li, Peifang Ni, and Yao Zan
Hongda Li, Peifang Ni, and Yao Zan
Nonlinear computations on FinTracer tags
Michael Brand, Tania Churchill, and Carsten Friedrich
Michael Brand, Tania Churchill, and Carsten Friedrich
Efficient Oblivious Sorting and Shuffling for Hardware Enclaves
Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, and Ke Yi
Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, and Ke Yi
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, and Muthuramakrishnan Venkitasubramaniam
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, and Muthuramakrishnan Venkitasubramaniam
On Soundness Notions for Interactive Oracle Proofs
Alexander R. Block, Albert Garreta, Pratyush Ranjan Tiwari, and Michał Zając
Alexander R. Block, Albert Garreta, Pratyush Ranjan Tiwari, and Michał Zając
A flexible Snark via the monomial basis
Steve Thakur
Steve Thakur
LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management
Matthias Geihs and Hart Montgomery
Matthias Geihs and Hart Montgomery
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions
Aggelos Kiayias, Nikos Leonardos, and Yu Shen
Aggelos Kiayias, Nikos Leonardos, and Yu Shen
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption
Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, and Christian Rechberger
Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, and Christian Rechberger
Verifiable random function from the Deuring correspondence and higher dimensional isogenies
Antonin Leroux
Antonin Leroux
Revealable Functional Commitments: How to Partially Reveal a Secret Function
Bharath Namboothiry
Bharath Namboothiry
On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes
Kyosuke Yamashita and Keisuke Hara
Kyosuke Yamashita and Keisuke Hara
A Note on ``Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation''
Zhengjun Cao and Lihua Liu
Zhengjun Cao and Lihua Liu
Representations of Group Actions and their Applications in Cryptography
Giuseppe D'Alconzo and Antonio J. Di Scala
Giuseppe D'Alconzo and Antonio J. Di Scala
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
Cas Cremers, Alexander Dax, Charlie Jacomme, and Mang Zhao
Cas Cremers, Alexander Dax, Charlie Jacomme, and Mang Zhao
Probabilistic Related-Key Statistical Saturation Cryptanalysis
Muzhou Li, Nicky Mouha, Ling Sun, and Meiqin Wang
Muzhou Li, Nicky Mouha, Ling Sun, and Meiqin Wang
HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering
Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, and Damien Stehlé
Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, and Damien Stehlé
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements
Cas Cremers, Eyal Ronen, and Mang Zhao
Cas Cremers, Eyal Ronen, and Mang Zhao
Cascading Four Round LRW1 is Beyond Birthday Bound Secure
Nilanjan Datta, Shreya Dey, Avijit Dutta, and Sougata Mandal
Nilanjan Datta, Shreya Dey, Avijit Dutta, and Sougata Mandal
Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments
Dan Boneh, Aditi Partap, and Lior Rotem
Dan Boneh, Aditi Partap, and Lior Rotem
$\mathsf{FREPack}$: Improved SNARK Frontend for Highly Repetitive Computations
Sriram Sridhar and Yinuo Zhang
Sriram Sridhar and Yinuo Zhang
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist
Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, and Ling Qin
Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, and Ling Qin
A remark on the Independence Heuristic in the Dual Attack
Andreas Wiemers, Stephan Ehlen, and Kaveh Bashiri
Andreas Wiemers, Stephan Ehlen, and Kaveh Bashiri
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities
Hao Lei, Jiahui He, Kai Hu, and Meiqin Wang
Hao Lei, Jiahui He, Kai Hu, and Meiqin Wang
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks
Sajin Sasy, Aaron Johnson, Ian Goldberg
Sajin Sasy, Aaron Johnson, Ian Goldberg
LOL: A Highly Flexible Framework for Designing Stream Ciphers
Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, and Tian Tian
Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, and Tian Tian
Practical Key-Extraction Attacks in Leading MPC Wallets
Nikolaos Makriyannis, Oren Yomtov, and Arik Galansky
Nikolaos Makriyannis, Oren Yomtov, and Arik Galansky
Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack
Ashwin Jha, Mridul Nandi, and Abishanka Saha
Ashwin Jha, Mridul Nandi, and Abishanka Saha
Privacy-Preserving Outsourced Certificate Validation
Tarek Galal, Anja Lehmann
Tarek Galal, Anja Lehmann
PMNS revisited for consistent redundancy and equality test
Fangan Yssouf Dosso, Alexandre Berzati, Nadia El Mrabet, and Julien Proy
Fangan Yssouf Dosso, Alexandre Berzati, Nadia El Mrabet, and Julien Proy
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model
Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu
Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu
Two Remarks on Torsion-Point Attacks in Isogeny-Based Cryptography
Francesco Sica
Francesco Sica
Snowblind: A Threshold Blind Signature in Pairing-Free Groups
Elizabeth Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu
Elizabeth Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
Kosei Sakamoto, Ryoma Ito, Takanori Isobe
Kosei Sakamoto, Ryoma Ito, Takanori Isobe
SoK: Privacy-Preserving Smart Contract
Huayi Qi, Minghui Xu, Dongxiao Yu, and Xiuzhen Cheng
Huayi Qi, Minghui Xu, Dongxiao Yu, and Xiuzhen Cheng
One-Message Secure Reductions: On the Cost of Converting Correlations
Yuval Ishai, Mahimna Kelkar, Varun Narayanan, Liav Zafar
Yuval Ishai, Mahimna Kelkar, Varun Narayanan, Liav Zafar
Theoretical analysis of decoding failure rate of non-binary QC-MDPC codes
Kirill Vedenev, Yury Kosolapov
Kirill Vedenev, Yury Kosolapov
Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes
Johannes Mono, Kamil Kluczniak, and Tim Güneysu
Johannes Mono, Kamil Kluczniak, and Tim Güneysu
Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers
Zhipeng Wang, Marko Cirkovic, Duc V. Le, William Knottenbelt, and Christian Cachin
Zhipeng Wang, Marko Cirkovic, Duc V. Le, William Knottenbelt, and Christian Cachin
Non-distributable key-sharing protocol with particular emphasis on the Internet of Things
Mario Mastriani
Mario Mastriani
Quasilinear Masking to Protect ML-KEM Against Both SCA and FIA
Pierre-Augustin Berthet, Yoan Rougeolle, Cédric Tavernier, Jean-Luc Danger, and Laurent Sauvage
Pierre-Augustin Berthet, Yoan Rougeolle, Cédric Tavernier, Jean-Luc Danger, and Laurent Sauvage
A Note on “Secure Quantized Training for Deep Learning”
Marcel Keller, Ke Sun
Marcel Keller, Ke Sun
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery
Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, and Philipp Jovanovic
Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, and Philipp Jovanovic
Jolt: SNARKs for Virtual Machines via Lookups
Arasu Arun, Srinath Setty, Justin Thaler
Arasu Arun, Srinath Setty, Justin Thaler
Unlocking the lookup singularity with Lasso
Srinath Setty, Justin Thaler, Riad Wahby
Srinath Setty, Justin Thaler, Riad Wahby
Authentica: A Secure Authentication Mechanism using a Software-defined Unclonable Function
Ripon Patgiri and Laiphrakpam Dolendro Singh
Ripon Patgiri and Laiphrakpam Dolendro Singh
Verifiable Verification in Cryptographic Protocols
Marc Fischlin, Felix Günther
Marc Fischlin, Felix Günther
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme
Rei Ueno, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu
Rei Ueno, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu
CLRW1$^{3}$ is not Secure Beyond the Birthday Bound: Breaking TNT with ${O(2^{n/2})}$ queries
Mustafa Khairallah
Mustafa Khairallah
Optimal Flexible Consensus and its Application to Ethereum
Joachim Neu, Srivatsan Sridhar, Lei Yang, and David Tse
Joachim Neu, Srivatsan Sridhar, Lei Yang, and David Tse
Decentralized Finance (DeFi): A Survey
Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, and Yanran Zhang
Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, and Yanran Zhang
Infinite families of minimal binary codes via Krawtchouk polynomials
Xiaoni Du, René Rodríguez, Hao Wu
Xiaoni Du, René Rodríguez, Hao Wu
Mutator Sets and their Application to Scalable Privacy
Alan Szepieniec, Thorkil Værge
Alan Szepieniec, Thorkil Værge
DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions
Ding Feng, Rupert Hitsch, Kaihua Qin, Arthur Gervais, Roger Wattenhofer, Yaxing Yao, Ye Wang
Ding Feng, Rupert Hitsch, Kaihua Qin, Arthur Gervais, Roger Wattenhofer, Yaxing Yao, Ye Wang
Decentralized Threshold Signatures for Blockchains with Non-Interactive and Transparent Setup
Kwangsu Lee
Kwangsu Lee
On the security of REDOG
Tanja Lange, Alex Pellegrini, and Alberto Ravagnani
Tanja Lange, Alex Pellegrini, and Alberto Ravagnani
On Fully-Secure Honest Majority MPC without $n^2$ Round Overhead
Daniel Escudero, Serge Fehr
Daniel Escudero, Serge Fehr
Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption
Ravit Geva, Alexander Gusev, Yuriy Polyakov, Lior Liram, Oded Rosolio, Andreea Alexandru, Nicholas Genise, Marcelo Blatt, Zohar Duchin, Barliz Waissengrin, Dan Mirelman, Felix Bukstein, Deborah T. Blumenthal, Ido Wolf, Sharon Pelles-Avraham, Tali Schaffer, Lee A. Lavi, Daniele Micciancio, Vinod Vaikuntanathan, Ahmad Al Badawi, Shafi Goldwasser
Ravit Geva, Alexander Gusev, Yuriy Polyakov, Lior Liram, Oded Rosolio, Andreea Alexandru, Nicholas Genise, Marcelo Blatt, Zohar Duchin, Barliz Waissengrin, Dan Mirelman, Felix Bukstein, Deborah T. Blumenthal, Ido Wolf, Sharon Pelles-Avraham, Tali Schaffer, Lee A. Lavi, Daniele Micciancio, Vinod Vaikuntanathan, Ahmad Al Badawi, Shafi Goldwasser
Extension of Shannon's theory of ciphers based on Latin rectangles
Karel BURDA
Karel BURDA
Privacy-preserving edit distance computation using secret-sharing two-party computation
Hernán Darío Vanegas Madrigal, Daniel Cabarcas Jaramillo, Diego F. Aranha
Hernán Darío Vanegas Madrigal, Daniel Cabarcas Jaramillo, Diego F. Aranha
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow
Sunyeop Kim, Myoungsu Shin, Seonkyu Kim, Hanbeom Shin, Insung Kim, Donggeun Kwon, Dongjae Lee, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
Sunyeop Kim, Myoungsu Shin, Seonkyu Kim, Hanbeom Shin, Insung Kim, Donggeun Kwon, Dongjae Lee, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
RSA Blind Signatures with Public Metadata
Ghous Amjad, Kevin Yeo, Moti Yung
Ghous Amjad, Kevin Yeo, Moti Yung
A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations
Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, and Abdul Rahman Taleb
Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, and Abdul Rahman Taleb
Towards a Quantum-resistant Weak Verifiable Delay Function
Thomas Decru, Luciano Maino, Antonio Sanso
Thomas Decru, Luciano Maino, Antonio Sanso
Verifiable Secret Sharing Simplified
Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, and Ling Ren
Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, and Ling Ren
PicoEMP: A Low-Cost EMFI Platform Compared to BBI and Voltage Fault Injection using TDC and External VCC Measurements
Colin O'Flynn
Colin O'Flynn
HI-Kyber: A novel high-performance implementation scheme of Kyber based on GPU
Xinyi Ji, Jiankuo Dong, Pinchang Zhang, Deng Tonggui, Hua Jiafeng, Fu Xiao
Xinyi Ji, Jiankuo Dong, Pinchang Zhang, Deng Tonggui, Hua Jiafeng, Fu Xiao
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures
Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir
Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir
CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves
Abhiram Kothapalli, Srinath Setty
Abhiram Kothapalli, Srinath Setty
Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums
Shweta Agrawal, Junichi Tomida, Anshu Yadav
Shweta Agrawal, Junichi Tomida, Anshu Yadav
REED: Chiplet-Based Accelerator for Fully Homomorphic Encryption
Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy
Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy
PAP: A Privacy-Preserving Authentication Scheme with Anonymous Payment for V2G Networks
Xiaohan Yue, Xue Bi, Haibo Yang, Shi Bai, and Yuan He
Xiaohan Yue, Xue Bi, Haibo Yang, Shi Bai, and Yuan He
A Novel CCA Attack for NTRU+ KEM
Joohee Lee, Minju Lee, Hansol Ryu, and Jaehui Park
Joohee Lee, Minju Lee, Hansol Ryu, and Jaehui Park
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
Faster cellular automata cryptosystems with neighbor sequences
Kittiphop Phalakarn, Athasit Surarerks
Kittiphop Phalakarn, Athasit Surarerks
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More
Nan Wang, Sid Chi-Kin Chau, and Dongxi Liu
Nan Wang, Sid Chi-Kin Chau, and Dongxi Liu
STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber
Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, and Shivam Bhasin
Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, and Shivam Bhasin
Delegated Time-Lock Puzzle
Aydin Abadi, Dan Ristea, Steven J. Murdoch
Aydin Abadi, Dan Ristea, Steven J. Murdoch
Long Paper: Provable Secure Parallel Gadgets
Francesco Berti, Sebastian Faust, and Maximilian Orlt
Francesco Berti, Sebastian Faust, and Maximilian Orlt
A Relational Credential System from $q$-SDH-based Graph Signatures
Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
Exploring Blockchain Technology through a Modular Lens: A Survey
Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng
Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng
A Systematic Study of Data Augmentation for Protected AES Implementations
Huimin Li, Guilherme Perin
Huimin Li, Guilherme Perin
Towards Open Scan for the Open-source Hardware
Leonid Azriel, Avi Mendelson
Leonid Azriel, Avi Mendelson
DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing
Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich
Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich
Composable Oblivious Pseudo-Random Functions via Garbled Circuits
Sebastian Faller, Astrid Ottenhues, and Johannes Ottenhues
Sebastian Faller, Astrid Ottenhues, and Johannes Ottenhues
Fast batched asynchronous distributed key generation
Jens Groth and Victor Shoup
Jens Groth and Victor Shoup
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training
Haochen Sun, Tonghe Bai, Jason Li, and Hongyang Zhang
Haochen Sun, Tonghe Bai, Jason Li, and Hongyang Zhang
Round-Optimal Black-Box MPC in the Plain Model
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Communication and Round Efficient Parallel Broadcast Protocols
Ittai Abraham, Kartik Nayak, Nibesh Shrestha
Ittai Abraham, Kartik Nayak, Nibesh Shrestha
Arena: Multi-leader Synchronous Byzantine Fault Tolerance
Hao Lu, Jian Liu, Kui Ren
Hao Lu, Jian Liu, Kui Ren
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH
Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar
Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura
Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
Constructive $t$-secure Homomorphic Secret Sharing for Low Degree Polynomials
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
Malicious Secure, Structure-Aware Private Set Intersection
Gayathri Garimella, Mike Rosulek, Jaspal Singh
Gayathri Garimella, Mike Rosulek, Jaspal Singh
On the Security of Universal Re-Encryption
Fabio Banfi, Ueli Maurer, Silvia Ritsch
Fabio Banfi, Ueli Maurer, Silvia Ritsch
Swiper: a new paradigm for efficient weighted distributed protocols
Andrei Tonkikh and Luciano Freitas
Andrei Tonkikh and Luciano Freitas
Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach
Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
Reduction of Search-LWE Problem to Integer Programming Problem
Masaaki Shirase
Masaaki Shirase
Benchmarking the Setup of Updatable zk-SNARKs
Karim Baghery, Axel Mertens, Mahdi Sedaghat
Karim Baghery, Axel Mertens, Mahdi Sedaghat
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test
Yan Yan, Arnab Roy, and Elisabeth Oswald
Yan Yan, Arnab Roy, and Elisabeth Oswald
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction
Huan Zou, Yuting Xiao, and Rui Zhang
Huan Zou, Yuting Xiao, and Rui Zhang
Improved Polynomial Secret-Sharing Schemes
Amos Beimel, Oriol Farràs, and Or Lasri
Amos Beimel, Oriol Farràs, and Or Lasri
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
Melanie Jauch, Varun Maram
Melanie Jauch, Varun Maram
Instant Zero Knowledge Proof of Reserve
Trevor Conley, Nilsso Diaz, Diego Espada, Alvin Kuruvilla, Stenton Mayone, and Xiang Fu
Trevor Conley, Nilsso Diaz, Diego Espada, Alvin Kuruvilla, Stenton Mayone, and Xiang Fu
Secure Function Extensions to Additively Homomorphic Cryptosystems
Mounika Pratapa and Aleksander Essex
Mounika Pratapa and Aleksander Essex
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application
Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar
Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar
A Multivariate Based Provably Secure Certificateless Signature Scheme with Applications to the Internet of Medical Things
Vikas Srivastava, Sumit Kumar Debnath
Vikas Srivastava, Sumit Kumar Debnath
Haze and Daze: Compliant Privacy Mixers
Stanislaw Baranski, Maya Dotan, Ayelet Lotem, and Margarita Vald
Stanislaw Baranski, Maya Dotan, Ayelet Lotem, and Margarita Vald
High-speed Implementation of AIM symmetric primitives within AIMer digital signature
Minwoo Lee, Kyungbae Jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Hwajeong Seo
Minwoo Lee, Kyungbae Jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Hwajeong Seo
Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2
Gyeongju Song, Siwoo Eum, Hyeokdong Kwon, Minjoo Sim, Minwoo Lee, Hwajeong Seo
Gyeongju Song, Siwoo Eum, Hyeokdong Kwon, Minjoo Sim, Minwoo Lee, Hwajeong Seo
Analysis of Parallel Implementation of Pilsung Block Cipher On Graphics Processing Unit
Siwoo Eum, Hyunjun Kim, Minho Song, Hwajeong Seo
Siwoo Eum, Hyunjun Kim, Minho Song, Hwajeong Seo
Post Quantum Fuzzy Stealth Signatures and Applications
Sihang Pu, Sri AravindaKrishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik
Sihang Pu, Sri AravindaKrishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik
CipherGPT: Secure Two-Party GPT Inference
Xiaoyang Hou, Jian Liu, Jingyu Li, Yuhan Li, Wen-jie Lu, Cheng Hong, and Kui Ren
Xiaoyang Hou, Jian Liu, Jingyu Li, Yuhan Li, Wen-jie Lu, Cheng Hong, and Kui Ren
Structured Encryption for Indirect Addressing
Ruth Ng, Alexander Hoover, David Cash, Eileen Ee
Ruth Ng, Alexander Hoover, David Cash, Eileen Ee
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs.
Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, and Pierre Meyer
Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, and Pierre Meyer
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing
Saba Eskandarian
Saba Eskandarian
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler
Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker
Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker
On the Efficiency of Generic, Quantum Cryptographic Constructions
Keita Xagawa
Keita Xagawa
Composable Gadgets with Reused Fresh Masks $-$ First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks
David Knichel, Amir Moradi
David Knichel, Amir Moradi
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves
Harashta Tatimma Larasati, Howon Kim
Harashta Tatimma Larasati, Howon Kim
Optimal Load-Balanced Scalable Distributed Agreement
Yuval Gelles, Ilan Komargodski
Yuval Gelles, Ilan Komargodski
Invisible Warning Line: Efficient and Generic Regulation for Anonymous Cryptocurrencies
Rui Gao
Rui Gao
A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic
Yao Sun, Shuai Chang
Yao Sun, Shuai Chang
Secure Multiparty Computation with Identifiable Abort from Vindicating Release
Ran Cohen, Jack Doerner, Yashvanth Kondi, and abhi shelat
Ran Cohen, Jack Doerner, Yashvanth Kondi, and abhi shelat
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, and Jean-Pierre Seifert
Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, and Jean-Pierre Seifert
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, and François-Xavier Standaert
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, and François-Xavier Standaert
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
Fukang Liu, Mohammad Mahzoun, Morten Øygarden, and Willi Meier
Fukang Liu, Mohammad Mahzoun, Morten Øygarden, and Willi Meier
Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme
Ali Rezapour, Zahra Ahmadian
Ali Rezapour, Zahra Ahmadian
One vector to rule them all: Key recovery from one vector in UOV schemes
Pierre Pébereau
Pierre Pébereau
Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC
Ittai Abraham, Gilad Asharov, Arpita Patra, and Gilad Stern
Ittai Abraham, Gilad Asharov, Arpita Patra, and Gilad Stern
All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M
Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, and Kazuo Sakiyama
Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, and Kazuo Sakiyama
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks
Furkan Aydin, Aydin Aysu
Furkan Aydin, Aydin Aysu
TariScript: Bringing dynamic scripting to Mimblewimble
Cayle Sharrock, Schalk van Heerden
Cayle Sharrock, Schalk van Heerden
Non-Observable Quantum Random Oracle Model
Navid Alamati, Varun Maram, Daniel Masny
Navid Alamati, Varun Maram, Daniel Masny
Finding short integer solutions when the modulus is small
Léo Ducas, Thomas Espitau, Eamonn W. Postlethwaite
Léo Ducas, Thomas Espitau, Eamonn W. Postlethwaite
An Algebraic Approach to Circulant Column Parity Mixers
Robert Christian Subroto
Robert Christian Subroto
On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key Agreement
Benedikt Auerbach, Miguel Cueto Noval, Guillermo Pascual-Perez, and Krzysztof Pietrzak
Benedikt Auerbach, Miguel Cueto Noval, Guillermo Pascual-Perez, and Krzysztof Pietrzak
Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption
Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren
Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren
SoK: Public Randomness
Alireza Kavousi, Zhipeng Wang, and Philipp Jovanovic
Alireza Kavousi, Zhipeng Wang, and Philipp Jovanovic
TVA: A multi-party computation system for secure and expressive time series analytics
Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia
Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia
Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts
Keita Emura, Kaisei Kajita, and Go Ohtake
Keita Emura, Kaisei Kajita, and Go Ohtake
Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System
Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht
Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht
Mask Compression: High-Order Masking on Memory-Constrained Devices
Markku-Juhani O. Saarinen, Mélissa Rossi
Markku-Juhani O. Saarinen, Mélissa Rossi
Applying system of equations to factor semiprime numbers
Yonatan Zilpa
Yonatan Zilpa
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
Yibin Yang and David Heath
Yibin Yang and David Heath
On iterated punctured Grover
Cezary Pilaszewicz and Marian Margraf
Cezary Pilaszewicz and Marian Margraf
Breaking the Hutton 2 challenge
Thomas Kaeding
Thomas Kaeding
Tornado Vote: Anonymous Blockchain-Based Voting
Robert Muth, Florian Tschorsch
Robert Muth, Florian Tschorsch
Optimized stream-cipher-based transciphering by means of functional-bootstrapping
Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis
Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek
Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation
Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis (Extended Version)
Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, and Guilherme Perin
Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, and Guilherme Perin
Verifiable Timed Proxy Signatures and Multi-signatures
Duygu Ozden, Oğuz Yayla
Duygu Ozden, Oğuz Yayla
ProtoGalaxy: Efficient ProtoStar-style folding of multiple instances
Liam Eagen and Ariel Gabizon
Liam Eagen and Ariel Gabizon
MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust
Tung Le, Thang Hoang
Tung Le, Thang Hoang
An Efficient Unicode encoded in UTF-16 text cryptography based on the AES algorithm
Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir
Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir
Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast
Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen
Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study
Kristian Gjøsteen, Thomas Haines, and Morten Rotvold Solberg
Kristian Gjøsteen, Thomas Haines, and Morten Rotvold Solberg
$\mathcal{S}_0$-equivalent classes, a new direction to find better weightwise perfectly balanced functions, and more
Agnese Gini, Pierrick Méaux
Agnese Gini, Pierrick Méaux
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis
Marina Krček, Lichao Wu, Guilherme Perin, Stjepan Picek
Marina Krček, Lichao Wu, Guilherme Perin, Stjepan Picek
A Digital Identity in the Hands of Swiss Citizens
Jean-Luc Beuchat and Valon Rexhepi
Jean-Luc Beuchat and Valon Rexhepi
$\textsf{Asterisk}$: Super-fast MPC with a Friend
Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, and Divya Ravi
Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, and Divya Ravi
Quantum Money from Abelian Group Actions
Mark Zhandry
Mark Zhandry
White-Box Block Cipher Implementation Based on LS-Design
Hatice Kübra Güner, Ceyda Mangır, Oğuz Yayla
Hatice Kübra Güner, Ceyda Mangır, Oğuz Yayla
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More
Xiaoyang Dong, Shun Li, Phuong Pham
Xiaoyang Dong, Shun Li, Phuong Pham
Round Optimal Fully Secure Distributed Key Generation
Jonathan Katz
Jonathan Katz
Properties of Lattice Isomorphism as a Cryptographic Group Action
Benjamin Benčina, Alessandro Budroni, Jesús-Javier Chi-Domínguez, and Mukul Kulkarni
Benjamin Benčina, Alessandro Budroni, Jesús-Javier Chi-Domínguez, and Mukul Kulkarni
The wrong use of FESTA trapdoor functions leads to an adaptive attack
Tomoki Moriya and Hiroshi Onuki
Tomoki Moriya and Hiroshi Onuki
On Derandomizing Yao's Weak-to-Strong OWF Construction
Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach
Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach
Bulletproofs With Stochastic Equation Sets
Michael Brand, Benoit Poletti
Michael Brand, Benoit Poletti
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
Shichen Wu, Puwen Wei, Ren Zhang, and Bowen Jiang
Shichen Wu, Puwen Wei, Ren Zhang, and Bowen Jiang
Building Hard Problems by Combining Easy Ones
Riddhi Ghosal and Amit Sahai
Riddhi Ghosal and Amit Sahai
Moving a Step of ChaCha in Syncopated Rhythm
Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu and Rafael Pass
Yanyi Liu and Rafael Pass
Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency
Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng
Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng
A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber
Yanning Ji, Elena Dubrova
Yanning Ji, Elena Dubrova
Keyed Sum of Permutations: a simpler RP-based PRF
Ferdinand Sibleyras, Yosuke Todo
Ferdinand Sibleyras, Yosuke Todo
Intmax2: A ZK-rollup with Minimal Onchain Data and Computation Costs Featuring Decentralized Aggregators
Erik Rybakken, Leona Hioki, and Mario Yaksetig
Erik Rybakken, Leona Hioki, and Mario Yaksetig
ARITHMETIZATION-ORIENTED APN FUNCTIONS
Lilya Budaghyan, Mohit Pal
Lilya Budaghyan, Mohit Pal
ACORN-QRE: Specification and Analysis of a Method of Generating Secure One-time Pads for Use in Encryption
Roy S Wikramaratna
Roy S Wikramaratna
Foundations of Data Availability Sampling
Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
Mathias Hall-Andersen, Mark Simkin, and Benedikt Wagner
Bypassing Android isolation with fuel gauges: new risks with advanced power ICs
Vincent Giraud, David Naccache
Vincent Giraud, David Naccache
Taming Adaptivity in YOSO Protocols: The Modular Way
Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov
Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov
Non-Interactive Threshold BBS+ From Pseudorandom Correlations
Sebastian Faust, Carmit Hazay, David Kretzler, Leandro Rometsch, and Benjamin Schlosser
Sebastian Faust, Carmit Hazay, David Kretzler, Leandro Rometsch, and Benjamin Schlosser
Streebog as a Random Oracle
Liliya Akhmetzyanova, Alexandra Babueva, Andrey Bozhko
Liliya Akhmetzyanova, Alexandra Babueva, Andrey Bozhko
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium
Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, and Christine van Vredendaal
Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, and Christine van Vredendaal
The Reality of Backdoored S-Boxes - An Eye Opener
Shah Fahd, Mehreen Afzal, Waseem Iqbal, Dawood Shah, Ijaz Khalid
Shah Fahd, Mehreen Afzal, Waseem Iqbal, Dawood Shah, Ijaz Khalid
Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets
Ling Ren, Muhammad Haris Mughees, and Sun I
Ling Ren, Muhammad Haris Mughees, and Sun I
Fiat-Shamir Security of FRI and Related SNARKs
Alexander R. Block, Albert Garreta, Jonathan Katz, Justin Thaler, Pratyush Ranjan Tiwari, and Michał Zając
Alexander R. Block, Albert Garreta, Jonathan Katz, Justin Thaler, Pratyush Ranjan Tiwari, and Michał Zając
Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments
Christian Badertscher, Mahdi Sedaghat, and Hendrik Waldner
Christian Badertscher, Mahdi Sedaghat, and Hendrik Waldner
DuckyZip: Provably Honest Global Linking Service
Nadim Kobeissi
Nadim Kobeissi
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations
Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici
Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach
Markulf Kohlweiss, Mahak Pancholi, Akira Takahashi
Markulf Kohlweiss, Mahak Pancholi, Akira Takahashi
Efficient Arguments and Proofs for Batch Arithmetic Circuit Satisfiability
Jieyi Long
Jieyi Long
A Note on ``A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Decoding Quasi-Cyclic codes is NP-complete
Ernesto Dominguez Fiallo, Pablo Freyre Arrozarena, Luis Ramiro Piñeiro
Ernesto Dominguez Fiallo, Pablo Freyre Arrozarena, Luis Ramiro Piñeiro
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More
Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, and Joe Rowell
Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, and Joe Rowell
IOPs with Inverse Polynomial Soundness Error
Gal Arnon, Alessandro Chiesa, and Eylon Yogev
Gal Arnon, Alessandro Chiesa, and Eylon Yogev
BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation
Alireza Kavousi, Duc V. Le, Philipp Jovanovic, and George Danezis
Alireza Kavousi, Duc V. Le, Philipp Jovanovic, and George Danezis
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
Pengfei Wang, Xiangyu Su, Mario Larangeira, and Keisuke Tanaka
Pengfei Wang, Xiangyu Su, Mario Larangeira, and Keisuke Tanaka
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning
Xiangyu Su, Mario Larangeira, Keisuke Tanaka
Xiangyu Su, Mario Larangeira, Keisuke Tanaka
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
Brent Waters, Daniel Wichs
Brent Waters, Daniel Wichs
ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb{Z}_{2^k}$
Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, and Titouan Tanguy
Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, and Titouan Tanguy
DIDO: Data Provenance from Restricted TLS 1.3 Websites
Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion
Trevor Yap, Shivam Bhasin, and Stjepan Picek
Trevor Yap, Shivam Bhasin, and Stjepan Picek
Quantum Complexity for Discrete Logarithms and Related Problems
Minki Hhan, Takashi Yamakawa, and Aaram Yun
Minki Hhan, Takashi Yamakawa, and Aaram Yun
ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet
Alexander Bienstock, Paul Rösler, and Yi Tang
Alexander Bienstock, Paul Rösler, and Yi Tang
A quantum algorithm for semidirect discrete logarithm problem on elliptic curves
Muhammad Imran
Muhammad Imran
Automated Analysis of Halo2 Circuits
Fatemeh Heidari Soureshjani, Mathias Hall-Andersen, MohammadMahdi Jahanara, Jeffrey Kam, Jan Gorzny, Mohsen Ahmadvand
Fatemeh Heidari Soureshjani, Mathias Hall-Andersen, MohammadMahdi Jahanara, Jeffrey Kam, Jan Gorzny, Mohsen Ahmadvand
SNARGs for Monotone Policy Batch NP
Zvika Brakerski, Maya Farber Brodsky, Yael Tauman Kalai, Alex Lombardi, Omer Paneth
Zvika Brakerski, Maya Farber Brodsky, Yael Tauman Kalai, Alex Lombardi, Omer Paneth
Public-Key Encryption, Local Pseudorandom Generators, and the Low-Degree Method
Andrej Bogdanov, Pravesh Kothari, Alon Rosen
Andrej Bogdanov, Pravesh Kothari, Alon Rosen
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption
Dominic Gold, Koray Karabina, Francis C. Motta
Dominic Gold, Koray Karabina, Francis C. Motta
Private Coin Verifiable Delay Function
Peter Chvojka
Peter Chvojka
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography
Tolun Tosun and Erkay Savas
Tolun Tosun and Erkay Savas
XHash: Efficient STARK-friendly Hash Function
Tomer Ashur, Amit Singh Bhati, Al Kindi, Mohammad Mahzoun, and Léo Perrin
Tomer Ashur, Amit Singh Bhati, Al Kindi, Mohammad Mahzoun, and Léo Perrin
AKE Zoo: 100 two-party protocols (to be continued)
Evgeny Alekseev, Alexandra Babueva, Olga Zazykina
Evgeny Alekseev, Alexandra Babueva, Olga Zazykina
An Analysis of Requirements and Privacy Threats in Mobile Data Donations
Leonie Reichert
Leonie Reichert
A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation
Ruize Wang, Martin Brisfors, Elena Dubrova
Ruize Wang, Martin Brisfors, Elena Dubrova
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance
Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak
Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak
E2E near-standard and practical authenticated transciphering
Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, and Omri Soceanu
Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, and Omri Soceanu
SoK: Privacy-Preserving Signatures
Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari
Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari
PQC Cloudization: Rapid Prototyping of Scalable NTT/INTT Architecture to Accelerate Kyber
Mojtaba Bisheh-Niasar, Daniel Lo, Anjana Parthasarathy, Blake Pelton, Bharat Pillilli, Bryan Kelly
Mojtaba Bisheh-Niasar, Daniel Lo, Anjana Parthasarathy, Blake Pelton, Bharat Pillilli, Bryan Kelly
ARC-FSM-G: Automatic Security Rule Checking for Finite State Machine at the Netlist Abstraction
Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
Reduction of the secret key length in the perfect cipher by data compression and randomisation
Boris Ryabko
Boris Ryabko
Short Signatures from Regular Syndrome Decoding in the Head
Eliana Carozza, Geoffroy Couteau, Antoine Joux
Eliana Carozza, Geoffroy Couteau, Antoine Joux
Transaction Fairness in Blockchains, Revisited
Rujia Li, Xuanwei Hu, Qin Wang, Sisi Duan, Qi Wang
Rujia Li, Xuanwei Hu, Qin Wang, Sisi Duan, Qi Wang
OWF Candidates Based on: Xors, Error Detection Codes, Permutations, Polynomials, Interaction and Nesting
Paweł Cyprys, Shlomi Dolev, and Oded Margalit
Paweł Cyprys, Shlomi Dolev, and Oded Margalit
Zero Knowledge Virtual Machine step by step
Tim Dokchitser, Alexandr Bulkin
Tim Dokchitser, Alexandr Bulkin
Security Analysis of a Color Image Encryption Scheme Based on a Fractional‑Order Hyperchaotic System
George Teseleanu
George Teseleanu
Depth-Optimized Implementation of ASCON Quantum Circuit
Yujin Oh, Kyungbae Jang, Anubhab Baksi, and Hwajeong Seo
Yujin Oh, Kyungbae Jang, Anubhab Baksi, and Hwajeong Seo
hodlCoin: A Financial Game
Joachim Zahnentferner
Joachim Zahnentferner
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation
Qi Wang, Haodong Huang, Juyan Li, and Qi Yuan
Qi Wang, Haodong Huang, Juyan Li, and Qi Yuan
State Machines across Isomorphic Layer 2 Ledgers
Maxim Jourenko, Mario Larangeira
Maxim Jourenko, Mario Larangeira
Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations
Ramiro Martínez, Paz Morillo, Sergi Rovira
Ramiro Martínez, Paz Morillo, Sergi Rovira
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, and Roman Walch
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, and Roman Walch
Timed Secret Sharing
Alireza Kavousi, Aydin Abadi, and Philipp Jovanovic
Alireza Kavousi, Aydin Abadi, and Philipp Jovanovic
An STP-based model toward designing S-boxes with good cryptographic properties
Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang
Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang
Zombie: Middleboxes that Don’t Snoop
Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, and Michael Walfish
Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, and Michael Walfish
EDEN - a practical, SNARK-friendly combinator VM and ISA
Logan Allen, Brian Klatt, Philip Quirk, Yaseen Shaikh
Logan Allen, Brian Klatt, Philip Quirk, Yaseen Shaikh
At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE
Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey
The many faces of Schnorr
Victor Shoup
Victor Shoup
SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers
Amit Jana, Anup Kumar Kundu, and Goutam Paul
Amit Jana, Anup Kumar Kundu, and Goutam Paul
Stronger Lower Bounds for Leakage-Resilient Secret Sharing
Charlotte Hoffmann and Mark Simkin
Charlotte Hoffmann and Mark Simkin
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials
Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig
Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig
Fast Unbalanced Private Computing on (Labeled) Set Intersection with Cardinality
Binbin Tu, Xiangling Zhang, Yujie Bai, and Yu Chen
Binbin Tu, Xiangling Zhang, Yujie Bai, and Yu Chen
An Efficient Data-Independent Priority Queue and its Application to Dark Pools
Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch
Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch
Best of Both Worlds: Revisiting the Spymasters Double Agent Problem
Anasuya Acharya, Carmit Hazay, Oxana Poburinnaya, and Muthuramakrishnan Venkitasubramaniam
Anasuya Acharya, Carmit Hazay, Oxana Poburinnaya, and Muthuramakrishnan Venkitasubramaniam
Arithmetic Sketching
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
A Framework for Statistically Sender Private OT with Optimal Rate
Pedro Branco, Nico Döttling, Akshayaram Srinivasan
Pedro Branco, Nico Döttling, Akshayaram Srinivasan
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets
Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen
Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen
PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption
Yongha Son, Jinhyuck Jeong
Yongha Son, Jinhyuck Jeong
Cryptanalysis of rank-metric schemes based on distorted Gabidulin codes
Pierre Briaud, Pierre Loidreau
Pierre Briaud, Pierre Loidreau
On Provable White-Box Security in the Strong Incompressibility Model
Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
Reusable Secure Computation in the Plain Model
Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang
Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang
BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks
Yuting Zuo, Li Xu, Yuexin Zhang, Chenbin Zhao, Zhaozhe Kang
Yuting Zuo, Li Xu, Yuexin Zhang, Chenbin Zhao, Zhaozhe Kang
On the Non-Malleability of ECVRF in the Algebraic Group Model
Willow Barkan-Vered, Franklin Harding, Jonathan Keller, Jiayu Xu
Willow Barkan-Vered, Franklin Harding, Jonathan Keller, Jiayu Xu
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited
Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, and Vassilis Zikas
Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, and Vassilis Zikas
Oblivious Transfer from Rerandomizable PKE
Shuaishuai Li, Cong Zhang, Dongdai Lin
Shuaishuai Li, Cong Zhang, Dongdai Lin
Oblivious Accumulators
Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman
Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman
Private Timestamps and Selective Verification of Notarised Data on a Blockchain
Enrique Larraia, Owen Vaughan
Enrique Larraia, Owen Vaughan
Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing
Syed Zair Abbas, Mudassar Aslam
Syed Zair Abbas, Mudassar Aslam
Tiresias: Large Scale, Maliciously Secure Threshold Paillier
Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, and Avishay Yanai
Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, and Avishay Yanai
An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes.
Alain Couvreur, Ilaria Zappatore
Alain Couvreur, Ilaria Zappatore
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head
Carsten Baum, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Emmanuela Orsini, Lawrence Roy, Peter Scholl
Carsten Baum, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Emmanuela Orsini, Lawrence Roy, Peter Scholl
Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields
Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith
Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith
A proposal for quantum GRS algorithm and the cryptanalysis for ROLLO and RQC
Asuka Wakasugi, Mitsuru Tada
Asuka Wakasugi, Mitsuru Tada
A note on ``a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
VSS from Distributed ZK Proofs and Applications
Shahla Atapoor, Karim Baghery, Daniele Cozzo, and Robi Pedersen
Shahla Atapoor, Karim Baghery, Daniele Cozzo, and Robi Pedersen
Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off
Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, and Xiao Wang
Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, and Xiao Wang
Privacy Preserving Records Sharing using Blockchain and Format Preserving Encryption
Sai Sandilya Konduru, Vishal Saraswat
Sai Sandilya Konduru, Vishal Saraswat
Detection of Password Reuse and Credential Stuffing: A Server-side Approach
Sai Sandilya Konduru, Sweta Mishra
Sai Sandilya Konduru, Sweta Mishra
On the Hardness of Scheme-Switching Between SIMD FHE Schemes
Karim Eldefrawy, Nicholas Genise, Nathan Manohar
Karim Eldefrawy, Nicholas Genise, Nathan Manohar
Fuzzification-based Feature Selection for Enhanced Website Content Encryption
Mike Wa Nkongolo
Mike Wa Nkongolo
Efficient Private Multiset ID Protocols
Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
On the Two-sided Permutation Inversion Problem
Gorjan Alagic, Chen Bai, Alexander Poremba, and Kaiyan Shi
Gorjan Alagic, Chen Bai, Alexander Poremba, and Kaiyan Shi
Generating Supersingular Elliptic Curves over $\mathbb{F}_p$ with Unknown Endomorphism Ring
Youcef Mokrani and David Jao
Youcef Mokrani and David Jao
Secure Range-Searching Using Copy-And-Recurse
Eyal Kushnir, Guy Moshkowich, and Hayim Shaul
Eyal Kushnir, Guy Moshkowich, and Hayim Shaul
On the 32-Character Zodiac Cipher
Floe Foxon
Floe Foxon
Practical and Efficient FHE-based MPC
Nigel P. Smart
Nigel P. Smart
Trivial Transciphering With Trivium and TFHE
Thibault Balenbois, Jean-Baptiste Orfila, and Nigel P. Smart
Thibault Balenbois, Jean-Baptiste Orfila, and Nigel P. Smart
New Secret Keys for Enhanced Performance in (T)FHE
Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, and Samuel Tap
Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, and Samuel Tap
$\textsf{PAE}$: Towards More Efficient and BBB-secure AE From a Single Public Permutation
Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
Timed Commitments Revisited
Miguel Ambrona, Marc Beunardeau, Raphaël R. Toledo
Miguel Ambrona, Marc Beunardeau, Raphaël R. Toledo
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction
Kyoichi Asano and Yohei Watanabe
Kyoichi Asano and Yohei Watanabe
Design of Blockchain-Based Many-to-Many Anonymous Data Sharing Scheme
Esra Günsay, Burcu E. Karakaş, N. Gamze Orhon Kılıç, Oğuz Yayla
Esra Günsay, Burcu E. Karakaş, N. Gamze Orhon Kılıç, Oğuz Yayla
MuxProofs: Succinct Arguments for Machine Computation from Vector Lookups
Zijing Di, Lucas Xia, Wilson Nguyen, and Nirvan Tyagi
Zijing Di, Lucas Xia, Wilson Nguyen, and Nirvan Tyagi
Demystifying Just-in-Time (JIT) Liquidity Attacks on Uniswap V3
Xihan Xiong, Zhipeng Wang, William Knottenbelt, and Michael Huth
Xihan Xiong, Zhipeng Wang, William Knottenbelt, and Michael Huth
Security of Hybrid Key Establishment using Concatenation
Adam Petcher, Matthew Campagna
Adam Petcher, Matthew Campagna
Defining and Controlling Information Leakage in US Equities Trading
Arthur Americo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri
Arthur Americo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri
A Note on Non-Interactive Zero-Knowledge from CDH
Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach
Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach
Revisiting the Nova Proof System on a Cycle of Curves
Wilson Nguyen, Dan Boneh, Srinath Setty
Wilson Nguyen, Dan Boneh, Srinath Setty
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets
Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, and Kristin Lauter
Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, and Kristin Lauter
SoK: Data Sovereignty
Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song
Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song
eLIMInate: a Leakage-focused ISE for Masked Implementation
Hao Cheng, Daniel Page, and Weijia Wang
Hao Cheng, Daniel Page, and Weijia Wang
Post-Quantum Secure Over-the-Air Update of Automotive Systems
Joppe W. Bos, Alexander Dima, Alexander Kiening, Joost Renes
Joppe W. Bos, Alexander Dima, Alexander Kiening, Joost Renes
Lightweight Authentication of Web Data via Garble-Then-Prove
Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu
Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu
An invariant of the round function of QARMAv2-64
Tim Beyne
Tim Beyne
Access structures induced by polymatroids with extreme rank function
Mieczysław Kula
Mieczysław Kula
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup
Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler
Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler
Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU
Akram Khalesi, Zahra Ahmadian
Akram Khalesi, Zahra Ahmadian
Randomness Recoverable Secret Sharing Schemes
Mohammad Hajiabadi, Shahram Khazaei, and Behzad Vahdani
Mohammad Hajiabadi, Shahram Khazaei, and Behzad Vahdani
Faster TFHE Bootstrapping with Block Binary Keys
Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song
Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song
BASS: Boolean Automorphisms Signature Scheme
Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, and Vladimir Shpilrain
Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, and Vladimir Shpilrain
Speculative Denial-of-Service Attacks in Ethereum
Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, and Arthur Gervais
Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, and Arthur Gervais
Succinct Computational Secret Sharing
Benny Applebaum, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tianren Liu, Vinod Vaikuntanathan
Benny Applebaum, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tianren Liu, Vinod Vaikuntanathan
Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults
Julian Loss and Gilad Stern
Julian Loss and Gilad Stern
Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs)
Yibin Yang, Stanislav Peceny, David Heath, and Vladimir Kolesnikov
Yibin Yang, Stanislav Peceny, David Heath, and Vladimir Kolesnikov
Limits on Adaptive Security for Attribute-Based Encryption
Zvika Brakerski and Stav Medina
Zvika Brakerski and Stav Medina
Latency-First Smart Contract: Overclock the Blockchain for a while
Huayi Qi, Minghui Xu, Xiuzhen Cheng, Weifeng Lyu
Huayi Qi, Minghui Xu, Xiuzhen Cheng, Weifeng Lyu
A new approach based on quadratic forms to attack the McEliece cryptosystem
Alain Couvreur, Rocco Mora, and Jean-Pierre Tillich
Alain Couvreur, Rocco Mora, and Jean-Pierre Tillich
Generalized word-oriented feedback shift registers
Susil Kumar Bishoi
Susil Kumar Bishoi
Compact Circuits for Efficient Mobius Transform
Subhadeep Banik and Francesco Regazzoni
Subhadeep Banik and Francesco Regazzoni
Concrete Security from Worst-Case to Average-Case Lattice Reductions
Joel Gärtner
Joel Gärtner
Compressing Encrypted Data Over Small Fields
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
One-Way Functions vs. TFNP: Simpler and Improved
Lukáš Folwarczný, Mika Göös, Pavel Hubáček, Gilbert Maystre, Weiqiang Yuan
Lukáš Folwarczný, Mika Göös, Pavel Hubáček, Gilbert Maystre, Weiqiang Yuan
BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks
Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso
Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso
Correlated-Output Differential Privacy and Applications to Dark Pools
James Hsin-yu Chiang, Bernardo David, Mariana Gama, and Christian Janos Lebeda
James Hsin-yu Chiang, Bernardo David, Mariana Gama, and Christian Janos Lebeda
Proactive Secret Sharing with Constant Communication
Brett Hemenway Falk, Daniel Noble, Tal Rabin
Brett Hemenway Falk, Daniel Noble, Tal Rabin
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE
Shweta Agrawal, Melissa Rossi, Anshu Yadav, and Shota Yamada
Shweta Agrawal, Melissa Rossi, Anshu Yadav, and Shota Yamada
CryptAttackTester: high-assurance attack analysis
Daniel J. Bernstein and Tung Chou
Daniel J. Bernstein and Tung Chou
Speeding up elliptic computations for Ethereum Account Abstraction
Renaud Dubois
Renaud Dubois
Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Zeta Avarikioti, Stefan Schmid, Samarth Tiwari
Zeta Avarikioti, Stefan Schmid, Samarth Tiwari
WESP: An encryption method that, as the key size increases, require an exponentially growing time to break
Sam Widlund
Sam Widlund
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak
Mohammad Vaziri, Vesselin Velichkov
Mohammad Vaziri, Vesselin Velichkov
Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs (Extended Version)
Vincent Meyers, Dennis R. E. Gnad, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
Vincent Meyers, Dennis R. E. Gnad, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
To Pass or Not to Pass: Privacy-Preserving Physical Access Control
Jesús García-Rodríguez, Stephan Krenn, Daniel Slamanig
Jesús García-Rodríguez, Stephan Krenn, Daniel Slamanig
More Efficient Post-Quantum Electronic Voting from NTRU
Patrick Hough, Caroline Sandsbråten, and Tjerand Silde
Patrick Hough, Caroline Sandsbråten, and Tjerand Silde
On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model
Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody
Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption
Sree Vivek S, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan
Sree Vivek S, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan
Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time Verification
Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
The QARMAv2 Family of Tweakable Block Ciphers
Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, and Francesco Regazzoni
Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, and Francesco Regazzoni
On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property
Claude Carlet and Enrico Piccione
Claude Carlet and Enrico Piccione
Collision Entropy Estimation in a One-Line Formula
Alessandro Gecchele
Alessandro Gecchele
Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme
Nicolas Aragon, Victor Dyseryn, Philippe Gaborit
Nicolas Aragon, Victor Dyseryn, Philippe Gaborit
Homomorphic Indistinguishability Obfuscation and its Applications
Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran
Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran
Generalized Initialization of the Duplex Construction
Christoph Dobraunig, Bart Mennink
Christoph Dobraunig, Bart Mennink
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED
Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici
Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici
mR$_{\text{LWE}}$-CP-ABE a revocable CP-ABE for Post-Quantum Cryptography
Marco Cianfriglia, Elia Onofri, Marco Pedicini
Marco Cianfriglia, Elia Onofri, Marco Pedicini
Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding
Koji Nuida
Koji Nuida
Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks
Jitendra Bhandari, Likhitha Mankali, Mohammed Nabeel, Ozgur Sinanoglu, Ramesh Karri, and Johann Knechtel
Jitendra Bhandari, Likhitha Mankali, Mohammed Nabeel, Ozgur Sinanoglu, Ramesh Karri, and Johann Knechtel
Threshold Private Set Intersection with Better Communication Complexity
Satrajit Ghosh, Mark Simkin
Satrajit Ghosh, Mark Simkin
Invertible Bloom Lookup Tables with Less Memory and Randomness
Nils Fleischhacker, Kasper Green Larsen, Maciej Obremski, Mark Simkin
Nils Fleischhacker, Kasper Green Larsen, Maciej Obremski, Mark Simkin
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments
Tohru Kohrita and Patrick Towa
Tohru Kohrita and Patrick Towa
Unlinkability and Interoperability in Account-Based Universal Payment Channels
Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez
Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez
Attribute-based Single Sign-On: Secure, Private, and Efficient
Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa
Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa
Limits in the Provable Security of ECDSA Signatures
Dominik Hartmann, Eike Kiltz
Dominik Hartmann, Eike Kiltz
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal
John Preuß Mattsson
John Preuß Mattsson
Randomness of random in Cisco ASA
Ryad Benadjila, Arnaud Ebalard
Ryad Benadjila, Arnaud Ebalard
General Results of Linear Approximations over Finite Abelian Groups
Zhongfeng Niu, Siwei Sun, Hailun Yan, Qi Wang
Zhongfeng Niu, Siwei Sun, Hailun Yan, Qi Wang
Amortized Functional Bootstrapping in less than 7ms, with $\tilde{O}(1)$ polynomial multiplications
Zeyu Liu and Yunhao Wang
Zeyu Liu and Yunhao Wang
Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference
Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature
Emre Karabulut, Aydin Aysu
Emre Karabulut, Aydin Aysu
Efficient Zero Knowledge for Regular Language
Michael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, and Xiang Fu
Michael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, and Xiang Fu
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions
Hoeteck Wee
Hoeteck Wee
$\mathsf{zkSaaS}$: Zero-Knowledge SNARKs as a Service
Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar
Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar
Pseudorandom Strings from Pseudorandom Quantum States
Prabhanjan Ananth, Yao-Ting Lin, and Henry Yuen
Prabhanjan Ananth, Yao-Ting Lin, and Henry Yuen
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps
Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
SublonK: Sublinear Prover PlonK
Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha
Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha
Secure Multiparty Computation with Free Branching
Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain
Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain
What If Alice Wants Her Story Told?
Anindya Bhandari, Allison Bishop
Anindya Bhandari, Allison Bishop
Practical Schnorr Threshold Signatures Without the Algebraic Group Model
Hien Chu, Paul Gerhart, Tim Ruffing, and Dominique Schröder
Hien Chu, Paul Gerhart, Tim Ruffing, and Dominique Schröder
Leaking-Cascade: an Optimal Construction for KEM Hybridization
Céline Chevalier, Guirec Lebrun, and Ange Martinelli
Céline Chevalier, Guirec Lebrun, and Ange Martinelli
On the Impossibility of Algebraic NIZK In Pairing-Free Groups
Emanuele Giunta
Emanuele Giunta
Improved Gadgets for the High-Order Masking of Dilithium
Jean-Sébastien Coron, François Gérard, Matthias Trannoy, and Rina Zeitoun
Jean-Sébastien Coron, François Gérard, Matthias Trannoy, and Rina Zeitoun
ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations
Anisha Mukherjee, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy
Anisha Mukherjee, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy
Differentially Private Selection from Secure Distributed Computing
Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh
Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh
Diversity Algorithms for Laser Fault Injection
Marina Krček and Thomas Ordas
Marina Krček and Thomas Ordas
Suboptimality in DeFi
Aviv Yaish, Maya Dotan, Kaihua Qin, Aviv Zohar, and Arthur Gervais
Aviv Yaish, Maya Dotan, Kaihua Qin, Aviv Zohar, and Arthur Gervais
When is Slower Block Propagation More Profitable for Large Miners?
Zhichun Lu, Ren Zhang
Zhichun Lu, Ren Zhang
Efficient Evaluation of Frequency Test for Overlapping Vectors Statistic
Krzysztof MAŃK
Krzysztof MAŃK
A note on ``LAKAF: lightweight authentication and key agreement framework for smart grid network''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Further results on several classes of optimal ternary cyclic codes with minimum distance four
Qian Liu, Xiaobei Dong, Ximeng Liu, Jian Zou
Qian Liu, Xiaobei Dong, Ximeng Liu, Jian Zou
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond
Mingyao Shao, Yuejun Liu, Yongbin Zhou
Mingyao Shao, Yuejun Liu, Yongbin Zhou
Reductions from module lattices to free module lattices, and application to dequantizing module-LLL
Gabrielle De Micheli, Daniele Micciancio, Alice Pellet-Mary, Nam Tran
Gabrielle De Micheli, Daniele Micciancio, Alice Pellet-Mary, Nam Tran
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan
Near Collision Attack Against Grain v1
Subhadeep Banik, Daniel Collins, Willi Meier
Subhadeep Banik, Daniel Collins, Willi Meier
Prouff & Rivain’s Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model
Loïc Masure and François-Xavier Standaert
Loïc Masure and François-Xavier Standaert
Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN
Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy
Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy
Strict Linear Lookup Argument
Xiang Fu
Xiang Fu
On Active Attack Detection in Messaging with Immediate Decryption
Khashayar Barooti, Daniel Collins, Simone Colombo, Loı̈s Huguenin-Dumittan, and Serge Vaudenay
Khashayar Barooti, Daniel Collins, Simone Colombo, Loı̈s Huguenin-Dumittan, and Serge Vaudenay
On cubic-like bent Boolean functions
Claude Carlet and Irene Villa
Claude Carlet and Irene Villa
Introducing two Low-Latency Cipher Families: Sonic and SuperSonic
Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
Public-Key Encryption with Quantum Keys
Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta, Or Sattath, Quoc-Huy Vu, and Michael Walter
Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta, Or Sattath, Quoc-Huy Vu, and Michael Walter
Circular Multiplicative Modular Exponentiation: A New Public Key Exchange Algorithm
Michele Fabbrini
Michele Fabbrini
The Power of Undirected Rewindings for Adaptive Security
Dennis Hofheinz, Julia Kastner, and Karen Klein
Dennis Hofheinz, Julia Kastner, and Karen Klein
Distributed Broadcast Encryption from Bilinear Groups
Dimitris Kolonelos, Giulio Malavolta, and Hoeteck Wee
Dimitris Kolonelos, Giulio Malavolta, and Hoeteck Wee
Digital signature schemes using non-square matrices or scrap automorphisms
Jiale Chen, Dima Grigoriev, Vladimir Shpilrain
Jiale Chen, Dima Grigoriev, Vladimir Shpilrain
Conjunctive Searchable Symmetric Encryption from Hard Lattices
Debadrita Talapatra, Sikhar Patranabis, and Debdeep Mukhopadhyay
Debadrita Talapatra, Sikhar Patranabis, and Debdeep Mukhopadhyay
Improved Multi-User Security Using the Squared-Ratio Method
Yu Long Chen, Wonseok Choi, Changmin Lee
Yu Long Chen, Wonseok Choi, Changmin Lee
Additive Randomized Encodings and Their Applications
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
UniPlonk: Plonk with Universal Verifier
Shumo Chu, Brandon H. Gomes, Francisco Hernandez Iglesias, Todd Norton, Duncan Tebbs
Shumo Chu, Brandon H. Gomes, Francisco Hernandez Iglesias, Todd Norton, Duncan Tebbs
Data Independent Order Policy Enforcement: Limitations and Solutions
Sarisht Wadhwa, Luca Zanolini, Francesco D'Amato, Aditya Asgaonkar, Chengrui Fang, Fan Zhang, and Kartik Nayak
Sarisht Wadhwa, Luca Zanolini, Francesco D'Amato, Aditya Asgaonkar, Chengrui Fang, Fan Zhang, and Kartik Nayak
Secure Logging in between Theory and Practice: Security Analysis of the Implementation of Forward Secure Log Sealing in Journald
Felix Dörre, Astrid Ottenhues
Felix Dörre, Astrid Ottenhues
Decoding LTFs in the Generic Group Model
Dennis Hofheinz, Julia Kastner, Akin Ünal, Bogdan Ursu
Dennis Hofheinz, Julia Kastner, Akin Ünal, Bogdan Ursu
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier
Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier
Compact Selective Opening Security From LWE
Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, and Akin Ünal
Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, and Akin Ünal
On the (Im)possibility of Distributed Samplers: Lower Bounds and Party-Dynamic Constructions
Damiano Abram, Maciej Obremski, and Peter Scholl
Damiano Abram, Maciej Obremski, and Peter Scholl
Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Jiangxia Ge, Tianshu Shan, Rui Xue
Jiangxia Ge, Tianshu Shan, Rui Xue
When Messages are Keys: Is HMAC a dual-PRF?
Matilda Backendal, Mihir Bellare, Felix Günther, Matteo Scarlata
Matilda Backendal, Mihir Bellare, Felix Günther, Matteo Scarlata
Security-Preserving Distributed Samplers: How to Generate any CRS in One Round without Random Oracles
Damiano Abram, Brent Waters, Mark Zhandry
Damiano Abram, Brent Waters, Mark Zhandry
Cutting the GRASS: Threshold GRoup Action Signature Schemes
Michele Battagliola, Giacomo Borin, Alessio Meneghetti, and Edoardo Persichetti
Michele Battagliola, Giacomo Borin, Alessio Meneghetti, and Edoardo Persichetti
Effective Pairings in Isogeny-based Cryptography
Krijn Reijnders
Krijn Reijnders
SoK: Vector OLE-Based Zero-Knowledge Protocols
Carsten Baum, Samuel Dittmer, Peter Scholl, Xiao Wang
Carsten Baum, Samuel Dittmer, Peter Scholl, Xiao Wang
The Query-Complexity of Preprocessing Attacks
Ashrujit Ghoshal, Stefano Tessaro
Ashrujit Ghoshal, Stefano Tessaro
$\mathsf{Mercury}$: Constant-Round Protocols for Multi-Party Computation with Rationals
Luke Harmon and Gaetan Delavignette
Luke Harmon and Gaetan Delavignette
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation
Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, and Tibor Jager
Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, and Tibor Jager
How to Bind Anonymous Credentials to Humans
Julia Hesse, Nitin Singh, Alessandro Sorniotti
Julia Hesse, Nitin Singh, Alessandro Sorniotti
Revisiting Oblivious Top-$k$ Selection with Applications to Secure $k$-NN Classification
Kelong Cong, Robin Geelen, Jiayi Kang, and Jeongeun Park
Kelong Cong, Robin Geelen, Jiayi Kang, and Jeongeun Park
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
Alex Biryukov, Je Sen Teh, and Aleksei Udovenko
Alex Biryukov, Je Sen Teh, and Aleksei Udovenko
Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS
Kaiyi Zhang, Hongrui Cui, Yu Yu
Kaiyi Zhang, Hongrui Cui, Yu Yu
Towards Topology-Hiding Computation from Oblivious Transfer
Marshall Ball, Alexander Bienstock, Lisa Kohl, and Pierre Meyer
Marshall Ball, Alexander Bienstock, Lisa Kohl, and Pierre Meyer
Extending Updatable Encryption: Public Key, Tighter Security and Signed Ciphertexts
Chen Qian, Yao Jiang Galteland, Gareth T. Davies
Chen Qian, Yao Jiang Galteland, Gareth T. Davies
A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures
Edoardo Persichetti and Paolo Santini
Edoardo Persichetti and Paolo Santini
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency
Giacomo Fenzi, Hossein Moghaddas, and Ngoc Khanh Nguyen
Giacomo Fenzi, Hossein Moghaddas, and Ngoc Khanh Nguyen
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros
Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros
Inferring Bivariate Polynomials for Homomorphic Encryption Application
Diana Maimut, George Teseleanu
Diana Maimut, George Teseleanu
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager
Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager
Advanced Composition Theorems for Differential Obliviousness
Mingxun Zhou, Mengshi Zhao, T-H. Hubert Chan, and Elaine Shi
Mingxun Zhou, Mengshi Zhao, T-H. Hubert Chan, and Elaine Shi
The curious case of the half-half Bitcoin ECDSA nonces
Dylan Rowe, Joachim Breitner, Nadia Heninger
Dylan Rowe, Joachim Breitner, Nadia Heninger
Revisiting the Indifferentiability of the Sum of Permutations
Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
On Linear Communication Complexity for (Maximally) Fluid MPC
Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
How to Recover a Secret with O(n) Additions
Benny Applebaum, Oded Nir, and Benny Pinkas
Benny Applebaum, Oded Nir, and Benny Pinkas
Faster coercion-resistant e-voting by encrypted sorting
Diego F. Aranha, Michele Battagliola, Lawrence Roy
Diego F. Aranha, Michele Battagliola, Lawrence Roy
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
Théophile Brézot, Paola de Perthuis, and David Pointcheval
Théophile Brézot, Paola de Perthuis, and David Pointcheval
Unifying Freedom and Separation for Tight Probing-Secure Composition
Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb
Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb
Discrete Logarithm Factory
Haetham AL ASWAD, Cécile PIERROT, and Emmanuel THOMÉ
Haetham AL ASWAD, Cécile PIERROT, and Emmanuel THOMÉ
Anonymous, Timed and Revocable Proxy Signatures
Ghada Almashaqbeh and Anca Nitulescu
Ghada Almashaqbeh and Anca Nitulescu
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications
Guy Zyskind, Avishay Yanai, Alex "Sandy" Pentland
Guy Zyskind, Avishay Yanai, Alex "Sandy" Pentland
Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits
Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang
Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang
HPPC: Hidden Product of Polynomial Composition
Borja Gomez Rodriguez
Borja Gomez Rodriguez
TGh: A TEE/GC Hybrid Enabling Confidential FaaS Platforms
James Choncholas, Ketan Bhardwaj, Ada Gavrilovska
James Choncholas, Ketan Bhardwaj, Ada Gavrilovska
Optimized Discrete Logarithm Computation for Faster Square Roots in Finite Fields
Thomas Pornin
Thomas Pornin
On Concurrent Multi-Party Quantum Computation
Vipul Goyal, Xiao Liang, Giulio Malavolta
Vipul Goyal, Xiao Liang, Giulio Malavolta
Ring/Module Learning with Errors under Linear Leakage -- Hardness and Applications
Zhedong Wang, Qiqi Lai, and Feng-Hao Liu
Zhedong Wang, Qiqi Lai, and Feng-Hao Liu
Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC)
Katerina Mitrokotsa, Sayantan Mukherjee, Jenit Tomy
Katerina Mitrokotsa, Sayantan Mukherjee, Jenit Tomy
Reed-Solomon Codes over the Circle Group
Ulrich Haböck, Daniel Lubarov, Jacqueline Nabaglo
Ulrich Haböck, Daniel Lubarov, Jacqueline Nabaglo
Lattice-based Authenticated Key Exchange with Tight Security
Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang
Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang
Securing IoT Devices with Fast and Energy Efficient Implementation of PRIDE and PRESENT Ciphers
Vijay Dahiphale, Hrishikesh Raut, Gaurav Bansod, and Devendra Dahiphale
Vijay Dahiphale, Hrishikesh Raut, Gaurav Bansod, and Devendra Dahiphale
Network Agnostic MPC with Statistical Security
Ananya Appan, Ashish Choudhury
Ananya Appan, Ashish Choudhury
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher
Anna Hambitzer, David Gerault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini
Anna Hambitzer, David Gerault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini
Generalized Special-Sound Interactive Proofs and their Knowledge Soundness
Thomas Attema, Serge Fehr, and Nicolas Resch
Thomas Attema, Serge Fehr, and Nicolas Resch
Oblivious Transfer with Constant Computational Overhead
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks
André Schrottenloher and Marc Stevens
André Schrottenloher and Marc Stevens
Noah's Ark: Efficient Threshold-FHE Using Noise Flooding
Morten Dahl, Daniel Demmler, Sarah El Kazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Samuel Tap, and Michael Walter
Morten Dahl, Daniel Demmler, Sarah El Kazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Samuel Tap, and Michael Walter
A Note on ``Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search
Seny Kamara, Tarik Moataz
Seny Kamara, Tarik Moataz
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
Cody Freitag, Brent Waters, David J. Wu
Cody Freitag, Brent Waters, David J. Wu
Limits of Breach-Resistant and Snapshot-Oblivious RAMs
Giuseppe Persiano, Kevin Yeo
Giuseppe Persiano, Kevin Yeo
MAPLE: MArkov Process Leakage attacks on Encrypted Search
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
Password-Based Credentials with Security against Server Compromise
Dennis Dayanikli, Anja Lehmann
Dennis Dayanikli, Anja Lehmann
Generic-Group Lower Bounds via Reductions Between Geometric-Search Problems: With and Without Preprocessing
Benedikt Auerbach, Charlotte Hoffmann, and Guillermo Pascual-Perez
Benedikt Auerbach, Charlotte Hoffmann, and Guillermo Pascual-Perez
Ready to SQI? Safety First! Towards a constant-time implementation of isogeny-based signature, SQIsign
David Jacquemin, Anisha Mukherjee, Péter Kutas, and Sujoy SINHA ROY
David Jacquemin, Anisha Mukherjee, Péter Kutas, and Sujoy SINHA ROY
SNACKs for Proof-of-Space Blockchains
Hamza Abusalah
Hamza Abusalah
New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme
Ohad Klein, Ilan Komargodski
Ohad Klein, Ilan Komargodski
Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation
Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin
Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin
"Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity
Gideon Samid
Gideon Samid
Constant-Round Arguments from One-Way Functions
Noga Amit, Guy Rothblum
Noga Amit, Guy Rothblum
We Are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve
Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner
Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner
Vector Commitments With Proofs of Smallness: Short Range Proofs and More
Benoit Libert
Benoit Libert
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation
Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim
Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim
Generalized Hybrid Search and Applications
Alexandru Cojocaru, Juan Garay, and Fang Song
Alexandru Cojocaru, Juan Garay, and Fang Song
Entropy Suffices for Guessing Most Keys
Timo Glaser, Alexander May, and Julian Nowakowski
Timo Glaser, Alexander May, and Julian Nowakowski
Generic Security of the Ascon Mode: On the Power of Key Blinding
Charlotte Lefevre and Bart Mennink
Charlotte Lefevre and Bart Mennink
Bit-Security Preserving Hardness Amplification
Shun Watanabe and Kenji Yasunaga
Shun Watanabe and Kenji Yasunaga
Areion: Highly-Efficient Permutations and Its Applications (Extended Version)
Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, and Rentaro Shiba
Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, and Rentaro Shiba
Optimizations and Practicality of High-Security CSIDH
Fabio Campos, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, and Thom Wiggers
Fabio Campos, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, and Thom Wiggers
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security
Jiangxia Ge, Tianshu Shan, Rui Xue
Jiangxia Ge, Tianshu Shan, Rui Xue
New SIDH Countermeasures for a More Efficient Key Exchange
Andrea Basso and Tako Boris Fouotsa
Andrea Basso and Tako Boris Fouotsa
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
Yaobin Shen, François-Xavier Standaert
Yaobin Shen, François-Xavier Standaert
Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher
Sahiba Suryawanshi, Dhiman Saha
Sahiba Suryawanshi, Dhiman Saha
Private Proof-of-Stake Blockchains using Differentially-private Stake Distortion
Chenghong Wang, David Pujo, Kartik Nayak, Ashwin Machanavajjhala
Chenghong Wang, David Pujo, Kartik Nayak, Ashwin Machanavajjhala
Blockchain Transaction Censorship: (In)secure and (In)efficient?
Zhipeng Wang, Xihan Xiong, William J. Knottenbelt
Zhipeng Wang, Xihan Xiong, William J. Knottenbelt
Generation of two ''independent'' points on an elliptic curve of $j$-invariant $\neq 0, 1728$
Dmitrii Koshelev
Dmitrii Koshelev
History-Free Sequential Aggregation of Hash-and-Sign Signatures
Alessio Meneghetti and Edoardo Signorini
Alessio Meneghetti and Edoardo Signorini
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings
Andrea Di Giusto and Chiara Marcolla
Andrea Di Giusto and Chiara Marcolla
Coefficient Grouping for Complex Affine Layers
Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe
Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe
$\mathsf{Skye}$: An Expanding PRF based Fast KDF and its Applications
Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, and Bart Preneel
Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, and Bart Preneel
An Anonymous Multireceiver Hybrid Signcryption for Broadcast Communication
Alia Umrani, Apurva K Vangujar, and Paolo Palmieri
Alia Umrani, Apurva K Vangujar, and Paolo Palmieri
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH
Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, and Christophe Petit
Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, and Christophe Petit
Bounded Verification for Finite-Field-Blasting (In a Compiler for Zero Knowledge Proofs)
Alex Ozdemir, Riad S. Wahby, Fraser Brown, Clark Barrett
Alex Ozdemir, Riad S. Wahby, Fraser Brown, Clark Barrett
Too Many Hints - When LLL Breaks LWE
Alexander May and Julian Nowakowski
Alexander May and Julian Nowakowski
Quantum Attacks on Type-1 Generalized Feistel Schemes
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
Exact Security Analysis of ASCON
Bishwajit Chakraborty, Chandranan Dhar, and Mridul Nandi
Bishwajit Chakraborty, Chandranan Dhar, and Mridul Nandi
Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain
Yiming Li and Shengli Liu
Yiming Li and Shengli Liu
An update on Keccak performance on ARMv7-M
Alexandre Adomnicai
Alexandre Adomnicai
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu
Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu
Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic
Mariya Georgieva Belorgey, Sergiu Carpov, Nicolas Gama, Sandra Guasch, and Dimitar Jetchev
Mariya Georgieva Belorgey, Sergiu Carpov, Nicolas Gama, Sandra Guasch, and Dimitar Jetchev
Towards compressed permutation oracles
Dominique Unruh
Dominique Unruh
Brakedown's expander code
Ulrich Haböck
Ulrich Haböck
Owl: An Augmented Password-Authenticated Key Exchange Scheme
Feng Hao, Samiran Bag, Liqun Chen, and Paul C. van Oorschot
Feng Hao, Samiran Bag, Liqun Chen, and Paul C. van Oorschot
LFHE: Fully Homomorphic Encryption with Bootstrapping Key Size Less than a Megabyte
Andrey Kim, Yongwoo Lee, Maxim Deryabin, Jieun Eom, Rakyong Choi
Andrey Kim, Yongwoo Lee, Maxim Deryabin, Jieun Eom, Rakyong Choi
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials
Qiqi Lai, Chongshen Chen, Feng-Hao Liu, Anna Lysyanskaya, and Zhedong Wang
Qiqi Lai, Chongshen Chen, Feng-Hao Liu, Anna Lysyanskaya, and Zhedong Wang
Threshold ECDSA in Three Rounds
Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat
Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat
Subversion-Resilient Authenticated Encryption without Random Oracles
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager
Undetectable Watermarks for Language Models
Miranda Christ, Sam Gunn, Or Zamir
Miranda Christ, Sam Gunn, Or Zamir
How to Design Fair Protocols in the Multi-Blockchain Setting
Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha
Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha
Nimble: Rollback Protection for Confidential Cloud Services (extended version)
Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, Sudheesh Singanamalla
Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, Sudheesh Singanamalla
Time to Bribe: Measuring Block Construction Market
Anton Wahrstätter, Liyi Zhou, Kaihua Qin, Davor Svetinovic, Arthur Gervais
Anton Wahrstätter, Liyi Zhou, Kaihua Qin, Davor Svetinovic, Arthur Gervais
Efficient TFHE Bootstrapping in the Multiparty Setting
Jeongeun Park and Sergi Rovira
Jeongeun Park and Sergi Rovira
Scaling Mobile Private Contact Discovery to Billions of Users
Laura Hetz, Thomas Schneider, and Christian Weinert
Laura Hetz, Thomas Schneider, and Christian Weinert
A Note on ``On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
SDitH in the QROM
Carlos Aguilar-Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, and Dongze Yue
Carlos Aguilar-Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, and Dongze Yue
The security of Kyber's FO-transform
Manuel Barbosa, Andreas Hülsing
Manuel Barbosa, Andreas Hülsing
Batch Proofs are Statistically Hiding
Nir Bitansky, Chethan Kamath, Omer Paneth, Ron Rothblum, and Prashant Nalini Vasudevan
Nir Bitansky, Chethan Kamath, Omer Paneth, Ron Rothblum, and Prashant Nalini Vasudevan
A Faster Software Implementation of SQISign
Kaizhan Lin, Weize Wang, Zheng Xu, and Chang-An Zhao
Kaizhan Lin, Weize Wang, Zheng Xu, and Chang-An Zhao
Schnorr protocol in Jasmin
José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh
José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh
Scalable Agreement Protocols with Optimal Optimistic Efficiency
Yuval Gelles and Ilan Komargodski
Yuval Gelles and Ilan Komargodski
BAKSHEESH: Similar Yet Different From GIFT
Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomáš Gerlich, Sylvain Guilley, Naina Gupta, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdeněk Martinásek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa
Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomáš Gerlich, Sylvain Guilley, Naina Gupta, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdeněk Martinásek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa
Note on Subversion-Resilient Key Exchange
Magnus Ringerud
Magnus Ringerud
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives
Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu
Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu
Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications
Masahito Ishizaka
Masahito Ishizaka
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications
Masahito Ishizaka, Kazuhide Fukushima
Masahito Ishizaka, Kazuhide Fukushima
PSI from ring-OLE
Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky
Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky
On Extremal Algebraic Graphs and implementations of new cubic Multivariate Public Keys
Vasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski
Vasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski
On Sustainable Ring-based Anonymous Systems
Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo
Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo
Finding Desirable Substitution Box with SASQUATCH
Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha
Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha
The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations
Artem Grigor, Vincenzo Iovino, Giuseppe Visconti
Artem Grigor, Vincenzo Iovino, Giuseppe Visconti
Practical Robust DKG Protocols for CSIDH
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits
Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, and MinJune Yi
Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, and MinJune Yi
Extremal algebraic graphs, quadratic multivariate public keys and temporal rules
Vasyl Ustimenko, Aneta Wróblewska
Vasyl Ustimenko, Aneta Wróblewska
Differential properties of integer multiplication
Koustabh Ghosh, Joan Daemen
Koustabh Ghosh, Joan Daemen
Private Eyes: Zero-Leakage Iris Searchable Encryption
Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad, and Benjamin Fuller
Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad, and Benjamin Fuller
Towards a Privacy-preserving Attestation for Virtualized Networks
Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, and Léo Robert
Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, and Léo Robert
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android
Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy
Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy
On implemented graph based generator of cryptographically strong pseudorandom sequences of multivariate nature
Vasyl Ustimenko, Tymoteusz Chojecki
Vasyl Ustimenko, Tymoteusz Chojecki
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
Quentin L. Meunier, Abdul Rahman Taleb
Quentin L. Meunier, Abdul Rahman Taleb
Fast Exhaustive Search for Polynomial Systems over F3
Bo-Yin Yang, Wei-Jeng Wang, Shang-Yi Yang, Char-Shin Miou, Chen-Mou Cheng
Bo-Yin Yang, Wei-Jeng Wang, Shang-Yi Yang, Char-Shin Miou, Chen-Mou Cheng
The Problem of Half Round Key XOR
Anubhab Baksi
Anubhab Baksi
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures
Yang Yu, Huiwen Jia, Xiaoyun Wang
Yang Yu, Huiwen Jia, Xiaoyun Wang
SoK: Distributed Randomness Beacons
Kevin Choi, Aathira Manoj, Joseph Bonneau
Kevin Choi, Aathira Manoj, Joseph Bonneau
Safeguarding Physical Sneaker Sale Through a Decentralized Medium
Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab
Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab
A Note on ``A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
On Perfect Linear Approximations and Differentials over Two-Round SPNs
Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes
Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes
Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme
Lichao Wu, Guilherme Perin, and Stjepan Picek
Lichao Wu, Guilherme Perin, and Stjepan Picek
Non-Interactive Commitment from Non-Transitive Group Actions
Giuseppe D'Alconzo, Andrea Flamini, and Andrea Gangemi
Giuseppe D'Alconzo, Andrea Flamini, and Andrea Gangemi
Composing Bridges
Mugurel Barcau, Vicentiu Pasol, George C Turcas
Mugurel Barcau, Vicentiu Pasol, George C Turcas
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication
Supriya Adhikary, Angshuman Karmakar
Supriya Adhikary, Angshuman Karmakar
MUSES: Efficient Multi-User Searchable Encrypted Database
Tung Le, Rouzbeh Behnia, Jorge Guajardo, and Thang Hoang
Tung Le, Rouzbeh Behnia, Jorge Guajardo, and Thang Hoang
Lower Bounds for Lattice-based Compact Functional Encryption
Erkan Tairi and Akın Ünal
Erkan Tairi and Akın Ünal
A Guide to the Design of Digital Signatures based on Cryptographic Group Actions
Giacomo Borin, Edoardo Persichetti, Paolo Santini, Federico Pintore, and Krijn Reijnders
Giacomo Borin, Edoardo Persichetti, Paolo Santini, Federico Pintore, and Krijn Reijnders
Generic Error SDP and Generic Error CVE
Felice Manganiello, Freeman Slaughter
Felice Manganiello, Freeman Slaughter
Towards High-speed ASIC Implementations of Post-Quantum Cryptography
Malik Imran, Aikata Aikata, Sujoy Sinha Roy, Samuel pagliarini
Malik Imran, Aikata Aikata, Sujoy Sinha Roy, Samuel pagliarini
SOK: Research Motivations of Public-Key Cryptography
Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, and Zhen Zhao
Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, and Zhen Zhao
A Two-Party Hierarchical Deterministic Wallets in Practice
ChihYun Chuang, IHung Hsu, TingFang Lee
ChihYun Chuang, IHung Hsu, TingFang Lee
KAIME : Central Bank Digital Currency with Realistic and Modular Privacy
Ali Dogan and Kemal Bicakci
Ali Dogan and Kemal Bicakci
Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures
Alexandru Ionita
Alexandru Ionita
On the Quantum Security of HAWK
Serge Fehr, Yu-Hsuan Huang
Serge Fehr, Yu-Hsuan Huang
PriFHEte: Achieving Full-Privacy in Account-based Cryptocurrencies is Possible
Varun Madathil and Alessandra Scafuro
Varun Madathil and Alessandra Scafuro
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement
Alexandre Augusto Giron
Alexandre Augusto Giron
Kyber terminates
Manuel Barbosa, Peter Schwabe
Manuel Barbosa, Peter Schwabe
Concurrent Security of Anonymous Credentials Light, Revisited
Julia Kastner, Julian Loss, and Omar Renawi
Julia Kastner, Julian Loss, and Omar Renawi
Two-Message Authenticated Key Exchange from Public-Key Encryption
You Lyu, Shengli Liu
You Lyu, Shengli Liu
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang
Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang
Asymmetric Multi-Party Computation
Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky
Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky
BQP $\neq$ QMA
Ping Wang, Yiting Su
Ping Wang, Yiting Su
Building Unclonable Cryptography: A Tale of Two No-cloning Paradigms
Ghada Almashaqbeh, Rohit Chatterjee
Ghada Almashaqbeh, Rohit Chatterjee
Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption
Tabitha Ogilvie
Tabitha Ogilvie
PIE: $p$-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption
Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva
Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva
Lattice-based, more general anti-leakage model and its application in decentralization
Xiaokang Dai, Jingwei Chen, Wenyuan Wu, and Yong Feng
Xiaokang Dai, Jingwei Chen, Wenyuan Wu, and Yong Feng
A public-key based secure quantum-communication protocol using entangled qubits
S Murugesh
S Murugesh
NFT Trades in Bitcoin with Off-chain Receipts
Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan
Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices
Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri Eliasi, Joan Daemen
Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri Eliasi, Joan Daemen
Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments
Jeffrey Champion, David J. Wu
Jeffrey Champion, David J. Wu
VeriVoting: A decentralized, verifiable and privacy-preserving scheme for weighted voting
Xiaohan Yue
Xiaohan Yue
LeakyOhm: Secret Bits Extraction using Impedance Analysis
Saleh Khalaj Monfared, Tahoura Mosavirik, and Shahin Tajik
Saleh Khalaj Monfared, Tahoura Mosavirik, and Shahin Tajik
On the Invalidity of LV16/Lin17 Obfuscation Schemes
Yupu Hu, Siyue Dong, Baocang Wang, and Xingting Dong
Yupu Hu, Siyue Dong, Baocang Wang, and Xingting Dong
Weak Fiat-Shamir Attacks on Modern Proof Systems
Quang Dao, Jim Miller, Opal Wright, Paul Grubbs
Quang Dao, Jim Miller, Opal Wright, Paul Grubbs
Invertible Quadratic Non-Linear Functions over $\mathbb F_p^n$ via Multiple Local Maps
Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini
Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus
Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, and Simon Ochsenreither
Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, and Simon Ochsenreither
Applications of Timed-release Encryption with Implicit Authentication
Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia
Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia
SoK: Delay-based Cryptography
Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia
Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia
Efficient Accelerator for NTT-based Polynomial Multiplication
Raziyeh Salarifard and Hadi Soleimany
Raziyeh Salarifard and Hadi Soleimany
Third-Party Private Set Intersection
Foo Yee Yeo, Jason H. M. Ying
Foo Yee Yeo, Jason H. M. Ying
A note on ``a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More
Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi
Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT
Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman
Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman
Benchmarking ZK-Circuits in Circom
Colin Steidtmann, Sanjay Gollapudi
Colin Steidtmann, Sanjay Gollapudi
Private Polynomial Commitments and Applications to MPC
Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang
Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path
Xiaohai Dai, Bolin Zhang, Hai Jin, and Ling Ren
Xiaohai Dai, Bolin Zhang, Hai Jin, and Ling Ren
A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version
Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas Sen
Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas Sen
Secure Context Switching of Masked Software Implementations
Barbara Gigerl, Robert Primas, Stefan Mangard
Barbara Gigerl, Robert Primas, Stefan Mangard
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang
Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang
Efficient and Secure Quantile Aggregation of Private Data Streams
Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang
Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros
Kazuma Taka, Tatusya Ishikawa, Kosei Sakamoto, Takanori Isobe
Kazuma Taka, Tatusya Ishikawa, Kosei Sakamoto, Takanori Isobe
Tracing Quantum State Distinguishers via Backtracking
Mark Zhandry
Mark Zhandry
SigRec: Automatic Recovery of Function Signatures in Smart Contracts
Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang
Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang
Proving knowledge of isogenies – A survey
Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit
Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit
Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time
István András Seres and Péter Burcsi
István András Seres and Péter Burcsi
Classical substitution ciphers and group theory
Thomas Kaeding
Thomas Kaeding
Statement-Oblivious Threshold Witness Encryption
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
New Bounds on the Accuracy of Majority Voting for Multi-Class Classification
Sina Aeeneh
Sina Aeeneh
Arithmetization of predicates into Halo 2 using application specific trace types
Morgan Thomas
Morgan Thomas
On the Feasibility of Identity-based Encryption with Equality Test against Insider Attacks
Keita Emura
Keita Emura
MPC in the head for isomorphisms and group actions
Antoine Joux
Antoine Joux
NTWE: A Natural Combination of NTRU and LWE
Joel Gärtner
Joel Gärtner
Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity
Reo Eriguchi
Reo Eriguchi
Study of Arithmetization Methods for STARKs
Tiago Martins, João Farinha
Tiago Martins, João Farinha
FESTA: Fast Encryption from Supersingular Torsion Attacks
Andrea Basso, Luciano Maino, and Giacomo Pope
Andrea Basso, Luciano Maino, and Giacomo Pope
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
Tianrui Wang, Anyu Wang, and Xiaoyun Wang
Tianrui Wang, Anyu Wang, and Xiaoyun Wang
A note on ``faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Ou: Automating the Parallelization of Zero-Knowledge Protocols
Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao
Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao
Formalizing Soundness Proofs of SNARKs
Bolton Bailey, Andrew Miller
Bolton Bailey, Andrew Miller
TandaPay Whistleblowing Communities: Shifting Workplace Culture Towards Zero-Tolerance Sexual Harassment Policies
Joshua Davis, Dr. Rashid Minhas, Michelle Casario, William Bentley, and Kevin Cosby
Joshua Davis, Dr. Rashid Minhas, Michelle Casario, William Bentley, and Kevin Cosby
Griffin: Towards Mixed Multi-Key Homomorphic Encryption
Thomas Schneider, Hossein Yalame, Michael Yonli
Thomas Schneider, Hossein Yalame, Michael Yonli
Muckle+: End-to-End Hybrid Authenticated Key Exchanges
Sonja Bruckner, Sebastian Ramacher, and Christoph Striecks
Sonja Bruckner, Sebastian Ramacher, and Christoph Striecks
ScionFL: Efficient and Robust Secure Quantized Aggregation
Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, and Avishay Yanai
Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, and Avishay Yanai
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
Marc Fischlin
Marc Fischlin
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited
Geoffroy Couteau, Clément Ducros
Geoffroy Couteau, Clément Ducros
FinTracer: A privacy-preserving mechanism for tracing electronic money
Michael Brand, Hamish Ivey-Law, Tania Churchill
Michael Brand, Hamish Ivey-Law, Tania Churchill
Collatz Computation Sequence for Sufficient Large Integers is Random
Wei Ren
Wei Ren
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service
Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh
Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh
A Note on ``Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT''
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation
Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, and Xiaoyun Wang
Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, and Xiaoyun Wang
Improved Distributed RSA Key Generation Using the Miller-Rabin Test
Jakob Burkhardt, Ivan Damgård, Tore Frederiksen, Satrajit Ghosh, and Claudio Orlandi
Jakob Burkhardt, Ivan Damgård, Tore Frederiksen, Satrajit Ghosh, and Claudio Orlandi
Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata
Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova
Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova
PELTA -- Shielding Multiparty-FHE against Malicious Adversaries
Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
Accelerated Encrypted Execution of General-Purpose Applications
Charles Gouert, Vinu Joseph, Steven Dalton, Cedric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos
Charles Gouert, Vinu Joseph, Steven Dalton, Cedric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos
A Direct Key Recovery Attack on SIDH
Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Benjamin Wesolowski
Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Benjamin Wesolowski
OPRFs from Isogenies: Designs and Analysis
Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, and Christian Rechberger
Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, and Christian Rechberger
Classification of All $t$-Resilient Boolean Functions with $t+4$ Variables
Shahram Rasoolzadeh
Shahram Rasoolzadeh
Padding-based forgeries in the mode XOCB
Jean Liénardy
Jean Liénardy
Multi-Armed SPHINCS+
Gustavo Banegas, Florian Caullery
Gustavo Banegas, Florian Caullery
Cassiopeia: Practical On-Chain Witness Encryption
Schwinn Saereesitthipitak, Dionysis Zindros
Schwinn Saereesitthipitak, Dionysis Zindros
Polynomial Hashing over Prime Order Fields
Sreyosi Bhattacharyya, Kaushik Nath, and Palash Sarkar
Sreyosi Bhattacharyya, Kaushik Nath, and Palash Sarkar
From Substitution Box To Threshold
Anubhab Baksi, Sylvain Guilley, Ritu-Ranjan Shrivastwa, and Sofiane Takarabt
Anubhab Baksi, Sylvain Guilley, Ritu-Ranjan Shrivastwa, and Sofiane Takarabt
High-Throughput Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Channel-By-Channel Packing
Jung Hee Cheon, Minsik Kang, Taeseong Kim, Junyoung Jung, Yongdong Yeo
Jung Hee Cheon, Minsik Kang, Taeseong Kim, Junyoung Jung, Yongdong Yeo
Optimization of Functional Bootstrap with Large LUT and Packing Key Switching
KeYi Liu, Chungen Xu, Bennian Dou, Lei Xu
KeYi Liu, Chungen Xu, Bennian Dou, Lei Xu
Proximity Testing with Logarithmic Randomness
Benjamin E. Diamond and Jim Posen
Benjamin E. Diamond and Jim Posen
Publicly Auditable Functional Encryption
Vlasis Koutsos, Dimitrios Papadopoulos
Vlasis Koutsos, Dimitrios Papadopoulos
SEC: Symmetric Encrypted Computation via Fast Look-ups
Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, and Debdeep Mukhopadhyay
Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, and Debdeep Mukhopadhyay
Conflict Checkable and Decodable Codes and Their Applications
Benny Applebaum, Eliran Kachlon
Benny Applebaum, Eliran Kachlon
Sprints: Intermittent Blockchain PoW Mining
Michael Mirkin, Lulu Zhou, Ittay Eyal, and Fan Zhang
Michael Mirkin, Lulu Zhou, Ittay Eyal, and Fan Zhang
Efficient Information-Theoretic Distributed Point Function with General Output Groups
Junru Li, Pengzhen Ke, Liang Feng Zhang
Junru Li, Pengzhen Ke, Liang Feng Zhang
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures
Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, and MinJune Yi
Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, and MinJune Yi
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE
Duhyeong Kim, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
Duhyeong Kim, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan Tiwari, Rusydi H. Makarim
Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan Tiwari, Rusydi H. Makarim
On APN functions whose graphs are maximal Sidon sets
Claude Carlet
Claude Carlet
ProtoStar: Generic Efficient Accumulation/Folding for Special Sound Protocols
Benedikt Bünz and Binyi Chen
Benedikt Bünz and Binyi Chen
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields
Hiroki Furue, Tsuyoshi Takagi
Hiroki Furue, Tsuyoshi Takagi
Hardware Acceleration of FHEW
Jonas Bertels, Michiel Van Beirendonck, Furkan Turan, Ingrid Verbauwhede
Jonas Bertels, Michiel Van Beirendonck, Furkan Turan, Ingrid Verbauwhede
Quantum Implementation of ASCON Linear Layer
Soham Roy, Anubhab Baksi, Anupam Chattopadhyay
Soham Roy, Anubhab Baksi, Anupam Chattopadhyay
vetKeys: How a Blockchain Can Keep Many Secrets
Andrea Cerulli, Aisling Connolly, Gregory Neven, Franz-Stefan Preiss, Victor Shoup
Andrea Cerulli, Aisling Connolly, Gregory Neven, Franz-Stefan Preiss, Victor Shoup
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles
Elaine Shi, Nikhil Vanjani
Elaine Shi, Nikhil Vanjani
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing
Tianyu Zhang
Tianyu Zhang
Computational Quantum Secret Sharing
Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro
Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro
Cryptanalysis of SPEEDY
Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang
Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang
A Comparison of Multi-task learning and Single-task learning Approaches
Thomas Marquet and Elisabeth Oswald
Thomas Marquet and Elisabeth Oswald
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans
Xingyu Meng, Abhrajit Sengupta, Kanad Basu
Xingyu Meng, Abhrajit Sengupta, Kanad Basu
Enabling Two-Party Secure Computation on Set Intersection
Ferhat Karakoç, Alptekin Küpçü
Ferhat Karakoç, Alptekin Küpçü
Publicly Verifiable Auctions with Privacy
Paul Germouty, Enrique Larraia, Wei Zhang
Paul Germouty, Enrique Larraia, Wei Zhang
Security analysis of the Milenage-construction based on a PRF
Alexander Maximov, Mats Näslund
Alexander Maximov, Mats Näslund
Novel Approach to Cryptography Implementation using ChatGPT
Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
The Principal–Agent Problem in Liquid Staking
Apostolos Tzinas, Dionysis Zindros
Apostolos Tzinas, Dionysis Zindros
Pushing the Limit of Vectorized Polynomial Multiplication for NTRU Prime
Vincent Hwang
Vincent Hwang
TFHE Public-Key Encryption Revisited
Marc Joye
Marc Joye
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat, LaKyah Tyner
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat, LaKyah Tyner
Threshold Cryptosystems Based on $2^k$-th Power Residue Symbols
George Teseleanu
George Teseleanu
Improving and Automating BFV Parameters Selection: An Average-Case Approach
Beatrice Biasioli, Chiara Marcolla, Marco Calderini, and Johannes Mono
Beatrice Biasioli, Chiara Marcolla, Marco Calderini, and Johannes Mono
A Note on a CBC-Type Mode of Operation
George Teseleanu
George Teseleanu
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold
Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bunz, and Ling Ren
Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bunz, and Ling Ren
FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models
Songze Li, Duanyi Yao, Jin Liu
Songze Li, Duanyi Yao, Jin Liu
Time Complexities of Multiple-precision Modular Operations and Related Ratios
Shenghui Su, Ping Luo
Shenghui Su, Ping Luo
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
Semidirect Product Key Exchange: the State of Play
Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
Implementing and Optimizing Matrix Triples with Homomorphic Encryption
Johannes Mono, Tim Güneysu
Johannes Mono, Tim Güneysu
Blockchain Large Language Models
Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais
Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, and Siu-Ming Yiu
Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, and Siu-Ming Yiu
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure
Francesco Berti
Francesco Berti
$\texttt{CryptographicEstimators}$: a Software Library for Cryptographic Hardness Estimation
Andre Esser, Javier Verbel, Floyd Zweydinger, Emanuele Bellini
Andre Esser, Javier Verbel, Floyd Zweydinger, Emanuele Bellini
Wave Parameter Selection
Nicolas Sendrier
Nicolas Sendrier
Proof-Carrying Data From Arithmetized Random Oracles
Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner
Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner
A Novel Preprocessing-Free Proofless Verifiable Computation Scheme from Integer Factoring
Alex Dalton, David Thomas, and Peter Cheung
Alex Dalton, David Thomas, and Peter Cheung
Two Party Fair Exchange
Alex Dalton, David Thomas, and Peter Cheung
Alex Dalton, David Thomas, and Peter Cheung
General-Purpose Secure Conflict-free Replicated Data Types
Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes
Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies
Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel
Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel
New NTRU Records with Improved Lattice Bases
Elena Kirshanova, Alexander May, Julian Nowakowski
Elena Kirshanova, Alexander May, Julian Nowakowski
A security analysis on MQ-Sign
Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda
Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda
Neural-Linear Attack Based on Distribution Data and Its Application on DES
Rui Zhou, Ming Duan, Qi Wang, Qianqiong Wu, Sheng Guo, Lulu Guo, Zheng Gong
Rui Zhou, Ming Duan, Qi Wang, Qianqiong Wu, Sheng Guo, Lulu Guo, Zheng Gong
Revealing the Secrets of Radio-Enabled Embedded Systems: on extraction of raw information from any on-board signal through RF
Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi
Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi
DORAM revisited: Maliciously secure RAM-MPC with logarithmic overhead
Brett Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
Brett Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, and Jacob Zhang
Exploring Formal Methods for Cryptographic Hash Function Implementations
Nicky Mouha
Nicky Mouha
IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things
Elnaz Mehraein and Reza Nourmohammadi
Elnaz Mehraein and Reza Nourmohammadi
On Central Bank Digital Currency: A composable treatment
István Vajda
István Vajda
A Randomized Bit Generator using Algebraic Number Theory
Ajay Dabral
Ajay Dabral
HyperNova: Recursive arguments for customizable constraint systems
Abhiram Kothapalli and Srinath Setty
Abhiram Kothapalli and Srinath Setty
Scalable Private Signaling
Sashidhar Jakkamsetti, Zeyu Liu, and Varun Madathil
Sashidhar Jakkamsetti, Zeyu Liu, and Varun Madathil
Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds
Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi
Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi
Black-Box Separations for Non-Interactive Commitments in a Quantum World
Kai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody
Kai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody
From Polynomial IOP and Commitments to Non-malleable zkSNARKs
Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, and Michal Zajac
Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, and Michal Zajac
Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE
Marc Titus Trifan, Alexandru Nicolau, Alexander Veidenbaum
Marc Titus Trifan, Alexandru Nicolau, Alexander Veidenbaum
hinTS: Threshold Signatures with Silent Setup
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures
Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song
Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded
Pratish Datta, Tapas Pal
Pratish Datta, Tapas Pal
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)
James Bartusek, Dakshita Khurana, Akshayaram Srinivasan
James Bartusek, Dakshita Khurana, Akshayaram Srinivasan
FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation
Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
Cryptanalysis of Strong Physically Unclonable Functions
Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede
Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede
vr$^2$FHE- Securing FHE from Reaction-based Key Recovery Attacks
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
A Framework for Practical Anonymous Credentials from Lattices
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Alessandro Sorniotti
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Alessandro Sorniotti
Weakening Assumptions for Publicly-Verifiable Deletion
James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, and Michael Walter
James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, and Michael Walter
A Multireceiver Certificateless Signcryption (MCLS) Scheme
Alia Umrani, Apurva K Vangujar, and Paolo Palmieri
Alia Umrani, Apurva K Vangujar, and Paolo Palmieri
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time
Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
Quantum-access Security of Hash-based Signature Schemes
Quan Yuan, Mehdi Tibouchi, Masayuki Abe
Quan Yuan, Mehdi Tibouchi, Masayuki Abe
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning
Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
Hybrid Encryption Scheme based on Polar Codes
Reza Hooshmand
Reza Hooshmand
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain
Ren Taguchi, Atsushi Takayasu
Ren Taguchi, Atsushi Takayasu
Customizable constraint systems for succinct arguments
Srinath Setty, Justin Thaler, Riad Wahby
Srinath Setty, Justin Thaler, Riad Wahby
Breaking DPA-protected Kyber via the pair-pointwise multiplication
Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Łukasz Chmielewski, Kirthivaasan Puniamurthy, and Milan Šorf
Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Łukasz Chmielewski, Kirthivaasan Puniamurthy, and Milan Šorf
New Baselines for Local Pseudorandom Number Generators by Field Extensions
Akin Ünal
Akin Ünal
Weak instances of class group action based cryptography via self-pairings
Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren
Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren
Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures
Ahmet Ramazan Ağırtaş, Oğuz Yayla
Ahmet Ramazan Ağırtaş, Oğuz Yayla
Certifying Zero-Knowledge Circuits with Refinement Types
Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Işıl Dillig, and Yu Feng
Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Işıl Dillig, and Yu Feng
Horizontal Correlation Attack on Classic McEliece
Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Drăgoi
Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Drăgoi
Improved Universal Thresholdizer from Iterative Shamir Secret Sharing
Jung Hee Cheon, Wonhee Cho, and Jiseung Kim
Jung Hee Cheon, Wonhee Cho, and Jiseung Kim
PARMESAN: Parallel ARithMEticS over ENcrypted data
Jakub Klemsa, Melek Önen
Jakub Klemsa, Melek Önen
Pseudorandomness with Proof of Destruction and Applications
Amit Behera, Zvika Brakerski, Or Sattath, and Omri Shmueli
Amit Behera, Zvika Brakerski, Or Sattath, and Omri Shmueli
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium
Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, and Andrea Visconti
Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, and Andrea Visconti
Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper)
Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang
Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang
MAYO: Optimized Implementation with Revised Parameters for ARMv7-M
Arianna Gringiani, Alessio Meneghetti, Edoardo Signorini, Ruggero Susella
Arianna Gringiani, Alessio Meneghetti, Edoardo Signorini, Ruggero Susella
Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards
Alexander May and Carl Richard Theodor Schneider
Alexander May and Carl Richard Theodor Schneider
Publicly Verifiable Deletion from Minimal Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
Algebraic Cryptanalysis of HADES Design Strategy: Application to POSEIDON and Poseidon2
Tomer Ashur, Thomas Buschman, and Mohammad Mahzoun
Tomer Ashur, Thomas Buschman, and Mohammad Mahzoun
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience
Victor Shoup and Nigel P. Smart
Victor Shoup and Nigel P. Smart
Practical Randomized Lattice Gadget Decomposition With Application to FHE
Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
Group Oblivious Message Retrieval
Zeyu Liu, Eran Tromer, and Yunhao Wang
Zeyu Liu, Eran Tromer, and Yunhao Wang
Injection-Secure Structured and Searchable Symmetric Encryption
Ghous Amjad, Seny Kamara, Tarik Moataz
Ghous Amjad, Seny Kamara, Tarik Moataz
HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption
Shuang Wu, Chunhuan Zhao, Ye Yuan, Shuzhou Sun, Jie Li, Yamin Liu
Shuang Wu, Chunhuan Zhao, Ye Yuan, Shuzhou Sun, Jie Li, Yamin Liu
Practical Randomness Measure Tool
Boaz Shahar
Boaz Shahar
Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires
Raine Nieminen, Thomas Schneider
Raine Nieminen, Thomas Schneider
Secure Communication in Dynamic Incomplete Networks
Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov
Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov
NP-Hardness of Approximating Meta-Complexity: A Cryptographic Approach
Yizhi Huang, Rahul Ilango, Hanlin Ren
Yizhi Huang, Rahul Ilango, Hanlin Ren
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree
Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, and Cheng Hong
Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, and Cheng Hong
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More
Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart
Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart
Error Correction and Ciphertext Quantization in Lattice Cryptography
Daniele Micciancio, Mark Schultz
Daniele Micciancio, Mark Schultz
AI Resistant (AIR) Cryptography
Gideon Samid
Gideon Samid
Adding more parallelism to the AEGIS authenticated encryption algorithms
Frank Denis
Frank Denis
SAFE: Sponge API for Field Elements
JP Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine
JP Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation
David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
Generic Security of the SAFE API and Its Applications
Dmitry Khovratovich, Mario Marhuenda Beltrán, and Bart Mennink
Dmitry Khovratovich, Mario Marhuenda Beltrán, and Bart Mennink
Generalized Inverse Binary Matrix Construction with PKC Application
Farshid Haidary Makoui, Thomas Aaron Guliver
Farshid Haidary Makoui, Thomas Aaron Guliver
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited
Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang
Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
Aikata Aikata, Andrea Basso, Gaetan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy
Aikata Aikata, Andrea Basso, Gaetan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy
3-Party Secure Computation for RAMs: Optimal and Concretely Efficient
Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi
Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi
stoRNA: Stateless Transparent Proofs of Storage-time
Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh
Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh
Black-Box Reusable NISC with Random Oracles
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Sublinear Secure Computation from New Assumptions
Elette Boyle, Geoffroy Couteau, Pierre Meyer
Elette Boyle, Geoffroy Couteau, Pierre Meyer
Automated Detection of Underconstrained Circuits for Zero-Knowledge Proofs
Shankara Pailoor, Yanju Chen, Franklyn Wang, Clara Rodríguez, Jacob Van Gaffen, Jason Morton, Michael Chu, Brian Gu, Yu Feng, Isil Dillig
Shankara Pailoor, Yanju Chen, Franklyn Wang, Clara Rodríguez, Jacob Van Gaffen, Jason Morton, Michael Chu, Brian Gu, Yu Feng, Isil Dillig
$\text{MP}\ell\circ \mathrm{C}$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation
Dimitris Mouris, Charles Gouert, and Nektarios Georgios Tsoutsos
Dimitris Mouris, Charles Gouert, and Nektarios Georgios Tsoutsos
Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model
Anit Kumar Ghosal and Dipanwita Roychowdhury
Anit Kumar Ghosal and Dipanwita Roychowdhury
Non-malleable Codes from Authenticated Encryption in Split-State Model
Anit Kumar Ghosal, Dipanwita Roychowdhury
Anit Kumar Ghosal, Dipanwita Roychowdhury
Computing Isogenies of Power-Smooth Degrees Between PPAVs
Jesús-Javier Chi-Domínguez, Amalia Pizarro-Madariaga, and Edgardo Riquelme
Jesús-Javier Chi-Domínguez, Amalia Pizarro-Madariaga, and Edgardo Riquelme
Low Memory Attacks on Small Key CSIDH
Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices
George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
Side-Channel Analysis of Integrate-and-Fire Neurons within Spiking Neural Networks
Matthias Probst, Manuel Brosch, Georg Sigl
Matthias Probst, Manuel Brosch, Georg Sigl
Private Computation Based On Polynomial Operation
Shuailiang Hu
Shuailiang Hu
Neural Network Quantisation for Faster Homomorphic Encryption
Wouter Legiest, Furkan Turan, Michiel Van Beirendonck, Jan-Pieter D'Anvers, and Ingrid Verbauwhede
Wouter Legiest, Furkan Turan, Michiel Van Beirendonck, Jan-Pieter D'Anvers, and Ingrid Verbauwhede
Laconic Function Evaluation for Turing Machines
Nico Döttling, Phillip Gajland, Giulio Malavolta
Nico Döttling, Phillip Gajland, Giulio Malavolta
New Ways to Garble Arithmetic Circuits
Marshall Ball, Hanjun Li, Huijia Lin, Tianren Liu
Marshall Ball, Hanjun Li, Huijia Lin, Tianren Liu
Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution
Giulio Malavolta and Michael Walter
Giulio Malavolta and Michael Walter
FLUTE: Fast and Secure Lookup Table Evaluations (Full Version)
Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
Subset-optimized BLS Multi-signature with Key Aggregation
Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Francois Garillot, Jonas Lindstrom, Ben Riva, Arnab Roy, Mahdi Sedaghat, Alberto Sonnino, Pun Waiwitlikhit, and Joy Wang
Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Francois Garillot, Jonas Lindstrom, Ben Riva, Arnab Roy, Mahdi Sedaghat, Alberto Sonnino, Pun Waiwitlikhit, and Joy Wang
Upper bounding the number of bent functions using 2-row bent rectangles
Sergey Agievich
Sergey Agievich
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect
Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang
Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang
On the algebraic immunity of weightwise perfectly balanced functions
Agnese Gini and Pierrick Méaux
Agnese Gini and Pierrick Méaux
Spartan and Bulletproofs are simulation-extractable (for free!)
Quang Dao, Paul Grubbs
Quang Dao, Paul Grubbs
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU
Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, and Yulian Sun
Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, and Yulian Sun
Batch Signatures, Revisited
Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano
Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano
On the Security of Blind Signatures in the Multi-Signer Setting
Samuel Bedassa Alemu, Julia Kastner
Samuel Bedassa Alemu, Julia Kastner
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions
Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, and Takashi Yamakawa
Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, and Takashi Yamakawa
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices
Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier
Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier
$k$-SUM in the Sparse Regime
Shweta Agrawal, Sagnik Saha, Nikolaj Ignatieff Schwartzbach, Akhil Vanukuri, and Prashant Nalini Vasudevan
Shweta Agrawal, Sagnik Saha, Nikolaj Ignatieff Schwartzbach, Akhil Vanukuri, and Prashant Nalini Vasudevan
On the State of Crypto-Agility
Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer
Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning
Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, and Tal Rabin
Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, and Tal Rabin
Practically-exploitable Cryptographic Vulnerabilities in Matrix
Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones
Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones
SCA Evaluation and Benchmarking of Finalists in the NIST Lightweight Cryptography Standardization Process
Kamyar Mohajerani, Luke Beckwith, Abubakr Abdulgadir, Eduardo Ferrufino, Jens-Peter Kaps, Kris Gaj
Kamyar Mohajerani, Luke Beckwith, Abubakr Abdulgadir, Eduardo Ferrufino, Jens-Peter Kaps, Kris Gaj
Unbounded Predicate Inner Product Functional Encryption from Pairings
Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
Homomorphic Trapdoors for Identity-based and Group Signatures
Buvana Ganesh, Apurva Vangujar, Alia Umrani, Paolo Palmieri
Buvana Ganesh, Apurva Vangujar, Alia Umrani, Paolo Palmieri
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption
Johannes Ernst, Aikaterini Mitrokotsa
Johannes Ernst, Aikaterini Mitrokotsa
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications
Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas
Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
TENET : Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup
Hyeonbum Lee, Jae Hong Seo
Hyeonbum Lee, Jae Hong Seo
Separations among formulations of non-malleable encryption under valid ciphertext condition
Yodai Watanabe
Yodai Watanabe
A private set intersection protocol based on multi-party quantum computation for greatest common divisor
Muhammad Imran
Muhammad Imran
The Jacobi Symbol Problem for Quadratic Congruences and Applications to Cryptography
Ferucio Laurențiu Țiplea
Ferucio Laurențiu Țiplea
eSTARK: Extending STARKs with Arguments
Héctor Masip-Ardevol, Marc Guzmán-Albiol, Jordi Baylina-Melé, Jose Luis Muñoz-Tapia
Héctor Masip-Ardevol, Marc Guzmán-Albiol, Jordi Baylina-Melé, Jose Luis Muñoz-Tapia
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System
Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno
Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL
Roi Bar-Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar
Roi Bar-Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar
Compact Aggregate Signature from Module-Lattices
Toi Tomita and Junji Shikata
Toi Tomita and Junji Shikata
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges
Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, and Mélissa Rossi
Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, and Mélissa Rossi
Four Attacks and a Proof for Telegram
Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs
Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs
A new approach on IoT security: n-out-of-n
Tuğberk KOCATEKİN, Cafer ÇALIŞKAN
Tuğberk KOCATEKİN, Cafer ÇALIŞKAN
Secure Floating-Point Training
Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
Don't be Dense: Efficient Keyword PIR for Sparse Databases
Sarvar Patel, Joon Young Seo, Kevin Yeo
Sarvar Patel, Joon Young Seo, Kevin Yeo
RPU: The Ring Processing Unit
Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel Thari Moopan, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen
Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel Thari Moopan, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen
A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices
Johannes Blömer, Jan Bobolz, and Laurens Porzenheim
Johannes Blömer, Jan Bobolz, and Laurens Porzenheim
Simplex Consensus: A Simple and Fast Consensus Protocol
Benjamin Y Chan, Rafael Pass
Benjamin Y Chan, Rafael Pass
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice
Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius
Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius
Deep Learning based Differential Classifier of PRIDE and RC5
Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury
Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury
A unified construction of weightwise perfectly balanced Boolean functions
Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng
Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng
SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks...
Moshe Avital, Itamar Levi
Moshe Avital, Itamar Levi
Non-interactive Universal Arguments
Nir Bitansky, Omer Paneth, Dana Shamir, Tomer Solomon
Nir Bitansky, Omer Paneth, Dana Shamir, Tomer Solomon
Registered FE beyond Predicates: (Attribute-Based) Linear Functions and more
Pratish Datta, Tapas Pal, and Shota Yamada
Pratish Datta, Tapas Pal, and Shota Yamada
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems
Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz
Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz
Tri-State Circuits: A Circuit Model that Captures RAM
David Heath, Vladimir Kolesnikov, and Rafail Ostrovsky
David Heath, Vladimir Kolesnikov, and Rafail Ostrovsky
Wireless-channel Key Exchange
Afonso Arriaga, Petra Sala, Marjan Škrobot
Afonso Arriaga, Petra Sala, Marjan Škrobot
An algebraic attack for forging signatures of MPPK/DS
Hao Guo
Hao Guo
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation
Mingxun Zhou, Andrew Park, Elaine Shi, and Wenting Zheng
Mingxun Zhou, Andrew Park, Elaine Shi, and Wenting Zheng
Non-interactive VSS using Class Groups and Application to DKG
Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, and Sri Aravinda Krishnan Thyagarajan
Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, and Sri Aravinda Krishnan Thyagarajan
Unlocking doors from half a continent away: A relay attack against HID Seos
Sam Haskins, Trevor Stevado
Sam Haskins, Trevor Stevado
Multidimensional Approximate Agreement with Asynchronous Fallback
Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
Generalized Inverse Matrix Construction for Code Based Cryptography
Farshid Haidary Makoui, T. Aaron Gulliver
Farshid Haidary Makoui, T. Aaron Gulliver
Provable Lattice Reduction of $\mathbb Z^n$ with Blocksize $n/2$
Léo Ducas
Léo Ducas
Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets
Corentin Jeudy, Adeline Roux-Langlois, and Olivier Sanders
Corentin Jeudy, Adeline Roux-Langlois, and Olivier Sanders
Fully Adaptive Schnorr Threshold Signatures
Elizabeth Crites, Chelsea Komlo, and Mary Maller
Elizabeth Crites, Chelsea Komlo, and Mary Maller
Compact Bounded-Collusion Identity-based Encryption via Group Testing
Shingo Sato, Junji Shikata
Shingo Sato, Junji Shikata
Abstraction Model of Probing and DFA Attacks on Block Ciphers
Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama
Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama
Non-interactive privacy-preserving naive Bayes classifier using homomorphic encryption
Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, Guanci Yang
Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, Guanci Yang
Unconditionally secure ciphers with a short key for a source with unknown statistics
Boris Ryabko
Boris Ryabko
On the Possibility of a Backdoor in the Micali-Schnorr Generator
Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl
Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition
Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung
Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung
Minimal $p$-ary codes via the direct sum of functions, non-covering permutations and subspaces of derivatives
René Rodríguez, Enes Pasalic, Fengrong Zhang, and Yongzhuang Wei
René Rodríguez, Enes Pasalic, Fengrong Zhang, and Yongzhuang Wei
Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol
Benjamin Case, Richa Jain, Alex Koshelev, Andy Leiserson, Daniel Masny, Thurston Sandberg, Ben Savage, Erik Taubeneck, Martin Thomson, Taiki Yamaguchi
Benjamin Case, Richa Jain, Alex Koshelev, Andy Leiserson, Daniel Masny, Thurston Sandberg, Ben Savage, Erik Taubeneck, Martin Thomson, Taiki Yamaguchi
SQISignHD: New Dimensions in Cryptography
Pierrick Dartois, Antonin Leroux, Damien Robert, and Benjamin Wesolowski
Pierrick Dartois, Antonin Leroux, Damien Robert, and Benjamin Wesolowski
Optimal Security Notion for Decentralized Multi-Client Functional Encryption
Ky Nguyen, Duong Hieu Phan, David Pointcheval
Ky Nguyen, Duong Hieu Phan, David Pointcheval
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography
Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
Efficiency of SIDH-based signatures (yes, SIDH)
Wissam Ghantous, Federico Pintore, Mattia Veroni
Wissam Ghantous, Federico Pintore, Mattia Veroni
Practical key-recovery attack on MQ-Sign
Thomas Aulbach, Simona Samardjiska, and Monika Trimoska
Thomas Aulbach, Simona Samardjiska, and Monika Trimoska
Ruffle: Rapid 3-party shuffle protocols
Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
CPU to FPGA Power Covert Channel in FPGA-SoCs
Mathieu Gross, Robert Kunzelmann, Georg Sigl
Mathieu Gross, Robert Kunzelmann, Georg Sigl
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory
Yu Li and Li-Ping Wang
Yu Li and Li-Ping Wang
SPRINT: High-Throughput Robust Distributed Schnorr Signatures
Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, and Tal Rabin
Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, and Tal Rabin
A Tightly Secure Identity-based Signature Scheme from Isogenies
Hyungrok Jo, Shingo Sato, Junji Shikata
Hyungrok Jo, Shingo Sato, Junji Shikata
Generic Construction of Dual-Server Public Key Authenticated Encryption with Keyword Search
Keita Emura
Keita Emura
A Duality Between One-Way Functions and Average-Case Symmetry of Information
Shuichi Hirahara, Rahul Ilango, Zhenjian Lu, Mikito Nanashima, Igor C. Oliveira
Shuichi Hirahara, Rahul Ilango, Zhenjian Lu, Mikito Nanashima, Igor C. Oliveira
A Note on Hybrid Signature Schemes
Nina Bindel, Britta Hale
Nina Bindel, Britta Hale
A Differential Fault Attack against Deterministic Falcon Signatures
Sven Bauer, Fabrizio De Santis
Sven Bauer, Fabrizio De Santis
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation
Islam Faisal
Islam Faisal
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger
Laurane Marco, Abdullah Talayhan, Serge Vaudenay
Laurane Marco, Abdullah Talayhan, Serge Vaudenay
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices
Nick Frymann, Daniel Gardham, Mark Manulis
Nick Frymann, Daniel Gardham, Mark Manulis
The Round Complexity of Statistical MPC with Optimal Resiliency
Benny Applebaum, Eliran Kachlon, Arpita Patra
Benny Applebaum, Eliran Kachlon, Arpita Patra
Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers
Isaac A. Canales-Martínez and Igor Semaev
Isaac A. Canales-Martínez and Igor Semaev
Single Instance Self-Masking via Permutations
Asaf Cohen, Paweł Cyprys, and Shlomi Dolev
Asaf Cohen, Paweł Cyprys, and Shlomi Dolev
Maximally-Fluid MPC with Guaranteed Output Delivery
Giovanni Deligios, Aarushi Goel, Chen-Da Liu-Zhang
Giovanni Deligios, Aarushi Goel, Chen-Da Liu-Zhang
Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials
Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A Wood
Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A Wood
Accelerating HE Operations from Key Decomposition Technique
Miran Kim, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
Miran Kim, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
Keita Emura
Keita Emura
An Overview of Hash Based Signatures
Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath
Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath
Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World
Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, and João Ribeiro
Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, and João Ribeiro
Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance
Jiaxin Guan, Daniel Wichs, Mark Zhandry
Jiaxin Guan, Daniel Wichs, Mark Zhandry
Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$
Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, and Pierre-Yves Strub
Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, and Pierre-Yves Strub
Game Theoretical Analysis of DAG-Ledgers Backbone
Yackolley Amoussou-Guenou, Simone Galimberti, and Maria Potop-Butucaru
Yackolley Amoussou-Guenou, Simone Galimberti, and Maria Potop-Butucaru
Quasi-linear masking to protect against both SCA and FIA
Claude Carlet, Abderrahman Daif, Sylvain Guilley, and Cédric Tavernier
Claude Carlet, Abderrahman Daif, Sylvain Guilley, and Cédric Tavernier
CaSCaDE: (Time-Based) Cryptography from Space Communications DElay
Carsten Baum, Bernardo David, Elena Pagnin, and Akira Takahashi
Carsten Baum, Bernardo David, Elena Pagnin, and Akira Takahashi
Efficient Laconic Cryptography from Learning With Errors
Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi
Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi
Real-World Deniability in Messaging
Daniel Collins, Simone Colombo, and Loïs Huguenin-Dumittan
Daniel Collins, Simone Colombo, and Loïs Huguenin-Dumittan
Discretization Error Reduction for Torus Fully Homomorphic Encryption
Kang Hoon Lee, Ji Won Yoon
Kang Hoon Lee, Ji Won Yoon
Generic Construction of Broadcast Authenticated Encryption with Keyword Search
Keita Emura
Keita Emura
Prime Match: A Privacy-Preserving Inventory Matching System
Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso
Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso
High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka
Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang
Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang
A New Linear Distinguisher for Four-Round AES
Tomer Ashur, Erik Takke
Tomer Ashur, Erik Takke
Extended Abstract: HotStuff-2: Optimal Two-Phase Responsive BFT
Dahlia Malkhi, Kartik Nayak
Dahlia Malkhi, Kartik Nayak
Monomial Isomorphism for Tensors and Applications to Code Equivalence Problems
Giuseppe D'Alconzo
Giuseppe D'Alconzo
Registered (Inner-Product) Functional Encryption
Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, and Daniele Venturi
Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, and Daniele Venturi
Fork-Resilient Continuous Group Key Agreement
Joël Alwen, Marta Mularczyk, and Yiannis Tselekounis
Joël Alwen, Marta Mularczyk, and Yiannis Tselekounis
cqlin: Efficient linear operations on KZG commitments with cached quotients
Liam Eagen and Ariel Gabizon
Liam Eagen and Ariel Gabizon
Locally Covert Learning
Justin Holmgren, Ruta Jawale
Justin Holmgren, Ruta Jawale
Additional Modes for ASCON
Rhys Weatherley
Rhys Weatherley
Hashing to elliptic curves through Cipolla–Lehmer–Müller’s square root algorithm
Dmitrii Koshelev
Dmitrii Koshelev
TIDAL: Practical Collisions on State-Reduced Keccak Variants
Sahiba Suryawanshi, Dhiman Saha, Shashwat jaiswal
Sahiba Suryawanshi, Dhiman Saha, Shashwat jaiswal
Non-Interactive Blind Signatures for Random Messages
Lucjan Hanzlik
Lucjan Hanzlik
Constrained Pseudorandom Functions from Homomorphic Secret Sharing
Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
Interoperability in End-to-End Encrypted Messaging
Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler
Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem
Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, and Violetta Weger
Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, and Violetta Weger
Origami: Fold a Plonk for Ethereum’s VDF
zhenfei zhang
zhenfei zhang
The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity
Gideon Samid
Gideon Samid
On Homomorphic Secret Sharing from Polynomial-Modulus LWE
Thomas Attema, Pedro Capitão, Lisa Kohl
Thomas Attema, Pedro Capitão, Lisa Kohl
Nakamoto Consensus under Bounded Processing Capacity
Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, and David Tse
Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, and David Tse
Security Analysis of Signature Schemes with Key Blinding
Edward Eaton, Tancrède Lepoint, Christopher A. Wood
Edward Eaton, Tancrède Lepoint, Christopher A. Wood
Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority
Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE
Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, and Andrew Miller
Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, and Andrew Miller
FuLeeca: A Lee-based Signature Scheme
Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh
Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh
Efficient computation of $(3^n,3^n)$-isogenies
Thomas Decru, Sabrina Kunzweiler
Thomas Decru, Sabrina Kunzweiler
Accelerating exp-log based finite field multiplication
Nicolas Belleville
Nicolas Belleville
Practical-Time Related-Key Attack on GOST with Secret S-boxes
Orr Dunkelman, Nathan Keller, Ariel Weizman
Orr Dunkelman, Nathan Keller, Ariel Weizman
Consensus Algorithm Using Transaction History for Cryptocurrency
Yuuki Komi, Takayuki Tatekawa
Yuuki Komi, Takayuki Tatekawa
Practically Solving LPN in High Noise Regimes Faster Using Neural Networks
Haozhe Jiang, Kaiyue Wen, Yilei Chen
Haozhe Jiang, Kaiyue Wen, Yilei Chen
PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning
Scott Griffy, Anna Lysyanskaya
Scott Griffy, Anna Lysyanskaya
Publicly-Verifiable Deletion via Target-Collapsing Functions
James Bartusek, Dakshita Khurana, and Alexander Poremba
James Bartusek, Dakshita Khurana, and Alexander Poremba
LURK: Lambda, the Ultimate Recursive Knowledge
Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong
Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong
AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack
Naina Gupta, Arpan Jati, Anupam Chattopadhyay
Naina Gupta, Arpan Jati, Anupam Chattopadhyay
Practical Attacks on Small Private Exponent RSA: New Records and New Insights
Qiang Li, Qun-xiong Zheng, and Wen-feng Qi
Qiang Li, Qun-xiong Zheng, and Wen-feng Qi
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications
Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide
Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide
Verifiable encodings in multigroup fully homomorphic encryption
Ramsès Fernàndez-València
Ramsès Fernàndez-València
Zero-Knowledge Arguments for Subverted RSA Groups
Dimitris Kolonelos, Mary Maller, and Mikhail Volkhov
Dimitris Kolonelos, Mary Maller, and Mikhail Volkhov
Composable Long-Term Security with Rewinding
Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber
Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber
Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies
Or Sattath and Shai Wyborski
Or Sattath and Shai Wyborski
Authenticated Encryption for Very Short Inputs
Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata
Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata
Fast and Efficient Code-Based Digital Signature with Dual Inverse Matrix
Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian
Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC
Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Kuesters
Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Kuesters
Efficient Code Based Cryptosystem with Dual Inverse Matrix
Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian
Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian
FFT-less TFHE: Simpler, Faster and Scale-invariant
Zhen Gu, Wen-jie Lu, Cheng Hong
Zhen Gu, Wen-jie Lu, Cheng Hong
Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!
Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
Improved Differential Analysis of MIBS Based on Greedy Algorithm
Jian Liu, Yanjun Li, Runyi Liu, Jian Zou, Zhiqiang Wang
Jian Liu, Yanjun Li, Runyi Liu, Jian Zou, Zhiqiang Wang
Guessing Less and Better: Improved Attacks on GIFT-64
Federico Canale, María Naya-Plasencia
Federico Canale, María Naya-Plasencia
Searching for S-boxes with better Diffusion using Evolutionary Algorithm
Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu
Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu
Post-Quantum Security for the Extended Access Control Protocol
Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, and Holger Bock
Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, and Holger Bock
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from DLP or LWE
Yoshinori Aono and Junji Shikata
Yoshinori Aono and Junji Shikata
Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption
Leonard Assouline, Brice Minaud
Leonard Assouline, Brice Minaud
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu
Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
Programmable Payment Channels
Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Duc V. Le, and Mahdi Zamani
Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Duc V. Le, and Mahdi Zamani
How to achieve bidirectional zero-knowledge authentication?
Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan
Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan
Encryption with Quantum Public Keys
Alex B. Grilo, Or Sattath, Quoc-Huy Vu
Alex B. Grilo, Or Sattath, Quoc-Huy Vu
Quantum Search-to-Decision Reduction for the LWE Problem
Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida
Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida
A Map of Witness Maps: New Definitions and Connections
Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
TurboSHAKE
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais
Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais
SALSA PICANTE: a machine learning attack on LWE with binary secrets
Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, and Kristin Lauter
Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, and Kristin Lauter
An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES
Christopher Dunne
Christopher Dunne
Shield: Secure Allegation Escrow System with Stronger Guarantees
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
Quantum Implementation of AIM: Aiming for Low-Depth
Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, and Hwajeong Seo
Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, and Hwajeong Seo
A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption
Apurva K Vangujar, Buvana Ganesh, Alia Umrani, Paolo Palmieri
Apurva K Vangujar, Buvana Ganesh, Alia Umrani, Paolo Palmieri
Separating Oil and Vinegar with a Single Trace
Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
A Generic Transform from Multi-Round Interactive Proof to NIZK
Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen
Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen
Secret Sharing Scheme with Perfect Concealment
Izumi Takeuti, Tomoko Adachi
Izumi Takeuti, Tomoko Adachi
Asymmetric Group Message Franking: Definitions & Constructions
Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng
Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms
Nicky Mouha, Christopher Celi
Nicky Mouha, Christopher Celi
Perfect MPC over Layered Graphs
Bernardo David, Yuval Ishai, Anders Konring, Eyal Kushilevitz, and Varun Narayanan
Bernardo David, Yuval Ishai, Anders Konring, Eyal Kushilevitz, and Varun Narayanan
Caveat Implementor! Key Recovery Attacks on MEGA
Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson
Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson
The state diagram of $\chi$
Jan Schoone and Joan Daemen
Jan Schoone and Joan Daemen
Nested Quantum Search Model on Symmetric Ciphers and Its Applications
Yangru Zheng, Juntao Gao, Baocang Wang
Yangru Zheng, Juntao Gao, Baocang Wang
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality
Jean Liénardy, Frédéric Lafitte
Jean Liénardy, Frédéric Lafitte
Revocable Cryptography from Learning with Errors
Prabhanjan Ananth, Alexander Poremba, and Vinod Vaikuntanathan
Prabhanjan Ananth, Alexander Poremba, and Vinod Vaikuntanathan
LATKE: A Framework for Constructing Identity-Binding PAKEs
Jonathan Katz and Michael Rosenberg
Jonathan Katz and Michael Rosenberg
Poseidon2: A Faster Version of the Poseidon Hash Function
Lorenzo Grassi, Dmitry Khovratovich, and Markus Schofnegger
Lorenzo Grassi, Dmitry Khovratovich, and Markus Schofnegger
Differential Fault Attack on Rasta and $\text {FiLIP} _ {\text {DSM}}$
R Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy
R Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy
A Holistic Security Analysis of Monero Transactions
Cas Cremers, Julian Loss, and Benedikt Wagner
Cas Cremers, Julian Loss, and Benedikt Wagner
Anonymous Counting Tokens
Fabrice Benhamouda, Mariana Raykova, and Karn Seth
Fabrice Benhamouda, Mariana Raykova, and Karn Seth
A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values
Reza Ghasemi
Reza Ghasemi
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography
Danilo Gligoroski
Danilo Gligoroski
The special case of cyclotomic fields in quantum algorithms for unit groups
Razvan Barbulescu, Adrien Poulalion
Razvan Barbulescu, Adrien Poulalion
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers
Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang
Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang
SoK on Blockchain Evolution and a Taxonomy for Public Blockchain Generations
Thuat Do
Thuat Do
Memory-Tight Multi-Challenge Security of Public-Key Encryption
Joseph Jaeger, Akshaya Kumar
Joseph Jaeger, Akshaya Kumar
SoK: Metadata-Protecting Communication Systems
Sajin Sasy, Ian Goldberg
Sajin Sasy, Ian Goldberg
BIP32-Compatible Threshold Wallets
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, and Siavash Riahi
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, and Siavash Riahi
Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States
Léo Colisson, Garazi Muguruza, and Florian Speelman
Léo Colisson, Garazi Muguruza, and Florian Speelman
Ramen: Souper Fast Three-Party Computation for RAM Programs
Lennart Braun, Mahak Pancholi, Rahul Rachuri, and Mark Simkin
Lennart Braun, Mahak Pancholi, Rahul Rachuri, and Mark Simkin
Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside
Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin
Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece
Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi
Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi
SUPERPACK: Dishonest Majority MPC with Constant Online Communication
Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions
Khashayar Barooti, Giulio Malavolta, Michael Walter
Khashayar Barooti, Giulio Malavolta, Michael Walter
A Novel Related Nonce Attack for ECDSA
Marco Macchetti
Marco Macchetti
On homomorphic encryption using abelian groups: Classical security analysis
Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski
Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski
Fusion One-Time Non-Interactively-Aggregatable Digital Signatures From Lattices
Brandon Goodell, Aaron Feickert
Brandon Goodell, Aaron Feickert
Does the Dual-Sieve Attack on Learning with Errors even Work?
Léo Ducas, Ludo Pulles
Léo Ducas, Ludo Pulles
On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption
Kamil Kluczniak and Giacomo Santato
Kamil Kluczniak and Giacomo Santato
CNF Characterization of Sets over $\mathbb{Z}_2^n$ and Its Applications in Cryptography
Hu Xiaobo, Xu Shengyuan, Tu Yinzi, Feng Xiutao
Hu Xiaobo, Xu Shengyuan, Tu Yinzi, Feng Xiutao
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE
Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong
Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA
Mihir Bellare, Hannah Davis, Zijing Di
Mihir Bellare, Hannah Davis, Zijing Di
Authenticated private information retrieval
Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, and Bryan Ford
Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, and Bryan Ford
OpenPubkey: Augmenting OpenID Connect with User held Signing Keys
Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein, and John Merfeld
Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein, and John Merfeld
Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE
Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki
Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson
Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson
Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas
Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan
Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan
A Formal Treatment of Distributed Key Generation, and New Constructions
Chelsea Komlo, Ian Goldberg, Douglas Stebila
Chelsea Komlo, Ian Goldberg, Douglas Stebila
PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation
Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao
Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao
Improved Key Pair Generation for Falcon, BAT and Hawk
Thomas Pornin
Thomas Pornin
Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs
Amos Beimel
Amos Beimel
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation
Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization
Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay
Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay
DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes
Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay
Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay
New Records in Collision Attacks on RIPEMD-160 and SHA-256
Yingxin Li, Fukang Liu, Gaoli Wang
Yingxin Li, Fukang Liu, Gaoli Wang
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data
Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini
Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini
Maximizing Miner Revenue in Transaction Fee Mechanism Design
Ke Wu, Elaine Shi, and Hao Chung
Ke Wu, Elaine Shi, and Hao Chung
Quantum trapdoor functions from classical one-way functions
Andrea Coladangelo
Andrea Coladangelo
Towards A Correct-by-Construction FHE Model
Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang
Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang
A Simple Single Slot Finality Protocol For Ethereum
Francesco D'Amato and Luca Zanolini
Francesco D'Amato and Luca Zanolini
Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience
Francesco D'Amato and Luca Zanolini
Francesco D'Amato and Luca Zanolini
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
Hongrui Cui, Xiao Wang, Kang Yang, and Yu Yu
Hongrui Cui, Xiao Wang, Kang Yang, and Yu Yu
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe
Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe
Threshold and Multi-Signature Schemes from Linear Hash Functions
Stefano Tessaro, Chenzhi Zhu
Stefano Tessaro, Chenzhi Zhu
Revisiting BBS Signatures
Stefano Tessaro and Chenzhi Zhu
Stefano Tessaro and Chenzhi Zhu
Panacea: Non-interactive and Stateless Oblivious RAM
Kelong Cong, Debajyoti Das, Georgio Nicolas, and Jeongeun Park
Kelong Cong, Debajyoti Das, Georgio Nicolas, and Jeongeun Park
Derecho: Privacy Pools with Proof-Carrying Disclosures
Josh Beal, Ben Fisch
Josh Beal, Ben Fisch
A study of KEM generalizations
Bertram Poettering, Simon Rastikian
Bertram Poettering, Simon Rastikian
Swoosh: Efficient Lattice-Based Non-Interactive Key Exchange
Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, and Peter Schwabe
Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, and Peter Schwabe
Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead
Benny Applebaum, Niv Konstantini
Benny Applebaum, Niv Konstantini
Simple Two-Round OT in the Explicit Isogeny Model
Emmanuela Orsini, Riccardo Zanotto
Emmanuela Orsini, Riccardo Zanotto
Verifiable Decentralized Multi-Client Functional Encryption for Inner Product
Dinh Duy Nguyen, Duong Hieu Phan, and David Pointcheval
Dinh Duy Nguyen, Duong Hieu Phan, and David Pointcheval
Proteus: A Pipelined NTT Architecture Generator
Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy
Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments
Panos Kampanakis, Tancrède Lepoint
Panos Kampanakis, Tancrède Lepoint
Software with Certified Deletion
James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, and Bhaskar Roberts
James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, and Bhaskar Roberts
Public Key Encryption with Secure Key Leasing
Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation
Yanbo Chen
Yanbo Chen
Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics
Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella
Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella
A Greedy Global Framework for Lattice Reduction Using Deep Insertions
Sanjay Bhattacherjee, Julio Hernandez-Castro, and Jack Moyler
Sanjay Bhattacherjee, Julio Hernandez-Castro, and Jack Moyler
Webb Protocol: A cross-chain private application and governance protocol.
Drew Stone
Drew Stone
A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper)
Guangqiu Lv, Chenhui Jin, Ting Cui
Guangqiu Lv, Chenhui Jin, Ting Cui
Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption
Jordan Frery, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames, Arthur Meyre
Jordan Frery, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames, Arthur Meyre
Deep Neural Networks for Encrypted Inference with TFHE
Andrei Stoian, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames
Andrei Stoian, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames
Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin
Junqing Gong, Ji Luo, Hoeteck Wee
Junqing Gong, Ji Luo, Hoeteck Wee
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY
Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang
Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang
Mitigating Decentralized Finance Liquidations with Reversible Call Options
Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version)
Zhenzhen Bao, Seongha Hwang, Akiko Inoue, Byeonghak Lee, Jooyoung Lee, Kazuhiko Minematsu
Zhenzhen Bao, Seongha Hwang, Akiko Inoue, Byeonghak Lee, Jooyoung Lee, Kazuhiko Minematsu
Obfuscation of Pseudo-Deterministic Quantum Circuits
James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
Hardware Root-of-Trust implementations in Trusted Execution Environments
Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan
Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies
Dan Boneh, Jiaxin Guan, Mark Zhandry
Dan Boneh, Jiaxin Guan, Mark Zhandry
Anamorphic Encryption, Revisited
Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, and Guilherme Rito
Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, and Guilherme Rito
Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging
Paul Rösler, Daniel Slamanig, Christoph Striecks
Paul Rösler, Daniel Slamanig, Christoph Striecks
A New Sieving-Style Information-Set Decoding Algorithm
Qian Guo, Thomas Johansson, and Vu Nguyen
Qian Guo, Thomas Johansson, and Vu Nguyen
Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium
Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu
Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu
A Detailed Analysis of Fiat-Shamir with Aborts
Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé, and Keita Xagawa
Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé, and Keita Xagawa
Semi-Quantum Copy-Protection and More
Céline Chevalier, Paul Hermouet, and Quoc-Huy Vu
Céline Chevalier, Paul Hermouet, and Quoc-Huy Vu
Memory-Efficient Attacks on Small LWE Keys
Andre Esser, Arindam Mukherjee, and Santanu Sarkar
Andre Esser, Arindam Mukherjee, and Santanu Sarkar
The propagation game: on simulatability, correlation matrices, and probing security
Vittorio Zaccaria
Vittorio Zaccaria
Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher
Munawar Hasan, Donghoon Chang
Munawar Hasan, Donghoon Chang
Pitfalls and Shortcomings for Decompositions and Alignment (Full Version)
Baptiste Lambin, Gregor Leander, Patrick Neumann
Baptiste Lambin, Gregor Leander, Patrick Neumann
Improved Preimage Sampling for Lattices
Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
Certifying Giant Nonprimes
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak
Fast Practical Lattice Reduction through Iterated Compression
Keegan Ryan, Nadia Heninger
Keegan Ryan, Nadia Heninger
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, and Takashi Yamakawa
Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, and Takashi Yamakawa
New Results on Machine Learning Based Distinguishers
Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo
Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness
Rupeng Yang
Rupeng Yang
Complete Characterization of Broadcast and Pseudo-Signatures from Correlations
Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe
Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE
Martin R. Albrecht, Alex Davidson, Amit Deo, and Daniel Gardham
Martin R. Albrecht, Alex Davidson, Amit Deo, and Daniel Gardham
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations
Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur
Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM
Orr Dunkelman, Shibam Ghosh, Eran Lambooij
Orr Dunkelman, Shibam Ghosh, Eran Lambooij
One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More
Fuyuki Kitagawa and Ryo Nishimaki
Fuyuki Kitagawa and Ryo Nishimaki
Authenticated Continuous Key Agreement: Active MitM Detection and Prevention
Benjamin Dowling, Britta Hale
Benjamin Dowling, Britta Hale
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials
Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls
Chun Guo, Lei Wang, Dongdai Lin
Chun Guo, Lei Wang, Dongdai Lin
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
Andrea Basso
Andrea Basso
Improved Power Analysis Attacks on Falcon
Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang
Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability
Chris Peikert, Jiayu Xu
Chris Peikert, Jiayu Xu
A Lightweight Identification Protocol Based on Lattices
Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck
Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck
Bicorn: An optimistically efficient distributed randomness beacon
Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau
Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication
Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood
Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood
Sieving for large twin smooth integers using single solutions to Prouhet-Tarry-Escott
Knud Ahrens
Knud Ahrens
On the Post-Quantum Security of Classical Authenticated Encryption Schemes
Nathalie Lang, Stefan Lucks
Nathalie Lang, Stefan Lucks
Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks
Charlotte Lefevre
Charlotte Lefevre
Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions
Yashvanth Kondi, Claudio Orlandi, and Lawrence Roy
Yashvanth Kondi, Claudio Orlandi, and Lawrence Roy
Formally verifying Kyber Episode IV: Implementation Correctness
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties
Joakim Brorsson and Martin Gunnarsson
Joakim Brorsson and Martin Gunnarsson
Deniable Authentication when Signing Keys Leak
Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, and Guilherme Rito
Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, and Guilherme Rito
Generating Secure Hardware using ChatGPT Resistant to CWEs
Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay
Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay
Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers
Gyeongju Song, Kyungbae Jang, Hwajeong Seo
Gyeongju Song, Kyungbae Jang, Hwajeong Seo
New Generic Constructions of Error-Correcting PIR and Efficient Instantiations
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext
Lichao Wu, Guilherme Perin, Stjepan Picek
Lichao Wu, Guilherme Perin, Stjepan Picek
zkTree: A Zero-Knowledge Recursion Tree with ZKP Membership Proofs
Sai Deng, Bo Du
Sai Deng, Bo Du
On Quantum Secure Compressing Pseudorandom Functions
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, and Ashwin Jha
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, and Ashwin Jha
Orca: FSS-based Secure Training and Inference with GPUs
Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, and Rahul Sharma
Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, and Rahul Sharma
DEFending Integrated Circuit Layouts
Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri
Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH
Arthur Lazzaretti, Charalampos Papamanthou
Arthur Lazzaretti, Charalampos Papamanthou
A Different Base Approach for Better Efficiency on Range Proofs
Esra Günsay, Cansu Betin Onur, Murat Cenk
Esra Günsay, Cansu Betin Onur, Murat Cenk
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper)
Dachao Wang, Baocang Wang, Siwei Sun
Dachao Wang, Baocang Wang, Siwei Sun
DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm
Aleksei Udovenko
Aleksei Udovenko
Classical and quantum 3 and 4-sieves to solve SVP with low memory
Johanna Loyer, André Chailloux
Johanna Loyer, André Chailloux
MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information
Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni
Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni
Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions
Jiaxin Pan, Benedikt Wagner
Jiaxin Pan, Benedikt Wagner
Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks
Mihir Bellare, Laura Shea
Mihir Bellare, Laura Shea
On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses
Shengyuan Xu, Xiutao Feng, Yongxing Wang
Shengyuan Xu, Xiutao Feng, Yongxing Wang
A simpler alternative to Lucas–Lehmer–Riesel primality test
Pavel Atnashev
Pavel Atnashev
Hull Attacks on the Lattice Isomorphism Problem
Léo Ducas, Shane Gibbons
Léo Ducas, Shane Gibbons
Traceable Policy-Based Signatures with Delegation
Ismail Afia and Riham AlTawy
Ismail Afia and Riham AlTawy
Faithful Simulation of Randomized BFT Protocols on Block DAGs
Hagit Attiya, Constantin Enea, Shafik Nassar
Hagit Attiya, Constantin Enea, Shafik Nassar
Beyond the Blockchain Address: Zero-Knowledge Address Abstraction
Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon
Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon
Practical Security Analysis of Zero-Knowledge Proof Circuits
Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, and Yu Feng
Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, and Yu Feng
tlock: Practical Timelock Encryption from Threshold BLS
Nicolas Gailly, Kelsey Melissaris, Yolan Romailler
Nicolas Gailly, Kelsey Melissaris, Yolan Romailler
Cryptanalysis of a key agreement scheme using determinants and rectangular matrices
Daniel R. L. Brown
Daniel R. L. Brown
Towards Modular Foundations for Protocol Security
Lúcás Críostóir Meier
Lúcás Críostóir Meier
Generic Models for Group Actions
Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography
Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, and Bas Spitters
Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, and Bas Spitters
Quantum Linear Key-recovery Attacks Using the QFT
André Schrottenloher
André Schrottenloher
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality
Mario Larangeira, Maxim Jourenko
Mario Larangeira, Maxim Jourenko
CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies
Yi-Fu Lai
Yi-Fu Lai
Fully Automated Differential-Linear Attacks against ARX Ciphers
Emanuele Bellini, David Gerault, Juan Grados, Rusydi Makarim, Thomas Peyrin
Emanuele Bellini, David Gerault, Juan Grados, Rusydi Makarim, Thomas Peyrin
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys
Jinpeng Hou, Yansong Gao, Anmin Fu, Jie Chen, Xiaofeng Chen, Yuqing Zhang, Willy Susilo, Josef Pieprzyk
Jinpeng Hou, Yansong Gao, Anmin Fu, Jie Chen, Xiaofeng Chen, Yuqing Zhang, Willy Susilo, Josef Pieprzyk
TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs
Itay Bookstein, Boaz Tsaban
Itay Bookstein, Boaz Tsaban
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers
Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang
Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang
The geometric interpretation of the Tate pairing and its applications
Damien Robert
Damien Robert
A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions
Pierre Briaud and Morten Øygarden
Pierre Briaud and Morten Øygarden
Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography
Vasyl Ustimenko
Vasyl Ustimenko
Improved Heuristics for Low-latency Implementations of Linear Layers
Qun Liu, Zheng Zhao, Meiqin Wang
Qun Liu, Zheng Zhao, Meiqin Wang
Degree-$D$ Reverse Multiplication-Friendly Embeddings: Constructions and Applications
Daniel Escudero, Cheng Hong, Hongqing Liu, Chaoping Xing, and Chen Yuan
Daniel Escudero, Cheng Hong, Hongqing Liu, Chaoping Xing, and Chen Yuan
Impossibility of Efficient Information-Theoretic Fuzzy Extraction
Benjamin Fuller
Benjamin Fuller
On Differential Privacy and Adaptive Data Analysis with Bounded Space
Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
EKE Meets Tight Security in the Universally Composable Framework
Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu
Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu
Reputation-based state machine replication
Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu
Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4
Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj
Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj
Modular Design of KEM-Based Authenticated Key Exchange
Colin Boyd, Bor de Kock, Lise Millerjord
Colin Boyd, Bor de Kock, Lise Millerjord
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption
Brice Minaud, Michael Reichle
Brice Minaud, Michael Reichle
Optimizing the depth of quantum implementations of linear layers
Chengkai Zhu, Zhenyu Huang
Chengkai Zhu, Zhenyu Huang
Concretely Efficient Input Transformation Based Zero-Knowledge Argument System for Arbitrary Circuits
Frank Y.C. Lu
Frank Y.C. Lu
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference
Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu
Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu
AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE
Wei Ao and Vishnu Naresh Boddeti
Wei Ao and Vishnu Naresh Boddeti
Quantum Advantage from One-Way Functions
Tomoyuki Morimae and Takashi Yamakawa
Tomoyuki Morimae and Takashi Yamakawa
Practically optimizing multi-dimensional discrete logarithm calculations: Implementations in subgroups of $\mathbb{Z}^{*}_{p}$ relevant to electronic voting and cash schemes
Madhurima Mukhopadhyay
Madhurima Mukhopadhyay
Sequential Half-Aggregation of Lattice-Based Signatures
Katharina Boudgoust and Akira Takahashi
Katharina Boudgoust and Akira Takahashi
Enabling FrodoKEM on Embedded Devices
Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal
Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal
A Key-Recovery Attack against Mitaka in the t-Probing Model
Thomas Prest
Thomas Prest
Zero-Knowledge Functional Elementary Databases
Xinxuan Zhang and Yi Deng
Xinxuan Zhang and Yi Deng
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters
Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, and Kazuo Ohta
Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, and Kazuo Ohta
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time
Sisi Duan, Xin Wang, and Haibin Zhang
Sisi Duan, Xin Wang, and Haibin Zhang
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model
Shuai Han, Shengli Liu, Dawu Gu
Shuai Han, Shengli Liu, Dawu Gu
Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption
Antonio Faonio, Dennis Hofheinz, Luigi Russo
Antonio Faonio, Dennis Hofheinz, Luigi Russo
Analysis of the XSL Attack
Coteanu Maria Gabriela, Țîflea Denisa-Ionela
Coteanu Maria Gabriela, Țîflea Denisa-Ionela
More Efficient Zero-Knowledge Protocols over $\mathbb{Z}_{2^k}$ via Galois Rings
Fuchun Lin, Chaoping Xing, and Yizhou Yao
Fuchun Lin, Chaoping Xing, and Yizhou Yao
Demystifying Bootstrapping in Fully Homomorphic Encryption
Ahmad Al Badawi and Yuriy Polyakov
Ahmad Al Badawi and Yuriy Polyakov
PassPro: A Secure Password-based Authentication Mechanism to Prevent Attacks
Ripon Patgiri and Laiphrakpam Dolendro Singh
Ripon Patgiri and Laiphrakpam Dolendro Singh
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model)
Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, and Daniel Tschudi
Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, and Daniel Tschudi
Optimized Quantum Implementation of AES
Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, and Xiangyong Zeng
Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, and Xiangyong Zeng
Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW
Xinxin Gong, Yonglin Hao, Qingju Wang
Xinxin Gong, Yonglin Hao, Qingju Wang
Aegis: Privacy-Preserving Market for Non-Fungible Tokens
Hisham S. Galal, Amr M. Youssef
Hisham S. Galal, Amr M. Youssef
A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More
Marloes Venema
Marloes Venema
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT
Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert
Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation
Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas
Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas
Improving Convergence and Practicality of Slide-type Reductions
Jianwei Li, Michael Walter
Jianwei Li, Michael Walter
Improved Estimation of Key Enumeration with Applications to Solving LWE
Alessandro Budroni, Erik Mårtensson
Alessandro Budroni, Erik Mårtensson
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures
Chloé Hébant, David Pointcheval, Robert Schädlich
Chloé Hébant, David Pointcheval, Robert Schädlich
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials
Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner
Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner
Compressed M-SIDH: An Instance of Compressed SIDH-like Schemes with Isogenies of Highly Composite Degrees
Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, and Chang-An Zhao
Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, and Chang-An Zhao
Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation
Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay
Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay
Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis
Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra
Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data
Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta
Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta
Security analysis of DBTRU cryptosystem
Alexandra Ciobanu, Marina Stefiuc
Alexandra Ciobanu, Marina Stefiuc
Some Practical Applications of Fully Homomorphic Encryption
Elisa Giurgea, Tudor Hutu, Emil Simion
Elisa Giurgea, Tudor Hutu, Emil Simion
Verifiable Distributed Aggregation Functions
Hannah Davis, Christopher Patton, Mike Rosulek, and Phillipp Schoppmann
Hannah Davis, Christopher Patton, Mike Rosulek, and Phillipp Schoppmann
A Lower Bound on the Share Size in Evolving Secret Sharing
Noam Mazor
Noam Mazor
Cloning Games: A General Framework for Unclonable Primitives
Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu
Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu
Sender-binding Key Encapsulation
Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
Privacy-Preserving Payment System With Verifiable Local Differential Privacy
Danielle Movsowitz Davidow, Yacov Manevich, Eran Toch
Danielle Movsowitz Davidow, Yacov Manevich, Eran Toch
Ransomware data recovery techniques
Irimia Alexandru-Vasile
Irimia Alexandru-Vasile
Security of Ethereum Layer 2s
Ionuț Roșca, Alexandra-Ina Butnaru, Emil Simion
Ionuț Roșca, Alexandra-Ina Butnaru, Emil Simion
A way of decrypting particular malware payloads found in MZPE files
Tudorică Radu, Rares Radu, Emil Simion
Tudorică Radu, Rares Radu, Emil Simion
SoK: Privacy-Enhancing Technologies in Finance
Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
Hashing to elliptic curves over highly $2$-adic fields $\mathbb{F}_{\!q}$ with $O(\log(q))$ operations in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
Dmitrii Koshelev
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts
Adam Caulfield, Nabiha Raza, and Peizhao Hu
Adam Caulfield, Nabiha Raza, and Peizhao Hu
Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality
Akin Ünal
Akin Ünal
A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes
Chloé Gravouil
Chloé Gravouil
Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT
Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
A Cryptographic Layer for the Interoperability of CBDC and Cryptocurrency Ledgers
Diego Castejon-Molina, Alberto del Amo Pastelero, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
Diego Castejon-Molina, Alberto del Amo Pastelero, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV
Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud
Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud
Credible, Optimal Auctions via Blockchains
Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni
Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni
Homomorphic Sortition – Single Secret Leader Election for PoS Blockchains
Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov
Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov
Faster Amortized FHEW bootstrapping using Ring Automorphisms
Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, and Adam Suhl
Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, and Adam Suhl
An Attack on the LILLE Stream Cipher
Vahid Amin-Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami
Vahid Amin-Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami
VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm
Ripon Patgiri, Laiphrakpam Dolendro Singh, Dalton Meitei Thounaojam
Ripon Patgiri, Laiphrakpam Dolendro Singh, Dalton Meitei Thounaojam
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper)
Ling Sun, Meiqin Wang
Ling Sun, Meiqin Wang
Grotto: Screaming fast $(2 + 1)$-PC for $\mathbb{Z}_{2^{n}}$ via (2, 2)-DPFs
Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry
Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry
The Tip5 Hash Function for Recursive STARKs
Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare, Al-Kindi
Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare, Al-Kindi
Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic
Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, and Mattia Veroni
Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, and Mattia Veroni
Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware
Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
Optimizations and Trade-offs for HElib
Anamaria Costache, Lea Nürnberger, Rachel Player
Anamaria Costache, Lea Nürnberger, Rachel Player
Fair Delivery of Decentralised Randomness Beacon
Runchao Han, Jiangshan Yu
Runchao Han, Jiangshan Yu
Cache-timing attack against HQC
Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
Practical Preimage Attack on 3-Round Keccak-256
Xiaoen Lin, Le He, Hongbo Yu
Xiaoen Lin, Le He, Hongbo Yu
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs
Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang
Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang
Scalable Multiparty Garbling
Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, and Gabriel Kaptchuk
Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, and Gabriel Kaptchuk
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
Circuit-Succinct Universally-Composable NIZKs with Updatable CRS
Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, and Daniel Slamanig
Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, and Daniel Slamanig
MPC With Delayed Parties Over Star-Like Networks
Mariana Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, and Oliver Zajonc
Mariana Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, and Oliver Zajonc
On TLS for the Internet of Things, in a Post Quantum world
Michael Scott
Michael Scott
Portunus: Re-imagining access control in distributed systems
Watson Ladd, Tanya Verma, Marloes Venema, Armando Faz Hernandez, Brendan McMillion, Avani Wildani, Nick Sullivan
Watson Ladd, Tanya Verma, Marloes Venema, Armando Faz Hernandez, Brendan McMillion, Avani Wildani, Nick Sullivan
Automated Side-Channel Attacks using Black-Box Neural Architecture Search
Pritha Gupta, Jan Peter Drees, and Eyke Hüllermeier
Pritha Gupta, Jan Peter Drees, and Eyke Hüllermeier
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator
Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro
Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro
Satisfiability Modulo Finite Fields
Alex Ozdemir, Gereon Kremer, Cesare Tinelli, and Clark Barrett
Alex Ozdemir, Gereon Kremer, Cesare Tinelli, and Clark Barrett
Unlimited Results: Breaking Firmware Encryption of ESP32-V3
Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard
Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard
COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation
Benjamin Levy, Muhammad Ishaq, Ben Sherman, Lindsey Kennard, Ana Milanova, and Vassilis Zikas
Benjamin Levy, Muhammad Ishaq, Ben Sherman, Lindsey Kennard, Ana Milanova, and Vassilis Zikas
Individual Cryptography
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej
Verification of Correctness and Security Properties for CRYSTALS-KYBER
Katharina Kreuzer
Katharina Kreuzer
Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs
Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner
Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner
The Security of ChaCha20-Poly1305 in the Multi-user Setting
Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson
Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson
Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin
GyuChol.Kim
GyuChol.Kim
MacORAMa: Optimal Oblivious RAM with Integrity
Surya Mathialagan, Neekon Vafa
Surya Mathialagan, Neekon Vafa
Specialized Proof of Confidential Knowledge (SPoCK)
Tarak Ben Youssef, Riad S. Wahby
Tarak Ben Youssef, Riad S. Wahby
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging
Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean Lawlor
Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean Lawlor
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries
Dimitris Mouris, Pratik Sarkar, and Nektarios Georgios Tsoutsos
Dimitris Mouris, Pratik Sarkar, and Nektarios Georgios Tsoutsos
The challenges of proving solvency while preserving privacy.
Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil
Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil
An Efficient Multi-Signature Scheme for Blockchain
Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh
Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal
Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Bake It Till You Make It: Heat-induced Power Leakage from Masked Neural Networks
Dev M. Mehta, Mohammad Hashemi, David S. Koblah, Domenic Forte, and Fatemeh Ganji
Dev M. Mehta, Mohammad Hashemi, David S. Koblah, Domenic Forte, and Fatemeh Ganji
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis
Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
Random Sources in Private Computation
Geoffroy Couteau, Adi Rosén
Geoffroy Couteau, Adi Rosén
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing
Peng Yang, Zoe Lin Jiang, Shiqi Gao, Hongxiao Wang, Jun Zhou, Yangyiye Jin, Siu-Ming Yiu, and Junbin Fang
Peng Yang, Zoe Lin Jiang, Shiqi Gao, Hongxiao Wang, Jun Zhou, Yangyiye Jin, Siu-Ming Yiu, and Junbin Fang
Non-Interactive Secure Computation of Inner-Product from LPN and LWE
Geoffroy Couteau, Maryam Zarezadeh
Geoffroy Couteau, Maryam Zarezadeh
A security analysis comparison between Signal, WhatsApp and Telegram
Corina-Elena Bogos, Răzvan Mocanu, Emil Simion
Corina-Elena Bogos, Răzvan Mocanu, Emil Simion
A new side-channel attack on RSA prime numbers generation
Isac Iulian-George, Emil Simion
Isac Iulian-George, Emil Simion
On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions
Prabhanjan Ananth, Zihan Hu, Henry Yuen
Prabhanjan Ananth, Zihan Hu, Henry Yuen
Obfuscating Evasive Decision Trees
Shalini Banerjee, Steven D. Galbraith, and Giovanni Russello
Shalini Banerjee, Steven D. Galbraith, and Giovanni Russello
Blind signatures from Zero-knowledge arguments
Paulo L. Barreto, Gustavo H. M. Zanon
Paulo L. Barreto, Gustavo H. M. Zanon
Plonkup scheme with multiple queries
Alexandr Bulkin, Tim Dokchitser
Alexandr Bulkin, Tim Dokchitser
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth
Jakub Klemsa, Melek Önen, Yavuz Akın
Jakub Klemsa, Melek Önen, Yavuz Akın
Computation of Hilbert class polynomials and modular polynomials from supersingular elliptic curves
Antonin Leroux
Antonin Leroux
Threshold Signatures in the Multiverse
Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure
Mingxing Hu
Mingxing Hu
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations
Shaoquan Jiang, Dima Alhadidi, and Hamid Fazli Khojir
Shaoquan Jiang, Dima Alhadidi, and Hamid Fazli Khojir
Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols
Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng
Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng
Oil and Vinegar: Modern Parameters and Implementations
Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
SCALLOP: scaling the CSI-FiSh
Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski
Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing
Max Ammann, Lucca Hirschi, and Steve Kremer
Max Ammann, Lucca Hirschi, and Steve Kremer
Quantum Annealing for Subset Product and Noisy Subset Product
Trey Li
Trey Li
An analysis of a scheme proposed for electronic voting systems
Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
On the Incoercibility of Digital Signatures
Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia
Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia
P3V: Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks
Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi
Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi
Putting the Online Phase on a Diet: Covert Security from Short MACs
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
On the Scholz conjecture on addition chains
Theophilus Agama
Theophilus Agama
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant
Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library
Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, and Yunlei Zhao
Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, and Yunlei Zhao
On-Line/Off-Line DCR-based Homomorphic Encryption and Applications
Marc Joye
Marc Joye
Side-Channel Resistant Implementation Using Arbiter PUF
Raja Adhithan RadhaKrishnan
Raja Adhithan RadhaKrishnan
Cognitive Cryptography using behavioral features from linguistic-biometric data
Jose Contreras
Jose Contreras
A note on machine learning applied in ransomware detection
Manuela Horduna, Simona-Maria Lăzărescu, Emil Simion
Manuela Horduna, Simona-Maria Lăzărescu, Emil Simion
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets
Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, and Ari Juels
Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, and Ari Juels
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic
David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic
On Protecting SPHINCS+ Against Fault Attacks
Aymeric Genêt
Aymeric Genêt
Quantum-Safe Protocols and Application in Data Security of Medical Records
Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion
Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion
A Closer Look at the Chaotic Ring Oscillators based TRNG Design
Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
Server-Supported Decryption for Mobile Devices
Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
On the Amortized Communication Complexity of Byzantine Broadcast
Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang
Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang
Efficient Isogeny Proofs Using Generic Techniques
Kelong Cong, Yi-Fu Lai, Shai Levin
Kelong Cong, Yi-Fu Lai, Shai Levin
Differential analysis of the ternary hash function Troika
Christina Boura, Margot Funk, Yann Rotella
Christina Boura, Margot Funk, Yann Rotella
A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL
Nicolai Müller, Daniel Lammers, and Amir Moradi
Nicolai Müller, Daniel Lammers, and Amir Moradi
PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries
Jannik Zeitschner, Nicolai Müller, Amir Moradi
Jannik Zeitschner, Nicolai Müller, Amir Moradi
Fast amortized KZG proofs
Dankrad Feist, Dmitry Khovratovich
Dankrad Feist, Dmitry Khovratovich
A Gentle Tutorial for Lattice-Based Cryptanalysis
Joseph Surin, Shaanan Cohney
Joseph Surin, Shaanan Cohney
Sassafras and Semi-Anonymous Single Leader Election
Jeffrey Burdges, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
Jeffrey Burdges, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
Earn While You Reveal: Private Set Intersection that Rewards Participants
Aydin Abadi
Aydin Abadi
Public Verification for Private Hash Matching
Sarah Scheffler, Anunay Kulshrestha, Jonathan Mayer
Sarah Scheffler, Anunay Kulshrestha, Jonathan Mayer
Information-Theoretic Distributed Point Functions
Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
Verification of the (1–δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform
Katharina Kreuzer
Katharina Kreuzer
Fermat Factorization in the Wild
Hanno Böck
Hanno Böck
Quantum Attacks on Beyond-Birthday-Bound MACs
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, and Fei Gao
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, and Fei Gao
It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption
Alexandros Bakas, Antonis Michalas
Alexandros Bakas, Antonis Michalas
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks
Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
Recommendation for a holistic secure embedded ISA extension
Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
DLFA: Deep Learning based Fault Analysis against Block Ciphers
Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng, Shengmin Xu, and Jiangshan Long
Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng, Shengmin Xu, and Jiangshan Long
The Scholz conjecture on addition chain is true for infinitely many integers with ℓ(2n) = ℓ(n)
Amadou TALL
Amadou TALL
Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis
Marina Krček, Guilherme Perin
Marina Krček, Guilherme Perin
New record in the number of qubits for a quantum implementation of AES
Zhenqiang Li, Fei Gao, Sujuan Qin, Qiaoyan Wen
Zhenqiang Li, Fei Gao, Sujuan Qin, Qiaoyan Wen
Cryptographic Group and Semigroup Actions
Oliver W. Gnilke, Jens Zumbrägel
Oliver W. Gnilke, Jens Zumbrägel
Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus
Katharina Boudgoust and Peter Scholl
Katharina Boudgoust and Peter Scholl
Unconditionally Secure NIZK in the Fine-Grained Setting
Yuyu Wang, Jiaxin Pan
Yuyu Wang, Jiaxin Pan
Amortized Bootstrapping Revisited: Simpler, Asymptotically-faster, Implemented
Antonio Guimarães, Hilder V. L. Pereira, and Barry van Leeuwen
Antonio Guimarães, Hilder V. L. Pereira, and Barry van Leeuwen
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit
Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit
Delegated Private Matching for Compute
Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, and Benjamin Case
Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, and Benjamin Case
Using the RSA or RSA-B accumulator in anonymous credential schemes
Sietse Ringers
Sietse Ringers
Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation
Martin Brain, Carlos Cid, Rachel Player, and Wrenna Robson
Martin Brain, Carlos Cid, Rachel Player, and Wrenna Robson
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE
Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis
Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query
Haodong Jiang, Zhi Ma, and Zhenfeng Zhang
Haodong Jiang, Zhi Ma, and Zhenfeng Zhang
Exploring multi-task learning in the context of masked AES implementations
Thomas Marquet and Elisabeth Oswald
Thomas Marquet and Elisabeth Oswald
Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud
Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao
Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao
Quantum Artificial Intelligence on Cryptanalysis
Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo
Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo
How to Use Sigstore without Sigstore
Yan-Cheng Chang
Yan-Cheng Chang
Ring Verifiable Random Functions and Zero-Knowledge Continuations
Jeffrey Burdges, Oana Ciobotaru, Handan Kılınç Alper, Alistair Stewart, and Sergey Vasilyev
Jeffrey Burdges, Oana Ciobotaru, Handan Kılınç Alper, Alistair Stewart, and Sergey Vasilyev
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions
Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
COA-Secure Obfuscation and Applications
Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishanth Kumar, Oxana Poburinnaya, Manoj Prabhakaran
Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishanth Kumar, Oxana Poburinnaya, Manoj Prabhakaran
More Efficient Key Ranking for Optimal Collision Side-Channel Attacks
Cezary Glowacz
Cezary Glowacz
Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators
Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou
Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou
Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size
Wyatt Howe, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell
Wyatt Howe, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell
Weightwise perfectly balanced functions and nonlinearity
Agnese Gini, Pierrick Méaux
Agnese Gini, Pierrick Méaux
Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches
Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols
Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi
Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi
PECO: methods to enhance the privacy of DECO protocol
Manuel B. Santos
Manuel B. Santos
SoK: Decentralized Finance (DeFi) Attacks
Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais
Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature
Min Zhang, Binbin Tu, Yu Chen
Min Zhang, Binbin Tu, Yu Chen
Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms
Asuka Wakasugi, Mitsuru Tada
Asuka Wakasugi, Mitsuru Tada
Cryptographic Primitives with Hinting Property
Navid Alamati, Sikhar Patranabis
Navid Alamati, Sikhar Patranabis
PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage
Reyhaneh Rabaninejad, Bin Liu, Antonis Michalas
Reyhaneh Rabaninejad, Bin Liu, Antonis Michalas
Continuous Group Key Agreement with Flexible Authorization and Its Applications
Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake
Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake
Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust
Orestis Alpos and Christian Cachin
Orestis Alpos and Christian Cachin
Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs
Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay
Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay
A Deep Learning Aided Differential Distinguisher Improvement Framework with More Lightweight and Universality
Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen
Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen
Wi-Fi Security: Do We Still Have to Look Back?
Karim Lounis
Karim Lounis
cq: Cached quotients for fast lookups
Liam Eagen, Dario Fiore, and Ariel Gabizon
Liam Eagen, Dario Fiore, and Ariel Gabizon
On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC
Johannes Blömer, Jan Bobolz, and Henrik Bröcher
Johannes Blömer, Jan Bobolz, and Henrik Bröcher
A Family of Block Ciphers Based on Multiple Quasigroups
Umesh Kumar, V. Ch. Venkaiah
Umesh Kumar, V. Ch. Venkaiah
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation
Rachit Garg, Kristin Sheridan, Brent Waters, and David J. Wu
Rachit Garg, Kristin Sheridan, Brent Waters, and David J. Wu
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation
Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern
Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern
SuperNova: Proving universal machine executions without universal circuits
Abhiram Kothapalli, Srinath Setty
Abhiram Kothapalli, Srinath Setty
An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security
Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments
Behzad Abdolmaleki, Daniel Slamanig
Behzad Abdolmaleki, Daniel Slamanig
Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version)
Andreas Klinger, Ulrike Meyer
Andreas Klinger, Ulrike Meyer
An SVP attack on Vortex
zhenfei zhang
zhenfei zhang
DSKE: Digital Signature with Key Extraction
Zhipeng Wang, Orestis Alpos, Alireza Kavousi, Sze Yiu Chau, Duc V. Le, and Christian Cachin
Zhipeng Wang, Orestis Alpos, Alireza Kavousi, Sze Yiu Chau, Duc V. Le, and Christian Cachin
IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism
Shaza Elsharief, Lilas Alrahis, Johann Knechtel, and Ozgur Sinanoglu
Shaza Elsharief, Lilas Alrahis, Johann Knechtel, and Ozgur Sinanoglu
Pseudorandomness of Decoding, Revisited: Adapting OHCP to Code-Based Cryptography
Maxime Bombar, Alain Couvreur, and Thomas Debris-Alazard
Maxime Bombar, Alain Couvreur, and Thomas Debris-Alazard
Faster Dual Lattice Attacks by Using Coding Theory
Kevin Carrier, Yixin Shen, Jean-Pierre Tillich
Kevin Carrier, Yixin Shen, Jean-Pierre Tillich
Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems
Paolo Santini, Marco Baldi, and Franco Chiaraluce
Paolo Santini, Marco Baldi, and Franco Chiaraluce
RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version)
Pascal Lafourcade, Gael Marcadet, Léo Robert
Pascal Lafourcade, Gael Marcadet, Léo Robert
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
Adithya Vadapalli, Ryan Henry, Ian Goldberg
Adithya Vadapalli, Ryan Henry, Ian Goldberg
Clipaha: A Scheme to Perform Password Stretching on the Client
Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner
Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Worst and Average Case Hardness of Decoding via Smoothing Bounds
Thomas Debris-Alazard, Nicolas Resch
Thomas Debris-Alazard, Nicolas Resch
Ring Signatures with User-Controlled Linkability
Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker
Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker
A Simple Noncommutative UOV Scheme
Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, and Chun-Yen Chou
Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, and Chun-Yen Chou
Demystifying the comments made on “A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors”
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling
Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
On blindness of several ElGamal-type blind signatures
Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Oleg Taraskin
Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Oleg Taraskin
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings
Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert
Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert
Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis
Azade Rezaeezade and Lejla Batina
Azade Rezaeezade and Lejla Batina
An algorithm for efficient detection of $(N,N)$-splittings and its application to the isogeny problem in dimension 2
Maria Corte-Real Santos, Craig Costello, and Sam Frengley
Maria Corte-Real Santos, Craig Costello, and Sam Frengley
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts
Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, and Tsz Hon Yuen
Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, and Tsz Hon Yuen
Mind Your Path: On (Key) Dependencies in Differential Characteristics
Thomas Peyrin, Quan Quan Tan
Thomas Peyrin, Quan Quan Tan
New and Improved Constructions for Partially Equivocable Public Key Encryption
Benoît Libert, Alain Passelègue, Mahshid Riahinia
Benoît Libert, Alain Passelègue, Mahshid Riahinia
TreeSync: Authenticated Group Management for Messaging Layer Security
Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds
Reham Almukhlifi, Poorvi Vora
Reham Almukhlifi, Poorvi Vora
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice
Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., and Swapneel Sheth
Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., and Swapneel Sheth
Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery
Melissa Chase, Hannah Davis, Esha Ghosh, and Kim Laine
Melissa Chase, Hannah Davis, Esha Ghosh, and Kim Laine
Efficient Zero Knowledge Arguments for Bilinear Matrix Relations over Finite Fields and Knowledge-Soundness Enhancement via Operations over Extended Field
Yuan Tian
Yuan Tian
Find Thy Neighbourhood: Privacy-Preserving Local Clustering
Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
Optimization for SPHINCS+ using Intel Secure Hash Algorithm Extensions
Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry
Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry
A note on SPHINCS+ parameter sets
Stefan Kölbl and Jade Philipoom
Stefan Kölbl and Jade Philipoom
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
Cas Cremers, Alexander Dax, and Aurora Naska
Cas Cremers, Alexander Dax, and Aurora Naska
Asymptotically Optimal Message Dissemination with Applications to Blockchains
Chen-Da Liu-Zhang, Christian Matt, and Søren Eller Thomsen
Chen-Da Liu-Zhang, Christian Matt, and Søren Eller Thomsen
On Side-Channel and CVO Attacks against TFHE and FHEW
Michael Walter
Michael Walter
Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi
Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar
Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar
Two-Round Concurrent 2PC from Sub-Exponential LWE
Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, and Amit Sahai
Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, and Amit Sahai
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices
Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan
Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan
Scaling Blockchain-Based Tokens with Joint Cryptographic Accumulators
Trevor Miller
Trevor Miller
Area-time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang
Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang
An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH Codes
Freja Elbro, Christian Majenz
Freja Elbro, Christian Majenz
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing
Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang
Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste
Elena Dubrova, Kalle Ngo, Joel Gärtner
Elena Dubrova, Kalle Ngo, Joel Gärtner
KEMTLS vs. Post-Quantum TLS: Performance On Embedded Systems
Ruben Gonzalez, Thom Wiggers
Ruben Gonzalez, Thom Wiggers
Nonce- and Redundancy-encrypting Modes with Farfalle
Seth Hoffert
Seth Hoffert
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
Cas Cremers, Charlie Jacomme, and Aurora Naska
Cas Cremers, Charlie Jacomme, and Aurora Naska
Dory: Faster Asynchronous BFT with Reduced Communication for Permissioned Blockchains
Zongyang Zhang, You Zhou, Sisi Duan, Haibin Zhang, Bin Hu, Licheng Wang, and Jianwei Liu
Zongyang Zhang, You Zhou, Sisi Duan, Haibin Zhang, Bin Hu, Licheng Wang, and Jianwei Liu
Expert Mental Models of SSI Systems and Implications for End-User Understanding
Alexandra Mai
Alexandra Mai
Private Access Control for Function Secret Sharing
Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, and Hyojae Park
Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, and Hyojae Park
Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8
Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Hyunjun Kim, Hwajeong Seo
Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Hyunjun Kim, Hwajeong Seo
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol
Felix Günther, Marc Ilunga Tshibumbu Mukendi
Felix Günther, Marc Ilunga Tshibumbu Mukendi
Some applications of higher dimensional isogenies to elliptic curves (overview of results)
Damien Robert
Damien Robert
Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
Wei-Kai Lin, Ethan Mook, Daniel Wichs
Wei-Kai Lin, Ethan Mook, Daniel Wichs
SCB Mode: Semantically Secure Length-Preserving Encryption
Fabio Banfi
Fabio Banfi
On Zero-Knowledge Proofs over the Quantum Internet
Mark Carney
Mark Carney
Comparative Study of HDL algorithms for Intrusion Detection System in Internet of Vehicles
Manoj Srinivas Botla, Jai Bala Srujan Melam, Raja Stuthi Paul Pedapati, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
Manoj Srinivas Botla, Jai Bala Srujan Melam, Raja Stuthi Paul Pedapati, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
SoK: Use of Cryptography in Malware Obfuscation
Hassan Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
Hassan Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
Digital Signature from Syndrome Decoding Problem
Abdelhaliem Babiker
Abdelhaliem Babiker
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
Post-Quantum Anonymity of Kyber
Varun Maram, Keita Xagawa
Varun Maram, Keita Xagawa
ELSA: Secure Aggregation for Federated Learning with Malicious Actors
Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa
Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations
George Teseleanu
George Teseleanu
More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model
Kyoichi Asano, Keita Emura, Atsushi Takayasu
Kyoichi Asano, Keita Emura, Atsushi Takayasu
Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber
Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova
Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation
Cas Cremers, Gal Horowitz, Charlie Jacomme, and Eyal Ronen
Cas Cremers, Gal Horowitz, Charlie Jacomme, and Eyal Ronen
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices
Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, and Raymond K. Zhao
Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, and Raymond K. Zhao
Efficient Zero-Knowledge Arguments for Some Matrix Relations over Ring and Non-malleable Enhancement
Yuan Tian
Yuan Tian
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation
Alberto Ibarrondo, Hervé Chabanne, and Melek Önen
Alberto Ibarrondo, Hervé Chabanne, and Melek Önen
Stronger Security and Generic Constructions for Adaptor Signatures
Wei Dai, Tatsuaki Okamoto, Go Yamamoto
Wei Dai, Tatsuaki Okamoto, Go Yamamoto
Practical Quantum-Safe Voting from Lattices, Extended
Ian Black, Emma McFall, Juliet Whidden, Bryant Xie, Ryann Cartor
Ian Black, Emma McFall, Juliet Whidden, Bryant Xie, Ryann Cartor
CoRA: Collaborative Risk-Aware Authentication
Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu,, Payman Mohassel
Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu,, Payman Mohassel
Division in the Plactic Monoid
Chris Monico
Chris Monico
Powers of Tau in Asynchrony
Sourav Das, Zhuolun Xiang, and Ling Ren
Sourav Das, Zhuolun Xiang, and Ling Ren
Interactive Authentication
Deepak Maram, Mahimna Kelkar, and Ittay Eyal
Deepak Maram, Mahimna Kelkar, and Ittay Eyal
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy
Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy
Authenticated Encryption with Key Identification
Julia Len, Paul Grubbs, Thomas Ristenpart
Julia Len, Paul Grubbs, Thomas Ristenpart
Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting
Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy
Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model
Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu
Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu
Quagmire ciphers and group theory: What is a Porta cipher?
Thomas Kaeding
Thomas Kaeding
Concurrently Secure Blind Schnorr Signatures
Georg Fuchsbauer and Mathias Wolf
Georg Fuchsbauer and Mathias Wolf
SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI
Asmita Adhikary, Ileana Buhan
Asmita Adhikary, Ileana Buhan
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work)
Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber
Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber
DeV-IP: A k-out-n Decentralized and verifiable BFV for Inner Product evaluation
Jose Contreras, Hardik Gajera
Jose Contreras, Hardik Gajera
An Auditable Confidentiality Protocol for Blockchain Transactions
Aoxuan Li, Gabriele D’Angelo, Jacky Tang, Frank Fang, Baron Gong
Aoxuan Li, Gabriele D’Angelo, Jacky Tang, Frank Fang, Baron Gong
Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers
Hyunji Kim, Kyungbae Jang, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
Hyunji Kim, Kyungbae Jang, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
Shoichi Hirose and Kazuhiko Minematsu
Shoichi Hirose and Kazuhiko Minematsu
Jolt: Recovering TLS Signing Keys via Rowhammer Faults
Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar
Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar
On the families of algebraic graphs with the fastest growth of cycle indicator and their applications
Vasyl Ustimenko
Vasyl Ustimenko
Applying Castryck-Decru Attack on the Masked Torsion Point Images SIDH variant
Jesús-Javier Chi-Domínguez
Jesús-Javier Chi-Domínguez
Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem
Kirill Vedenev, Yury Kosolapov
Kirill Vedenev, Yury Kosolapov
GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks
Joo Woo, Kwangsu Lee, Jong Hwan Park
Joo Woo, Kwangsu Lee, Jong Hwan Park
NTRU+: Compact Construction of NTRU Using Simple Encoding Method
Jonghyun Kim, Jong Hwan Park
Jonghyun Kim, Jong Hwan Park
REDOG and Its Performance Analysis
Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Byung-Sun Won
Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Byung-Sun Won
Revisiting cycles of pairing-friendly elliptic curves
Marta Bellés-Muñoz, Jorge Jiménez Urroz, Javier Silva
Marta Bellés-Muñoz, Jorge Jiménez Urroz, Javier Silva
Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure
Han Wu, Guangwu Xu
Han Wu, Guangwu Xu
Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution
Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam
Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam
A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers
Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu
Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu
A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity - The Perfect Revocation Method does not exist yet
Andreas Freitag
Andreas Freitag
CycloneNTT: An NTT/FFT Architecture Using Quasi-Streaming of Large Datasets on DDR- and HBM-based FPGA Platforms
Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela, Kevin Bowers
Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela, Kevin Bowers
Proactive Refresh for Accountable Threshold Signatures
Dan Boneh, Aditi Partap, Lior Rotem
Dan Boneh, Aditi Partap, Lior Rotem
Just How Fair is an Unreactive World?
Srinivasan Raghuraman and Yibin Yang
Srinivasan Raghuraman and Yibin Yang
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform
Daniele Friolo, Matteo Salvino, Daniele Venturi
Daniele Friolo, Matteo Salvino, Daniele Venturi
Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol
Alexandre Debant and Lucca Hirschi
Alexandre Debant and Lucca Hirschi
Breaking the Size Barrier: Universal Circuits meet Lookup Tables
Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt,, and Hossein Yalame
Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt,, and Hossein Yalame
TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE(R)
Seunghwan Park, Chi-Gon Jung, Aesun Park, Joongeun Choi, Honggoo Kang
Seunghwan Park, Chi-Gon Jung, Aesun Park, Joongeun Choi, Honggoo Kang
LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains
Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj
Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis
Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai
Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs
Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, and Nitin Singh
Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, and Nitin Singh
Quantum Algorithm for Oracle Subset Product
Trey Li
Trey Li
Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations
Matt Davison, Ken King, Trevor Miller
Matt Davison, Ken King, Trevor Miller
The Return of the SDitH
Carlos Aguilar-Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue
Carlos Aguilar-Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue
An attack on a key exchange protocol based on max-times and min-times algebras
Ivan Buchinskiy, Matvei Kotov, Alexander Treier
Ivan Buchinskiy, Matvei Kotov, Alexander Treier
End-to-End Secure Messaging with Traceability Only for Illegal Content
James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
Proofs of Proof-of-Stake with Sublinear Complexity
Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, and Dionysis Zindros
Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, and Dionysis Zindros
AlgSAT --- a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective
Huina Li, Haochen Zhang, Guozhen Liu, Kai Hu, Jian Guo, Weidong Qiu
Huina Li, Haochen Zhang, Guozhen Liu, Kai Hu, Jian Guo, Weidong Qiu
Differential Meet-In-The-Middle Cryptanalysis
Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia
Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia
Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments
Alexandre Augusto Giron, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin
Alexandre Augusto Giron, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin
The Security of Quasigroups Based Substitution Permutation Networks
George Teseleanu
George Teseleanu
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum $i\mathcal{O}$
Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai
Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai
Threshold Signatures with Private Accountability
Dan Boneh, Chelsea Komlo
Dan Boneh, Chelsea Komlo
FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, and Ingrid Verbauwhede
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, and Ingrid Verbauwhede
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains
Tianyu Zhaolu, Zhiguo Wan, and Huaqun Wang
Tianyu Zhaolu, Zhiguo Wan, and Huaqun Wang
Linea Prover Documentation
Linea Prover
Linea Prover
Cryptography with Weights: MPC, Encryption and Signatures
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
Enhancing Ring-LWE Hardness using Dedekind Index Theorem
Charanjit S Jutla, Chengyu Lin
Charanjit S Jutla, Chengyu Lin
Finding Collisions for Round-Reduced Romulus-H
Marcel Nageler, Felix Pallua, Maria Eichlseder
Marcel Nageler, Felix Pallua, Maria Eichlseder
Temporary Block Withholding Attacks on Filecoin's Expected Consensus
Tong Cao, Xin Li
Tong Cao, Xin Li
Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists
Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
The Random Fault Model
Siemen Dhooghe and Svetla Nikova
Siemen Dhooghe and Svetla Nikova
MinRoot: Candidate Sequential Function for Ethereum VDF
Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari
Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari
Efficient Threshold FHE for Privacy-Preserving Applications
Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, and Debdeep Mukhopadhyay
Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, and Debdeep Mukhopadhyay
Algorithms for switching between block-wise and arithmetic masking
Evgeny Alekseev, Andrey Bozhko
Evgeny Alekseev, Andrey Bozhko
WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership
David Chaum, Mario Larangeira, Mario Yaksetig
David Chaum, Mario Larangeira, Mario Yaksetig
Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs
Melissa Chase, F. Betül Durak, Serge Vaudenay
Melissa Chase, F. Betül Durak, Serge Vaudenay
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption
Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao
Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao
Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More
Jiahui Liu, Hart Montgomery, Mark Zhandry
Jiahui Liu, Hart Montgomery, Mark Zhandry
The Performance Analysis of Post-Quantum Cryptography for Vehicular Communications
Abel C. H. Chen
Abel C. H. Chen
Witness-Succinct Universally-Composable SNARKs
Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
A New Higher Order Differential of RAGHAV
Naoki Shibayama, Yasutaka Igarashi
Naoki Shibayama, Yasutaka Igarashi
Secret Sharing for Generic Access Structures
James Smith
James Smith
Efficient Methods for Implementation of Generalized Access Structures
James Smith
James Smith
Throughput Limitation of the Off-chain Payment Networks
Shayan Hamidi Dehshali, Seyed Mahdi Hosseini, Soheil Zibakhsh Shabgahi, Behnam Bahrak
Shayan Hamidi Dehshali, Seyed Mahdi Hosseini, Soheil Zibakhsh Shabgahi, Behnam Bahrak
Classic McEliece Key Generation on RAM constrained devices
Rainer Urian, Raphael Schermann
Rainer Urian, Raphael Schermann
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives
Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Efficient Aggregatable BLS Signatures with Chaum-Pedersen Proofs
Jeff Burdges, Oana Ciobotaru, Syed Lavasani, and Alistair Stewart
Jeff Burdges, Oana Ciobotaru, Syed Lavasani, and Alistair Stewart
ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-based McEliece Cryptosystems
Kohtaro Watanabe, Motonari Ohtsuka, and Yuta Tsukie
Kohtaro Watanabe, Motonari Ohtsuka, and Yuta Tsukie
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs
Avijit Dutta, Jian Guo, Eik List
Avijit Dutta, Jian Guo, Eik List
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn't Be Considered UC-Secure)
Lawrence Roy and Jiayu Xu
Lawrence Roy and Jiayu Xu
AUC: Accountable Universal Composability
Mike Graf, Ralf Küsters, Daniel Rausch
Mike Graf, Ralf Küsters, Daniel Rausch
Sweep-UC: Swapping Coins Privately
Lucjan Hanzlik, Julian Loss, Sri AravindaKrishnan Thyagarajan, Benedikt Wagner
Lucjan Hanzlik, Julian Loss, Sri AravindaKrishnan Thyagarajan, Benedikt Wagner
Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions
Seungjun Baek, Jongsung Kim
Seungjun Baek, Jongsung Kim
Slid Pairs of the Fruit-80 Stream Cipher
Pang Kok An, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani
Pang Kok An, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani
Survey on Fully Homomorphic Encryption, Theory, and Applications
Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H.P. Fitzek, Najwa Aaraj
Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H.P. Fitzek, Najwa Aaraj
Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium
Geng Wang, Wenwen Xia, Gongyu Shi, Ming Wan, Yuncong Zhang, Dawu Gu
Geng Wang, Wenwen Xia, Gongyu Shi, Ming Wan, Yuncong Zhang, Dawu Gu
Secret-Shared Joins with Multiplicity from Aggregation Trees
Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal
Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal
Streaming Functional Encryption
Jiaxin Guan, Alexis Korb, and Amit Sahai
Jiaxin Guan, Alexis Korb, and Amit Sahai
Efficiently Testable Circuits
Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
A Closer Look at a Recent Pipelined True Random Number Generator Design
Markus Dichtl
Markus Dichtl
LowMS: a new rank metric code-based KEM without ideal structure
Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, and Antonia Wachter-Zeh
Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, and Antonia Wachter-Zeh
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters
Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida
Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH
Pratish Datta, Tapas Pal, Katsuyuki Takashima
Pratish Datta, Tapas Pal, Katsuyuki Takashima
Proofs of discrete logarithm equality across groups
Melissa Chase, Michele Orrù, Trevor Perrin, Greg Zaverucha
Melissa Chase, Michele Orrù, Trevor Perrin, Greg Zaverucha
Powers-of-Tau to the People: Decentralizing Setup Ceremonies
Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, and Dan Boneh
Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, and Dan Boneh
ISAP+: ISAP with Fast Authentication
Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi
Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi
Misuse-resistant MGM2 mode
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme
Sigurd Eskeland, Ahmed Fraz Baig
Sigurd Eskeland, Ahmed Fraz Baig
Factoring using multiplicative relations modulo n: a subexponential algorithm inspired by the index calculus
Katherine E. Stange
Katherine E. Stange
Applications of the indirect sum in the design of several special classes of bent functions outside the completed $\mathcal{MM}$ class
Fengrong Zhang, Enes Pasalic, Amar Bapić, Baocang Wang
Fengrong Zhang, Enes Pasalic, Amar Bapić, Baocang Wang
Practical Asynchronous Proactive Secret Sharing and Key Refresh
Christoph U. Günther, Sourav Das, Lefteris Kokoris-Kogias
Christoph U. Günther, Sourav Das, Lefteris Kokoris-Kogias
Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use
Kwan Yin Chan, Tsz Hon Yuen
Kwan Yin Chan, Tsz Hon Yuen
Instantiability of Classical Random-Oracle-Model Encryption Transforms
Alice Murphy, Adam O'Neill, Mohammad Zaheri
Alice Murphy, Adam O'Neill, Mohammad Zaheri
Asynchronous Multi-Party Quantum Computation
Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro
Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro
FSMx-Ultra: Finite State Machine Extraction from Gate-Level Netlist for Security Assessment
Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
Truncator: Time-space Tradeoff of Cryptographic Primitives
Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, and Mahimna Kelkar
Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, and Mahimna Kelkar
Multi-ciphertext security degradation for lattices
Daniel J. Bernstein
Daniel J. Bernstein
New Properties of Double Boomerang Connectivity Table
Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu
Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu
Weighted Secret Sharing from Wiretap Channels
Fabrice Benhamouda, Shai Halevi, Lev Stambler
Fabrice Benhamouda, Shai Halevi, Lev Stambler
Rescue-Prime Optimized
Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare
Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare
Folding Schemes with Selective Verification
Carla Ràfols, Alexandros Zacharakis
Carla Ràfols, Alexandros Zacharakis
On Linearization Attack of Entropic Quasigroups Cryptography
Daniel Nager
Daniel Nager
Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines
Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol
Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol
Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications
Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu
Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu
Layered ROLLO-I: Faster rank-metric code-based KEM using ideal LRPC codes
Chanki Kim, Young-Sik Kim, Jong-Seon No
Chanki Kim, Young-Sik Kim, Jong-Seon No
Practical Settlement Bounds for Longest-Chain Consensus
Peter Gaži, Ling Ren, Alexander Russell
Peter Gaži, Ling Ren, Alexander Russell
Set (Non-)Membership NIZKs from Determinantal Accumulators
Helger Lipmaa, Roberto Parisella
Helger Lipmaa, Roberto Parisella
DAG-$\Sigma$: A DAG-based Sigma Protocol for Relations in CNF
Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng
Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng
Extendable Threshold Ring Signatures with Enhanced Anonymity
Gennaro Avitabile, Vincenzo Botta, Dario Fiore
Gennaro Avitabile, Vincenzo Botta, Dario Fiore
Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting
Orr Dunkelman, Shibam Ghosh, Eran Lambooij
Orr Dunkelman, Shibam Ghosh, Eran Lambooij
Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes
Kaisa Nyberg
Kaisa Nyberg
Baloo: Nearly Optimal Lookup Arguments
Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols
Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols
Efficient privacy preserving top-k recommendation using homomorphic sorting
Pranav Verma, Anish Mathuria, Sourish Dasgupta
Pranav Verma, Anish Mathuria, Sourish Dasgupta
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
A Systematization of Voter Registration Security
Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter
Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter
Vogue: Faster Computation of Private Heavy Hitters
Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
Verifiable Private Information Retrieval
Shany Ben-David, Yael Tauman Kalai, Omer Paneth
Shany Ben-David, Yael Tauman Kalai, Omer Paneth
Take your MEDS: Digital Signatures from Matrix Code Equivalence
Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska
Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska
Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers
Akinori Hosoyamada
Akinori Hosoyamada
Less is more: refinement proofs for probabilistic proofs
Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies
Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies
Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach
Dimitrios Sikeridis, Sean Huntley, David Ott, and Michael Devetsikiotis
Dimitrios Sikeridis, Sean Huntley, David Ott, and Michael Devetsikiotis
Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures
Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven Watson
Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven Watson
Executing and Proving over Dirty Ledgers
Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias
Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias
Lower Bound Framework for Differentially Private and Oblivious Data Structures
Giuseppe Persiano, Kevin Yeo
Giuseppe Persiano, Kevin Yeo
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3
Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
Extensible Decentralized Secret Sharing and Application to Schnorr Signatures
Michele Battagliola, Riccardo Longo, Alessio Meneghetti
Michele Battagliola, Riccardo Longo, Alessio Meneghetti
Modifications of Bijective S-Boxes with Linear Structures
Kaisa Nyberg
Kaisa Nyberg
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64
Yingying Li, Qichun Wang
Yingying Li, Qichun Wang
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast
Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas
Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas
A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm
Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang
Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
John Gaspoz, Siemen Dhooghe
John Gaspoz, Siemen Dhooghe
On Structure-Preserving Cryptography and Lattices
Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, and Bogdan Ursu
Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, and Bogdan Ursu
Towards Efficient Decentralized Federated Learning
Christodoulos Pappas, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, Spyros Lalis, Manolis Vavalis
Christodoulos Pappas, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, Spyros Lalis, Manolis Vavalis
Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations
Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi
Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi
Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves (ECFFT part II)
Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit
Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit
Secure Auctions in the Presence of Rational Adversaries
Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar
Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar
Exploiting algebraic structures in probing security
Maxime Plançon
Maxime Plançon
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions
Saumya Goyal, Varun Narayanan, Manoj Prabhakaran
Saumya Goyal, Varun Narayanan, Manoj Prabhakaran
DME: a full encryption, signature and KEM multivariate public key cryptosystem
Ignacio Luengo, Martín Avendaño
Ignacio Luengo, Martín Avendaño
On Extremal Algebraic Graphs and Multivariate Cryptosystems
Vasyl Ustimenko
Vasyl Ustimenko
Privacy-Preserving Blueprints
Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen
Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge
Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar
Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function
Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum
Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
Dynamic Decentralized Functional Encryption with Strong Security
Ky Nguyen, David Pointcheval, and Robert Schädlich
Ky Nguyen, David Pointcheval, and Robert Schädlich
The Key Lattice Framework for Concurrent Group Messaging
Kelong Cong, Karim Eldefrawy, Nigel P. Smart, and Ben Terner
Kelong Cong, Karim Eldefrawy, Nigel P. Smart, and Ben Terner
Multivariate lookups based on logarithmic derivatives
Ulrich Haböck
Ulrich Haböck
Key-Recovery Fault Injection Attack on the Classic McEliece KEM
Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh
Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem
Ward Beullens
Ward Beullens
Pattern Matching in Encrypted Stream from Inner Product Encryption
Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
Threshold-Optimal MPC With Friends and Foes
Nikolas Melissaris, Divya Ravi, Sophia Yakoubov
Nikolas Melissaris, Divya Ravi, Sophia Yakoubov
Endemic Oblivious Transfer via Random Oracles, Revisited
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience
Mor Weiss
Mor Weiss
Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
Two new infinite families of APN functions in trivariate form
Kangquan Li, Nikolay Kaleyski
Kangquan Li, Nikolay Kaleyski
An Assessment of Differential-Neural Distinguishers
Aron Gohr, Gregor Leander, Patrick Neumann
Aron Gohr, Gregor Leander, Patrick Neumann
Censorship-Resilient and Confidential Collateralized Second-Layer Payments
Kari Kostiainen, Sven Gnap, Ghassan Karame
Kari Kostiainen, Sven Gnap, Ghassan Karame
Collusion-resistant broadcast encryption based on hidden RSA subgroups
Sigurd Eskeland
Sigurd Eskeland
An Experimentally Verified Attack on 820-Round Trivium (Full Version)
Cheng Che, Tian Tian
Cheng Che, Tian Tian
Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
Kai-Min Chung, Mi-Ying (Miryam) Huang, Er-Cheng Tang, and Jiapeng Zhang
Kai-Min Chung, Mi-Ying (Miryam) Huang, Er-Cheng Tang, and Jiapeng Zhang
Obfuscation of Evasive Algebraic Set Membership
Steven D. Galbraith and Trey Li
Steven D. Galbraith and Trey Li
Succinct Vector, Polynomial, and Functional Commitments from Lattices
Hoeteck Wee and David J. Wu
Hoeteck Wee and David J. Wu
Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications
Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen
Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen
Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin
Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
Building MPCitH-based Signatures from MQ, MinRank, Rank SD and PKP
Thibauld Feneuil
Thibauld Feneuil
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH
Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
Witness Encryption for Succinct Functional Commitments and Applications
Matteo Campanelli, Dario Fiore, and Hamidreza Khoshakhlagh
Matteo Campanelli, Dario Fiore, and Hamidreza Khoshakhlagh
sVote with Control Components Voting Protocol. Computational Proof of Complete Verifiability and Privacy.
Enrique Larraia, Tamara Finogina, Nuria Costa
Enrique Larraia, Tamara Finogina, Nuria Costa
Non-Interactive Publicly-Verifiable Delegation of Committed Programs
Riddhi Ghosal, Amit Sahai, Brent Waters
Riddhi Ghosal, Amit Sahai, Brent Waters
Label Correlation in Deep Learning-based Side-channel Analysis
Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
ORTOA: One Round Trip Oblivious Access
Sujaya Maiyya, Yuval Steinhart, Divyakant Agrawal, Prabhanjan Ananth, and Amr El Abbadi
Sujaya Maiyya, Yuval Steinhart, Divyakant Agrawal, Prabhanjan Ananth, and Amr El Abbadi
Efficient Registration-Based Encryption
Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, and Ahmadreza Rahimi
Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, and Ahmadreza Rahimi
On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness
Bar Alon, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky, Arpita Patra
Bar Alon, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky, Arpita Patra
The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs
Jeremiah Blocki, Blake Holman, Seunghoon Lee
Jeremiah Blocki, Blake Holman, Seunghoon Lee
Beyond Uber: Instantiating Generic Groups via PGGs
Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill
Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill
MinRank in the Head: Short Signatures from Zero-Knowledge Proofs
Gora Adj, Luis Rivera-Zamarripa, Javier Verbel
Gora Adj, Luis Rivera-Zamarripa, Javier Verbel
Registered Attribute-Based Encryption
Susan Hohenberger, George Lu, Brent Waters, David J. Wu
Susan Hohenberger, George Lu, Brent Waters, David J. Wu
WrapQ: Side-Channel Secure Key Management for Post-Quantum Cryptography
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments
Peter Chvojka, Tibor Jager
Peter Chvojka, Tibor Jager
Lattice-Based Quantum Advantage from Rotated Measurements
Yusuf Alnawakhtha, Atul Mantri, Carl A. Miller, Daochen Wang
Yusuf Alnawakhtha, Atul Mantri, Carl A. Miller, Daochen Wang
Multiplicative Partially Homomorphic CRT Secret Sharing
Shlomi Dolev, Yaniv Kleinman
Shlomi Dolev, Yaniv Kleinman
Peregrine: Toward Fastest FALCON Based on GPV Framework
Eun-Young Seo, Young-Sik Kim, Joon-Woo Lee, Jong-Seon No
Eun-Young Seo, Young-Sik Kim, Joon-Woo Lee, Jong-Seon No
The DAG KNIGHT Protocol: A Parameterless Generalization of Nakamoto Consensus
Yonatan Sompolinsky, Michael Sutton
Yonatan Sompolinsky, Michael Sutton
Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography
Jinkyu Cho, Jong-Seon No, Yongwoo Lee, Zahyun Koo, Young-Sik Kim
Jinkyu Cho, Jong-Seon No, Yongwoo Lee, Zahyun Koo, Young-Sik Kim
A Control Theoretic Approach to Infrastructure-Centric Blockchain Tokenomics
Oguzhan Akcin, Robert P. Streit, Benjamin Oommen, Sriram Vishwanath, Sandeep Chinchali
Oguzhan Akcin, Robert P. Streit, Benjamin Oommen, Sriram Vishwanath, Sandeep Chinchali
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3
Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
Efficient Gaussian sampling for RLWE-based cryptography through a fast Fourier transform
Marcio Barbado Junior
Marcio Barbado Junior
On new results on Extremal Algebraic Graph Theory and their connections with Algebraic Cryptography
Vasyl Ustimenko
Vasyl Ustimenko
Quagmire ciphers and group theory: What is a Beaufort cipher?
Thomas Kaeding
Thomas Kaeding
An efficient verifiable state for zk-EVM and beyond from the Anemoi hash function
Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, and Weikeng Chen
Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, and Weikeng Chen
Correlation Intractability and SNARGs from Sub-exponential DDH
Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang
Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang
Policy-Based Redactable Signatures
Zachary A Kissel
Zachary A Kissel
Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions
Anna Lysyanskaya and Leah Namisa Rosenbloom
Anna Lysyanskaya and Leah Namisa Rosenbloom
Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead
Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, and Joppe W. Bos
Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, and Joppe W. Bos
Multi-Point HashDH OPRF using Multiplicative Blinding with Application to Private Set Intersection
Minglang Dong
Minglang Dong
Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption
Cas Cremers, Mang Zhao
Cas Cremers, Mang Zhao
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
Benoit Chevallier-Mames
Benoit Chevallier-Mames
A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack
Jesús-Javier Chi-Domínguez
Jesús-Javier Chi-Domínguez
Limits on revocable proof systems, with applications to stateless blockchains
Miranda Christ, Joseph Bonneau
Miranda Christ, Joseph Bonneau
A Post-Quantum Digital Signature Scheme from QC-LDPC Codes
Christian Picozzi, Alessio Meneghetti, Giovanni Tognolini
Christian Picozzi, Alessio Meneghetti, Giovanni Tognolini
The EVIL Machine: Encode, Visualize and Interpret the Leakage
Valence Cristiani, Maxime Lecomte, Philippe Maurine
Valence Cristiani, Maxime Lecomte, Philippe Maurine
Quagmire ciphers and group theory: Recovering keywords from the key table
Thomas Kaeding
Thomas Kaeding
Quantum security of subset cover problems
Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud
Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud
Let's Meet Ternary Keys on Babai's Plane: A Hybrid of Lattice-reduction and Meet-LWE
Minki Hhan, Jiseung Kim, Changmin Lee, and Yongha Son
Minki Hhan, Jiseung Kim, Changmin Lee, and Yongha Son
Hardware-Supported Cryptographic Protection of Random Access Memory
Roberto Avanzi, Ionut Mihalcea, David Schall, Héctor Montaner, and Andreas Sandberg
Roberto Avanzi, Ionut Mihalcea, David Schall, Héctor Montaner, and Andreas Sandberg
Peer-to-Peer Energy Trading Meets Blockchain: Consensus via Score-Based Bid Assignment
Xiangyu Su, Xavier Défago, Mario Larangeira, Kazuyuki Mori, Takuya Oda, Yuta Okumura, Yasumasa Tamura, Keisuke Tanaka
Xiangyu Su, Xavier Défago, Mario Larangeira, Kazuyuki Mori, Takuya Oda, Yuta Okumura, Yasumasa Tamura, Keisuke Tanaka
Casting out Primes: Bignum Arithmetic for Zero-Knowledge Proofs
Daniel Lubarov, Jordi Baylina Melé
Daniel Lubarov, Jordi Baylina Melé
Supersingular Curves You Can Trust
Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski
Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning
Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran
Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences
Emanuele Bellini, David Gerault, Anna Hambitzer, and Matteo Rossi
Emanuele Bellini, David Gerault, Anna Hambitzer, and Matteo Rossi
I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups
Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, and Fabien Laguillaumie
Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, and Fabien Laguillaumie
Private Collaborative Data Cleaning via Non-Equi PSI
Erik-Oliver Blass, Florian Kerschbaum
Erik-Oliver Blass, Florian Kerschbaum
Parallel Isogeny Path Finding with Limited Memory
Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger
Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger
How to Obfuscate MPC Inputs
Ian McQuoid, Mike Rosulek, Jiayu Xu
Ian McQuoid, Mike Rosulek, Jiayu Xu
RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the RTL for Security Applications
Rasheed Kibria, M. Sazadur Rahman, Farimah Farahmandi, Mark Tehranipoor
Rasheed Kibria, M. Sazadur Rahman, Farimah Farahmandi, Mark Tehranipoor
ACORN: Input Validation for Secure Aggregation
James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity
Hyesun Kwak, Seonhong Min, and Yongsoo Song
Hyesun Kwak, Seonhong Min, and Yongsoo Song
Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice
Kamil Kluczniak
Kamil Kluczniak
Speeding-Up Elliptic Curve Cryptography Algorithms
Diana Maimut, Alexandru Cristian Matei
Diana Maimut, Alexandru Cristian Matei
Secure Non-Interactive Reducibility is Decidable
Kaartik Bhushan, Ankit Kumar Misra, Varun Narayanan, Manoj Prabhakaran
Kaartik Bhushan, Ankit Kumar Misra, Varun Narayanan, Manoj Prabhakaran
Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting
Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan
Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications
Kevin Yeo
Kevin Yeo
Unjamming Lightning: A Systematic Approach
Clara Shikhelman, Sergei Tikhomirov
Clara Shikhelman, Sergei Tikhomirov
Assisted MPC
Philipp Muth, Stefan Katzenbeisser
Philipp Muth, Stefan Katzenbeisser
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber
Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
Attribute-Based Signatures for Range of Inner Product and Its Applications
Masahito Ishizaka, Kazuhide Fukushima
Masahito Ishizaka, Kazuhide Fukushima
Deterministic Wallets for Adaptor Signatures
Andreas Erwig, Siavash Riahi
Andreas Erwig, Siavash Riahi
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model
Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
Towards Practical Sleepy BFT
Dahlia Malkhi, Atsuki Momose, and Ling Ren
Dahlia Malkhi, Atsuki Momose, and Ling Ren
flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size
Ariel Gabizon and Dmitry Khovratovich
Ariel Gabizon and Dmitry Khovratovich
Radical isogenies and modular curves
Valentina Pribanić
Valentina Pribanić
Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules)
Shanjie Xu, Qi Da, Chun Guo
Shanjie Xu, Qi Da, Chun Guo
Finding Three-Subset Division Property for Ciphers with Complex Linear Layers (Full Version)
Debasmita Chakraborty
Debasmita Chakraborty
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
Bo Yang, Yanchao Zhang, Dong Tong
Bo Yang, Yanchao Zhang, Dong Tong
FairPoS: Input Fairness in Permissionless Consensus
James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong
James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong
Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE
Yu Liu, Haodong Jiang, Yunlei Zhao
Yu Liu, Haodong Jiang, Yunlei Zhao
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version)
Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab
Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab
Cryptographic Smooth Neighbors
Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Meyer, Michael Naehrig, and Bruno Sterner
Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Meyer, Michael Naehrig, and Bruno Sterner
Plug-and-play sanitization for TFHE
Florian Bourse and Malika Izabachène
Florian Bourse and Malika Izabachène
Secure Multiparty Computation from Threshold Encryption Based on Class Groups
Lennart Braun, Ivan Damgård, and Claudio Orlandi
Lennart Braun, Ivan Damgård, and Claudio Orlandi
Efficient and Generic Transformations for Chosen-Ciphertext Secure Predicate Encryption
Marloes Venema, Leon Botros
Marloes Venema, Leon Botros
Eagle: Efficient Privacy Preserving Smart Contracts
Carsten Baum, James Hsin-yu Chiang, Bernardo David, and Tore Kasper Frederiksen
Carsten Baum, James Hsin-yu Chiang, Bernardo David, and Tore Kasper Frederiksen
Weightwise almost perfectly balanced functions: secondary constructions for all $n$ and better weightwise nonlinearities
Agnese Gini, Pierrick Méaux
Agnese Gini, Pierrick Méaux
BG: A Modular Treatment of BFT Consensus
Xiao Sui, Sisi Duan, and Haibin Zhang
Xiao Sui, Sisi Duan, and Haibin Zhang
A Lattice-based Ring Signature Scheme Secure against Key Exposure
Xiaoling Yu, Yuntao Wang
Xiaoling Yu, Yuntao Wang
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu
Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu
Indistinguishability Obfuscation via Mathematical Proofs of Equivalence
Abhishek Jain, Zhengzhong Jin
Abhishek Jain, Zhengzhong Jin
Collusion Resistant Copy-Protection for Watermarkable Functionalities
Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry
Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry
TrustBoost: Boosting Trust among Interoperable Blockchains
Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath
Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath
Improved Quantum Analysis of SPECK and LowMC (Full Version)
Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption
Esra Günsay, Oğuz Yayla
Esra Günsay, Oğuz Yayla
Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC
Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
DeFi That Defies: Imported Off-Chain Metrics and Pseudonymous On-Chain Activity
David W. Kravitz, Mollie Z. Halverson
David W. Kravitz, Mollie Z. Halverson
The Superlinearity Problem in Post-Quantum Blockchains
Sunoo Park, Nicholas Spooner
Sunoo Park, Nicholas Spooner
Unlinkable Policy-based Sanitizable Signatures
Ismail Afia, Riham AlTawy
Ismail Afia, Riham AlTawy
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus
Shravan Srinivasan, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri AravindaKrishnan Thyagarajan
Shravan Srinivasan, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri AravindaKrishnan Thyagarajan
Diamonds are Forever, Loss-Versus-Rebalancing is Not
Conor McMenamin, Vanesa Daza, Bruno Mazorra
Conor McMenamin, Vanesa Daza, Bruno Mazorra
Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions
Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk, Nicholas Spooner
Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk, Nicholas Spooner
Da Yan Concentrator and Extender of Random Data (DYCE)
Anna M. Johnston, Puru Kulkarni
Anna M. Johnston, Puru Kulkarni
Efficient Dynamic Proof of Retrievability for Cold Storage
Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang
Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang
Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw
Martin Brisfors, Michail Moraitis, Elena Dubrova
Martin Brisfors, Michail Moraitis, Elena Dubrova
FABEO: Fast Attribute-Based Encryption with Optimal Security
Doreen Riepel and Hoeteck Wee
Doreen Riepel and Hoeteck Wee
INT-RUP Security of SAEB and TinyJAMBU
Nilanjan Datta, Avijit Dutta, Shibam Ghosh
Nilanjan Datta, Avijit Dutta, Shibam Ghosh
How to Compress Encrypted Data
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
Algorithm xxx: Evaluating a Boolean Polynomial on All Possible Inputs
Charles Bouillaguet
Charles Bouillaguet
Cryptographic Administration for Secure Group Messaging
David Balbás, Daniel Collins, Serge Vaudenay
David Balbás, Daniel Collins, Serge Vaudenay
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware
Hauke Steffen, Georg Land, Lucie Kogelheide, Tim Güneysu
Hauke Steffen, Georg Land, Lucie Kogelheide, Tim Güneysu
SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
BRAKE: Biometric Resilient Authenticated Key Exchange
Pia Bauspieß, Tjerand Silde, Matej Poljuha, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, and Christoph Busch
Pia Bauspieß, Tjerand Silde, Matej Poljuha, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, and Christoph Busch
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head
Thibauld Feneuil, Matthieu Rivain
Thibauld Feneuil, Matthieu Rivain
Protecting Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations
Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal
Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal
Subverting Deniability
Marcel Armour, Elizabeth A. Quaglia
Marcel Armour, Elizabeth A. Quaglia
Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack
Han Wu, Xiaoyun Wang, Guangwu Xu
Han Wu, Xiaoyun Wang, Guangwu Xu
On the Dual Attack of LWE Schemes in the Presence of Hints
Han Wu, Xiaoyun Wang, Guangwu Xu
Han Wu, Xiaoyun Wang, Guangwu Xu
Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF
Chandan Kumar, Mahendra Rathor, Urbi Chatterjee
Chandan Kumar, Mahendra Rathor, Urbi Chatterjee
PIRANA: Faster Multi-query PIR via Constant-weight Codes
Jian Liu, Jingyu Li, Di Wu, and Kui Ren
Jian Liu, Jingyu Li, Di Wu, and Kui Ren
EdMSM: Multi-Scalar-Multiplication for SNARKs and Faster Montgomery multiplication
Youssef El Housni, Gautam Botrel
Youssef El Housni, Gautam Botrel
Low-latency implementation of the GIFT cipher on RISC-V architectures
Gheorghe Pojoga, Kostas Papagiannopoulos
Gheorghe Pojoga, Kostas Papagiannopoulos
MILP-aided Cryptanalysis of the FUTURE Block Cipher
Murat Burhan İlter and Ali Aydin Selcuk
Murat Burhan İlter and Ali Aydin Selcuk
Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
Giovanni Deligios and Chen-Da Liu-Zhang
Giovanni Deligios and Chen-Da Liu-Zhang
FPGA Acceleration of Multi-Scalar Multiplication: CycloneMSM
Kaveh Aasaraai, Don Beaver, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela
Kaveh Aasaraai, Don Beaver, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela
Non-Interactive Anonymous Router with Quasi-Linear Router Computation
Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, and Brent Waters
Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, and Brent Waters
Risky Translations: Securing TLBs against Timing Side Channels
Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams
Dario Fiore, Ida Tucker
Dario Fiore, Ida Tucker
A Faster Third-Order Masking of Lookup Tables
Anju Alexander, Annapurna Valiveti, Srinivas Vivek
Anju Alexander, Annapurna Valiveti, Srinivas Vivek
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation
Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida
Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida
Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures
Reo Eriguchi, Noboru Kunihiro, Koji Nuida
Reo Eriguchi, Noboru Kunihiro, Koji Nuida
Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling
Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
MIPS Assembly Language Implementation of GIFT-64-128 Encryption
William Diehl
William Diehl
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security (Full Version)
Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee
Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee
A multivariate noise-free HE proposal
Gerald Gavin, Sandrine Tainturier
Gerald Gavin, Sandrine Tainturier
Deep Reinforcement Learning-based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks
Nikolaos Papadis and Leandros Tassiulas
Nikolaos Papadis and Leandros Tassiulas
Non-uniformity and Quantum Advice in the Random Oracle Model
Qipeng Liu
Qipeng Liu
Sublinear-Round Broadcast without Trusted Setup against Dishonest Majority
Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, and Giorgos Tsimos
Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, and Giorgos Tsimos
Quagmire ciphers, group theory, and information: Key amplification in crib-based attacks
Thomas Kaeding
Thomas Kaeding
How to backdoor LWE-like cryptosystems
Tobias Hemmert
Tobias Hemmert
Post-Quantum Zero-Knowledge with Space-Bounded Simulation
Prabhanjan Ananth, Alex B. Grilo
Prabhanjan Ananth, Alex B. Grilo
Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance
David Cerezo Sánchez
David Cerezo Sánchez
A Fast Hash Family for Memory Integrity
Qiming Li, Sampo Sovio
Qiming Li, Sampo Sovio
Improved Differential and Linear Trail Bounds for ASCON
Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen
Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen
Modeling Effective Lifespan of Payment Channels
Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments
Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa
Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa
Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing
Lijun Qi, Jincheng Zhuang
Lijun Qi, Jincheng Zhuang
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret
Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou
Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou
Security and Quantum Computing: An Overview
Prasannna Ravi, Anupam Chattopadhyay, Shivam Bhasin
Prasannna Ravi, Anupam Chattopadhyay, Shivam Bhasin
On the Security of KOS
Benjamin E. Diamond
Benjamin E. Diamond
A New Post-Quantum Key Agreement Protocol and Derived Cryptosystem Based on Rectangular Matrices
Hugo Daniel Scolnik, Juan Pedro Hecht
Hugo Daniel Scolnik, Juan Pedro Hecht
Network-Agnostic Security Comes (Almost) for Free in DKG and MPC
Renas Bacho, Daniel Collins, Chen-Da Liu-Zhang, and Julian Loss
Renas Bacho, Daniel Collins, Chen-Da Liu-Zhang, and Julian Loss
Functional Commitments for All Functions, with Transparent Setup and from SIS
Leo de Castro, Chris Peikert
Leo de Castro, Chris Peikert
Agile Cryptography: A Universally Composable Approach
Christian Badertscher, Michele Ciampi, and Aggelos Kiayias
Christian Badertscher, Michele Ciampi, and Aggelos Kiayias
Two remarks on the vectorization problem
Wouter Castryck, Natan Vander Meeren
Wouter Castryck, Natan Vander Meeren
Chainable Functional Commitments for Unbounded-Depth Circuits
David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai
David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai
On Polynomial Functions Modulo $p^e$ and Faster Bootstrapping for Homomorphic Encryption
Robin Geelen, Ilia Iliashenko, Jiayi Kang, and Frederik Vercauteren
Robin Geelen, Ilia Iliashenko, Jiayi Kang, and Frederik Vercauteren
Bootstrapping for BGV and BFV Revisited
Robin Geelen and Frederik Vercauteren
Robin Geelen and Frederik Vercauteren
ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations
Samuel Jaques, Michael Lodder, and Hart Montgomery
Samuel Jaques, Michael Lodder, and Hart Montgomery
Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber
Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, and Pascal Benoit
Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, and Pascal Benoit
One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks
Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, and Ming Tang
Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, and Ming Tang
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model
Haruhisa Kosuge and Keita Xagawa
Haruhisa Kosuge and Keita Xagawa
Commitments to Quantum States
Sam Gunn, Nathan Ju, Fermi Ma, Mark Zhandry
Sam Gunn, Nathan Ju, Fermi Ma, Mark Zhandry
A Theory of Composition for Differential Obliviousness
Mingxun Zhou, Elaine Shi, T-H. Hubert Chan, and Shir Maimon
Mingxun Zhou, Elaine Shi, T-H. Hubert Chan, and Shir Maimon
A fully classical LLL algorithm for modules
Gabrielle De Micheli, Daniele Micciancio
Gabrielle De Micheli, Daniele Micciancio
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates
Binyi Chen, Benedikt Bünz, Dan Boneh, and Zhenfei Zhang
Binyi Chen, Benedikt Bünz, Dan Boneh, and Zhenfei Zhang
Embracing Hellman: A Simple Proof-of-Space Search consensus algorithm with stable block times using Logarithmic Embargo
Marijn F. Stollenga
Marijn F. Stollenga
Anonymous Permutation Routing
Paul Bunn, Eyal Kushilevitz, and Rafail Ostrovsky
Paul Bunn, Eyal Kushilevitz, and Rafail Ostrovsky
aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes
Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphaël R. Toledo
Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphaël R. Toledo
Better Steady than Speedy: Full break of SPEEDY-7-192
Christina Boura, Nicolas David, Rachelle Heim Boissier, Maria Naya-Plasencia
Christina Boura, Nicolas David, Rachelle Heim Boissier, Maria Naya-Plasencia
Rai-Choo! Evolving Blind Signatures to the Next Level
Lucjan Hanzlik, Julian Loss, Benedikt Wagner
Lucjan Hanzlik, Julian Loss, Benedikt Wagner
Invertibility of multiple random functions and its application to symmetric ciphers
Xiutao Feng, Xiaoshan GAO, Zhangyi WANG, Xiangyong ZENG
Xiutao Feng, Xiaoshan GAO, Zhangyi WANG, Xiangyong ZENG
ABE for DFA from LWE against Bounded Collusions, Revisited
Hoeteck Wee
Hoeteck Wee
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness
Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada
Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada
Generic Signature from Noisy Systems
Trey Li
Trey Li
Revisiting Security Estimation for LWE with Hints from a Geometric Perspective
Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen
Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen
Discrete Exponential Equations and Noisy Systems
Trey Li
Trey Li
Refined Strategy for Solving LWE in Two-step Mode
Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, and Baocang Wang
Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, and Baocang Wang
Block Cipher Doubling for a Post-Quantum World
Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia
Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia
LaBRADOR: Compact Proofs for R1CS from Module-SIS
Ward Beullens, Gregor Seiler
Ward Beullens, Gregor Seiler
Understanding the Duplex and Its Security
Bart Mennink
Bart Mennink
CCA-1 Secure Updatable Encryption with Adaptive Security
Huanhuan Chen, Yao Jiang Galteland, and Kaitai Liang
Huanhuan Chen, Yao Jiang Galteland, and Kaitai Liang
Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions
Sebastian Ramacher, Daniel Slamanig, Andreas Weninger
Sebastian Ramacher, Daniel Slamanig, Andreas Weninger
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium
Timo Glaser and Alexander May
Timo Glaser and Alexander May
One-Wayness in Quantum Cryptography
Tomoyuki Morimae and Takashi Yamakawa
Tomoyuki Morimae and Takashi Yamakawa
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective
Kai Hu, Thomas Peyrin, Quan Quan Tan, and Trevor Yap
Kai Hu, Thomas Peyrin, Quan Quan Tan, and Trevor Yap
Post-Quantum Signature from Subset Product with Errors
Trey Li
Trey Li
Fast Fully Oblivious Compaction and Shuffling
Sajin Sasy, Aaron Johnson, Ian Goldberg
Sajin Sasy, Aaron Johnson, Ian Goldberg
On the Classic Protocol for MPC Schnorr Signatures
Nikolaos Makriyannis
Nikolaos Makriyannis
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures
Dario Catalano, Dario Fiore, Ida Tucker
Dario Catalano, Dario Fiore, Ida Tucker
Hybrid Dual and Meet-LWE Attack
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
New Time-Memory Trade-Offs for Subset Sum -- Improving ISD in Theory and Practice
Andre Esser, Floyd Zweydinger
Andre Esser, Floyd Zweydinger
Revisiting Nearest-Neighbor-Based Information Set Decoding
Andre Esser
Andre Esser
Post-Quantum Public Key Cryptosystem from Subset Product with Errors
Trey Li
Trey Li
Survey: Non-malleable code in the split-state model
Divesh Aggarwal, Marshall Ball, Maciej Obremski
Divesh Aggarwal, Marshall Ball, Maciej Obremski
Efficient and Complete Formulas for Binary Curves
Thomas Pornin
Thomas Pornin
Adaptive Multiparty NIKE
Venkata Koppula, Brent Waters, Mark Zhandry
Venkata Koppula, Brent Waters, Mark Zhandry
On Constructing One-Way Quantum State Generators, and More
Shujiao Cao and Rui Xue
Shujiao Cao and Rui Xue
Efficient Linkable Ring Signature from Vector Commitment inexplicably named Multratug
Anton A. Sokolov
Anton A. Sokolov
cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs
Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen
Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen
Boosting Batch Arguments and RAM Delegation
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
Post-Quantum Key Exchange from Subset Product With Errors
Trey Li
Trey Li
General Partially Fair Multi-Party Computation with VDFs
Bolton Bailey, Andrew Miller, Or Sattath
Bolton Bailey, Andrew Miller, Or Sattath
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption
Aayush Jain, Huijia Lin, and Ji Luo
Aayush Jain, Huijia Lin, and Ji Luo
TurboPack: Honest Majority MPC with Constant Online Communication
Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song
Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song
Hitchhiker’s Guide to a Practical Automated TFHE Parameter Setup for Custom Applications
Jakub Klemsa
Jakub Klemsa
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
Bounded Surjective Quadratic Functions over $\mathbb F_p^n$ for MPC-/ZK-/FHE-Friendly Symmetric Primitives
Lorenzo Grassi
Lorenzo Grassi
Multiple Modular Unique Factorization Domain Subset Product with Errors
Trey Li
Trey Li
Fully Adaptive Decentralized Multi-Authority ABE
Pratish Datta, Ilan Komargodski, Brent Waters
Pratish Datta, Ilan Komargodski, Brent Waters
Power Residue Symbol Order Detecting Algorithm for Subset Product over Algebraic Integers
Trey Li
Trey Li
MPC as a service using Ethereum Registry Smart Contracts - dCommon CIP
Matt Shams(Anis), Bingsheng Zhang, Justinas Zaliaduonis
Matt Shams(Anis), Bingsheng Zhang, Justinas Zaliaduonis
Jacobi Symbol Parity Checking Algorithm for Subset Product
Trey Li
Trey Li
BLOOM: Bimodal Lattice One-Out-of-Many Proofs and Applications
Vadim Lyubashevsky, Ngoc Khanh Nguyen
Vadim Lyubashevsky, Ngoc Khanh Nguyen
Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols
Kazumasa Shinagawa, Koji Nuida
Kazumasa Shinagawa, Koji Nuida
Subset Product with Errors over Unique Factorization Domains and Ideal Class Groups of Dedekind Domains
Trey Li
Trey Li
Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations
Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
Fast and Clean: Auditable high-performance assembly via constraint solving
Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, and Fabien Klein
Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, and Fabien Klein
Private Certifier Intersection
Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
On the Invalidity of Lin16/Lin17 Obfuscation Schemes
Hu Yupu, Dong Siyue, Wang Baocang, Dong Xingting
Hu Yupu, Dong Siyue, Wang Baocang, Dong Xingting
Garrison: A Novel Watchtower Scheme for Bitcoin
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
Addax: A fast, private, and accountable ad exchange infrastructure
Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel
Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel
BLEACH: Cleaning Errors in Discrete Computations over CKKS
Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul
Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul
Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity
Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco
Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco
Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage
Constantin Blokh, Nikolaos Makriyannis, and Udi Peled
Constantin Blokh, Nikolaos Makriyannis, and Udi Peled
Daric: A Storage Efficient Payment Channel With Penalization Mechanism
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
What Can Cryptography Do For Decentralized Mechanism Design?
Elaine Shi, Hao Chung, Ke Wu
Elaine Shi, Hao Chung, Ke Wu
Improving the Efficiency of Report and Trace Ring Signatures
Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia
Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia
Bet-or-Pass: Adversarially Robust Bloom Filters
Moni Naor, Noa Oved
Moni Naor, Noa Oved
sMGM: parameterizable AEAD-mode
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform
Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren
Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren
Exploring RNS for Isogeny-based Cryptography
David Jacquemin, Ahmet Can Mert, Sujoy Sinha Roy
David Jacquemin, Ahmet Can Mert, Sujoy Sinha Roy
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
On a Conjecture From a Failed CryptoAnalysis
Shengtong Zhang
Shengtong Zhang
ZEBRA: SNARK-based Anonymous Credentials for Practical, Private and Accountable On-chain Access Control
Deevashwer Rathee, Guru Vamsi Policharla, Tiancheng Xie, Ryan Cottone, Dawn Song
Deevashwer Rathee, Guru Vamsi Policharla, Tiancheng Xie, Ryan Cottone, Dawn Song
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption
Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi
Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi
(Inner-Product) Functional Encryption with Updatable Ciphertexts
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, and Erkan Tairi
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, and Erkan Tairi
A Note on Reimplementing the Castryck-Decru Attack and Lessons Learned for SageMath
Rémy Oudompheng, Giacomo Pope
Rémy Oudompheng, Giacomo Pope
Comparing Key Rank Estimation Methods
Rebecca Young, Luke Mather, Elisabeth Oswald
Rebecca Young, Luke Mather, Elisabeth Oswald
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X
Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou
Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou
Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou
Improved Neural Distinguishers with Multi-Round and Multi-Splicing Construction
Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen, ManMan Li
Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen, ManMan Li
Fast Evaluation of S-boxes with Garbled Circuits
Erik Pohle, Aysajan Abidin, and Bart Preneel
Erik Pohle, Aysajan Abidin, and Bart Preneel
Compact GF(2) systemizer and optimized constant-time hardware sorters for Key Generation in Classic McEliece
Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu
Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu
Second-Order Low-Randomness $d+1$ Hardware Sharing of the AES
Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi
Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi
DiAE: Re-rolling the DiSE
Alexandre Duc, Robin Müller, Damian Vizár
Alexandre Duc, Robin Müller, Damian Vizár
Self Masking for Hardering Inversions
Paweł Cyprys, Shlomi Dolev, and Shlomo Moran
Paweł Cyprys, Shlomi Dolev, and Shlomo Moran
A Conjecture From a Failed Cryptanalysis
David Naccache, Ofer Yifrach-Stav
David Naccache, Ofer Yifrach-Stav
PPAD is as Hard as LWE and Iterated Squaring
Nir Bitansky, Arka Rai Choudhuri, Justin Holmgren, Chethan Kamath, Alex Lombardi, Omer Paneth, Ron D. Rothblum
Nir Bitansky, Arka Rai Choudhuri, Justin Holmgren, Chethan Kamath, Alex Lombardi, Omer Paneth, Ron D. Rothblum
Privacy-preserving Federated Singular Value Decomposition
Bowen LIU, Balázs Pejó, Qiang TANG
Bowen LIU, Balázs Pejó, Qiang TANG
Typing High-Speed Cryptography against Spectre v1
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean
Collusion-Resistant Functional Encryption for RAMs
Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian
Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian
Cryptographic Role-Based Access Control, Reconsidered
Bin Liu, Antonis Michalas, Bogdan Warinschi
Bin Liu, Antonis Michalas, Bogdan Warinschi
High-precision Leveled Homomorphic Encryption with Batching
Long Nie, ShaoWen Yao, Jing Liu
Long Nie, ShaoWen Yao, Jing Liu
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS
Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
Universal Ring Signatures in the Standard Model
Pedro Branco, Nico Döttling, Stella Wohnig
Pedro Branco, Nico Döttling, Stella Wohnig
Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency
Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, and Merry Ember Mou
Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, and Merry Ember Mou
Steganography-Free Zero-Knowledge
Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta
Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta
Vectorized Batch Private Information Retrieval
Muhammad Haris Mughees, Ling Ren
Muhammad Haris Mughees, Ling Ren
Breaking RSA Generically is Equivalent to Factoring, with Preprocessing
Dana Dachman-Soled, Julian Loss, Adam O'Neill
Dana Dachman-Soled, Julian Loss, Adam O'Neill
On Committing Authenticated Encryption
John Chan, Phillip Rogaway
John Chan, Phillip Rogaway
Horizontal racewalking using radical isogenies
Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren
Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications
Xiangyu Liu, Shengli Liu, Dawu Gu
Xiangyu Liu, Shengli Liu, Dawu Gu
One-Time Programs from Commodity Hardware
Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus
Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus
EvalRound Algorithm in CKKS Bootstrapping
Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, and Chohong Min
Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, and Chohong Min
PLUME: An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs
Aayush Gupta, Kobi Gurkan
Aayush Gupta, Kobi Gurkan
Protecting the most significant bits in scalar multiplication algorithms
Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi
Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs
Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda
Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda
Functional Encryption with Secure Key Leasing
Fuyuki Kitagawa, Ryo Nishimaki
Fuyuki Kitagawa, Ryo Nishimaki
Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup
Nan Wang, Sid Chi-Kin Chau
Nan Wang, Sid Chi-Kin Chau
Eureka: A General Framework for Black-box Differential Privacy Estimators
Yun Lu, Malik Magdon-Ismail, Yu Wei, and Vassilis Zikas
Yun Lu, Malik Magdon-Ismail, Yu Wei, and Vassilis Zikas
On Rejection Sampling in Lyubashevsky's Signature Scheme
Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé
Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé
Fully-Secure MPC with Minimal Trust
Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan
Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
Identity-Based Matchmaking Encryption from Standard Assumptions
Jie Chen, Yu Li, Jinming Wen, Jian Weng
Jie Chen, Yu Li, Jinming Wen, Jian Weng
On Generalizations of the Lai-Massey Scheme
Lorenzo Grassi
Lorenzo Grassi
A Modular Approach to the Security Analysis of Two-Permutation Constructions
Yu Long Chen
Yu Long Chen
Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64
Hanno Becker, Matthias J. Kannwischer
Hanno Becker, Matthias J. Kannwischer
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies
Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann
Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann
Continued Fractions Applied to a Family of RSA-like Cryptosystems
George Teseleanu, Paul Cotan
George Teseleanu, Paul Cotan
Sherlock Holmes Zero-Knowledge Protocols
George Teseleanu
George Teseleanu
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange
Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu
Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu
Secure Quantum Bit Commitment
Ping Wang, Yiting Su, Fangguo Zhang
Ping Wang, Yiting Su, Fangguo Zhang
On the Worst-Case Inefficiency of CGKA
Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler
Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler
Rate-1 Non-Interactive Arguments for Batch-NP and Applications
Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan
Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model
Tianshu Shan, Jiangxia Ge, Rui Xue
Tianshu Shan, Jiangxia Ge, Rui Xue
Towards Tight Security Bounds for OMAC, XCBC and TMAC
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Forward-Secure Encryption with Fast Forwarding
Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan
Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan
The Abe-Okamoto Partially Blind Signature Scheme Revisited
Julia Kastner, Julian Loss, Jiayu Xu
Julia Kastner, Julian Loss, Jiayu Xu
Continuously Non-Malleable Codes against Bounded-Depth Tampering
Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi
Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM
Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions
Benoît Libert, Ky Nguyen, Alain Passelègue
Benoît Libert, Ky Nguyen, Alain Passelègue
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization
Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
How to Sample a Discrete Gaussian (and more) from a Random Oracle
George Lu, Brent Waters
George Lu, Brent Waters
Algebraic Relation of Three MinRank Algebraic Modelings
Hao Guo, Jintai Ding
Hao Guo, Jintai Ding
Hybrid Post-Quantum Signatures in Hardware Security Keys
Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, and Elie Bursztein
Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, and Elie Bursztein
From Plaintext-extractability to IND-CCA Security
Ehsan Ebrahimi
Ehsan Ebrahimi
Efficient Proofs of Software Exploitability for Real-world Processors
Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer
Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer
Homomorphic Encryption on GPU
Ali Şah Özcan, Can Ayduman, Enes Recep Türkoğlu, Erkay Savaş
Ali Şah Özcan, Can Ayduman, Enes Recep Türkoğlu, Erkay Savaş
Multi-User Security of the Sum of Truncated Random Permutations (Full Version)
Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
Permissionless Clock Synchronization with Public Setup
Juan Garay, Aggelos Kiayias, Yu Shen
Juan Garay, Aggelos Kiayias, Yu Shen
Anonymous Random Allocation and Its Applications
Azam Soleimanian
Azam Soleimanian
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies
Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang
Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang
Privacy-Preserving Authenticated Key Exchange in the Standard Model
You Lyu, Shengli Liu, Shuai Han, Dawu Gu
You Lyu, Shengli Liu, Shuai Han, Dawu Gu
A summary on the FRI low degree test
Ulrich Haböck
Ulrich Haböck
Continuous Authentication in Secure Messaging
Benjamin Dowling, Felix Günther, Alexandre Poirrier
Benjamin Dowling, Felix Günther, Alexandre Poirrier
Updatable NIZKs from Non-Interactive Zaps
Karim Baghery, Navid Ghaedi Bardeh
Karim Baghery, Navid Ghaedi Bardeh
Nostradamus goes Quantum
Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert
Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert
VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections
David Chaum, Richard T. Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang
David Chaum, Richard T. Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang
Arithmetization of Functional Program Execution via Interaction Nets in Halo 2
Anthony Hart
Anthony Hart
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version)
Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei
Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei
Puncturable Key Wrapping and Its Applications
Matilda Backendal, Felix Günther, Kenneth G. Paterson
Matilda Backendal, Felix Günther, Kenneth G. Paterson
Notes on Reusable Garbling
Hu Yupu, Dong Siyue, Wang Baocang, Liu Jun
Hu Yupu, Dong Siyue, Wang Baocang, Liu Jun
Attaining GOD Beyond Honest Majority With Friends and Foes
Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul
Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul
On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
Accountable Light Client Systems for PoS Blockchains
Oana Ciobotaru, Fatemeh Shirazi, Alistair Stewart, Sergey Vasilyev
Oana Ciobotaru, Fatemeh Shirazi, Alistair Stewart, Sergey Vasilyev
The Pseudorandom Oracle Model and Ideal Obfuscation
Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs
Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs
On Module Unique-SVP and NTRU
Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé
Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé
Disorientation faults in CSIDH
Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, Monika Trimoska
Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, Monika Trimoska
Leakage Certification Made Simple
Aakash Chowdhury, Carlo Brunetta, Arnab Roy, and Elisabeth Oswald
Aakash Chowdhury, Carlo Brunetta, Arnab Roy, and Elisabeth Oswald
SEEK: model extraction attack against hybrid secure inference protocols
Si Chen, Junfeng Fan
Si Chen, Junfeng Fan
Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis
Xiaofeng Xie, Tian Tian
Xiaofeng Xie, Tian Tian
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures
Alexander Wagner, Felix Oberhansl, Marc Schink
Alexander Wagner, Felix Oberhansl, Marc Schink
On Squaring Modulo Mersenne Numbers
David Naccache, Ofer Yifrach-Stav
David Naccache, Ofer Yifrach-Stav
Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices
Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay
Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay
A Deep Neural Differential Distinguisher for ARX based Block Cipher
Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, and Dipanwita Roy Chowdhury
Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, and Dipanwita Roy Chowdhury
Multi-Authority ABE from Lattices without Random Oracles
Brent Waters, Hoeteck Wee, David J. Wu
Brent Waters, Hoeteck Wee, David J. Wu
Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity
Yi Deng, Xinxuan Zhang
Yi Deng, Xinxuan Zhang
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
A New Framework for Quantum Oblivious Transfer
Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar
Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar
Statistical Security in Two-Party Computation Revisited
Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar
Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar
CSI-SharK: CSI-FiSh with Sharing-friendly Keys
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
High-order masking of NTRU
Jean-Sebastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
Jean-Sebastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
Strongly Anonymous Ratcheted Key Exchange
Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler
Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler
Adversarial Correctness and Privacy for Probabilistic Data Structures
Mia Filić, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
Mia Filić, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
PEA: Practical private epistasis analysis using MPC
Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
On digital signatures based on group actions: QROM security and ring signatures
Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Ngoc Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, and Gang Tang
Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Ngoc Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, and Gang Tang
Fast and Efficient Hardware Implementation of HQC
Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer
Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co
Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
On the computational hardness needed for quantum cryptography
Zvika Brakerski, Ran Canetti, Luowen Qian
Zvika Brakerski, Ran Canetti, Luowen Qian
Cryptographic multilinear maps using pro-p groups
Delaram Kahrobaei, Mima Stanojkovski
Delaram Kahrobaei, Mima Stanojkovski
Trustless Cross-chain Communication for Zendoo Sidechains
Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
Cryptography with Certified Deletion
James Bartusek, Dakshita Khurana
James Bartusek, Dakshita Khurana
Liberating TFHE: Programmable Bootstrapping with General Quotient Polynomials
Marc Joye, Michael Walter
Marc Joye, Michael Walter
Anonymous Public Key Encryption under Corruptions
Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng
Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng
A Cryptanalysis of NOVA Signature Scheme
Dongyu Wu
Dongyu Wu
Ibex: Privacy-preserving ad conversion tracking and bidding (full version)
Ke Zhong, Yiping Ma, Sebastian Angel
Ke Zhong, Yiping Ma, Sebastian Angel
Secure Maximum Weight Matching Approximation on General Graphs (Full Version)
Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
On the Security of Keyed Hashing Based on Public Permutations
Jonathan Fuchs, Yann Rotella, Joan Daemen
Jonathan Fuchs, Yann Rotella, Joan Daemen
Goldfish: No More Attacks on Ethereum?!
Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, and David Tse
Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, and David Tse
TRIFORS: LINKable Trilinear Forms Ring Signature
Giuseppe D'Alconzo, Andrea Gangemi
Giuseppe D'Alconzo, Andrea Gangemi
DyCAPS: Asynchronous Dynamic-committee Proactive Secret Sharing
Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, and Jianwei Liu
Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, and Jianwei Liu
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality
Shweta Agrawal, Rishab Goyal, Junichi Tomida
Shweta Agrawal, Rishab Goyal, Junichi Tomida
META-BTS: Bootstrapping Precision Beyond the Limit
Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim
Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim
McEliece-type encryption based on Gabidulin codes with no hidden structure
Wenshuo Guo, Fang-Wei Fu
Wenshuo Guo, Fang-Wei Fu
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti
Point-Halving and Subgroup Membership in Twisted Edwards Curves
Thomas Pornin
Thomas Pornin
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert
Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert
Pairings in Rank-1 Constraint Systems
Youssef El Housni
Youssef El Housni
Group-based Cryptography in the Quantum Era
Delaram Kahrobaei, Ramón Flores, Marialaura Noce
Delaram Kahrobaei, Ramón Flores, Marialaura Noce
The Scholz conjecture on addition chain is true for $v(n)= 4$
Amadou TALL
Amadou TALL
Decomposing Linear Layers
Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom
Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom
Differential Cryptanalysis of K-Cipher
Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur
Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur
Classically Verifiable NIZK for QMA with Preprocessing
Tomoyuki Morimae, Takashi Yamakawa
Tomoyuki Morimae, Takashi Yamakawa
On the security of data markets: controlled Private Function Evaluation
István Vajda
István Vajda
Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple
Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel van Woerden
Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel van Woerden
Efficient Constant-Time Implementation of SM4 with Intel GFNI instruction set extension and Arm NEON coprocessor
Weiji Guo
Weiji Guo
Sharp: Short Relaxed Range Proofs
Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, and Michael Reichle
Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, and Michael Reichle
Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities
Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan
Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions
Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
Farasha: A Provable Permutation-based Parallelizable PRF
Najwa Aaraj, Emanuele Bellin, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar
Najwa Aaraj, Emanuele Bellin, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar
Secure Anycast Channels with Applications to 4G and 5G Handovers
Karl Norrman
Karl Norrman
On Security Against Time Traveling Adversaries
Lúcás Críostóir Meier
Lúcás Críostóir Meier
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hosein Hadipour, Sadegh Sadeghi, and Maria Eichlseder
Hosein Hadipour, Sadegh Sadeghi, and Maria Eichlseder
A Sponge-Based PRF with Good Multi-user Security
Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
Yafa-108/146: Implementing ed25519-embedding Cocks-Pinch curves in arkworks-rs
Rami Akeela, Weikeng Chen
Rami Akeela, Weikeng Chen
On the Higher bit Version of Approximate Inhomogeneous Short Integer Solution Problem
Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$
Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
Secure Message Authentication in the Presence of Leakage and Faults
Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert
Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes
Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen
Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen
Witness Encryption and Null-IO from Evasive LWE
Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
Formal Security Definition of Metadata-Private Messaging
Shengtong Zhang, Arvid Lunnemark, Sualeh Asif
Shengtong Zhang, Arvid Lunnemark, Sualeh Asif
Designated-Verifier Linkable Ring Signatures with unconditional anonymity
Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos
Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos
Private Computation On Set Intersection With Sublinear Communication
Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram
Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram
The Tropical Version of ElGamal Encryption
Any Muanalifah, Ayus Riana Isnawati
Any Muanalifah, Ayus Riana Isnawati
Full Quantum Equivalence of Group Action DLog and CDH, and More
Hart Montgomery, Mark Zhandry
Hart Montgomery, Mark Zhandry
An improved method for predicting truncated multiple recursive generators with unknown parameters
Han-Bing Yu, Qun-Xiong Zheng, Yi-Jian Liu, Jing-Guo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun
Han-Bing Yu, Qun-Xiong Zheng, Yi-Jian Liu, Jing-Guo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun
Secure Batch Deduplication Without Dual Servers in Backup System
Haoyu Zheng, Shengke Zeng, Hongwei Li, Zhijun Li
Haoyu Zheng, Shengke Zeng, Hongwei Li, Zhijun Li
Kryvos: Publicly Tally-Hiding Verifiable E-Voting
Nicolas Huber, Ralf Kuesters, Toomas Krips, Julian Liedtke, Johannes Mueller, Daniel Rausch, Pascal Reisert, Andreas Vogt
Nicolas Huber, Ralf Kuesters, Toomas Krips, Julian Liedtke, Johannes Mueller, Daniel Rausch, Pascal Reisert, Andreas Vogt
CINI MINIS: Domain Isolation for Fault and Combined Security
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
Cas Cremers, Charlie Jacomme, Philip Lukert
Cas Cremers, Charlie Jacomme, Philip Lukert
Breaking KASLR on Mobile Devices without Any Use of Cache Memory
Milad Seddigh, Mahdi Esfahani, Sarani Bhattacharya, Mohammad Reza Aref, Hadi Soleimany
Milad Seddigh, Mahdi Esfahani, Sarani Bhattacharya, Mohammad Reza Aref, Hadi Soleimany
On the (im)possibility of ElGamal blind signatures
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
Explicit infinite families of bent functions outside $\mathcal{MM}^\#$
Enes Pasalic, Amar Bapić, Fengrong Zhang, Yongzhuang Wei
Enes Pasalic, Amar Bapić, Fengrong Zhang, Yongzhuang Wei
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
Daniel J. Bernstein
Daniel J. Bernstein
Unbounded Quadratic Functional Encryption and More from Pairings
Junichi Tomida
Junichi Tomida
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers
Amit Jana, Mostafizar Rahman, Dhiman Saha
Amit Jana, Mostafizar Rahman, Dhiman Saha
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256
Orr Dunkelman, Eran Lambooij, Shibam Ghosh
Orr Dunkelman, Eran Lambooij, Shibam Ghosh
Practical Attacks on Full-round FRIET
Senpeng wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi
Senpeng wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi
VMEO: Vector Modeling Errors and Operands for Approximate adders
Vishesh Mishra, Urbi Chatterjee
Vishesh Mishra, Urbi Chatterjee
PESCA: A Privacy-Enhancing Smart-Contract Architecture
Wei Dai
Wei Dai
PentaGOD: Stepping beyond Traditional GOD with Five Parties
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
Two-Round Multi-Signatures from Okamoto Signatures
Kwangsu Lee, Hyoseung Kim
Kwangsu Lee, Hyoseung Kim
Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE
Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang
Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls
Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang
Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang
Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants
Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili
Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili
A new algorithm for solving the rSUM problem
Valerii Sopin
Valerii Sopin
Ergodic dynamical systems over the Cartesian power of the ring of p-adic integers
Valerii Sopin
Valerii Sopin
A tale of two models: formal verification of KEMTLS via Tamarin
Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers
Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers
Invisible Formula Attacks
David Naccache, Ofer Yifrach-Stav
David Naccache, Ofer Yifrach-Stav
A Note on Copy-Protection from Random Oracles
Prabhanjan Ananth, Fatih Kaleoglu
Prabhanjan Ananth, Fatih Kaleoglu
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model
Daniel Apon, Chloe Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu
Daniel Apon, Chloe Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu
Projective Geometry of Hessian Elliptic Curves and Genus 2 Triple Covers of Cubics
Rémy Oudompheng
Rémy Oudompheng
Towards Practical Topology-Hiding Computation
Shuaishuai Li
Shuaishuai Li
Arithmetization of Σ¹₁ relations with polynomial bounds in Halo 2
Anthony Hart, Morgan Thomas
Anthony Hart, Morgan Thomas
$\mu$Cash: Transparent Anonymous Transactions
Liam Eagen
Liam Eagen
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
Proofs of Quantumness from Trapdoor Permutations
Tomoyuki Morimae, Takashi Yamakawa
Tomoyuki Morimae, Takashi Yamakawa
Solutions to quantum weak coin flipping
Atul Singh Arora, Jérémie Roland, Chrysoula Vlachou, Stephan Weis
Atul Singh Arora, Jérémie Roland, Chrysoula Vlachou, Stephan Weis
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi
Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi
One-Hot Conversion: Towards Faster Table-based A2B Conversion
Jan-Pieter D'Anvers
Jan-Pieter D'Anvers
SoK: Security Evaluation of SBox-Based Block Ciphers
Joelle Lim, Derrick Ng, Ruth Ng
Joelle Lim, Derrick Ng, Ruth Ng
Post-Quantum Security of Tweakable Even-Mansour, and Applications
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, and Patrick Struck
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, and Patrick Struck
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries
Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay
Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay
Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication
KIM, SUNYEOP, KIM, INSUNG, Seonggyeom Kim, Seokhie Hong
KIM, SUNYEOP, KIM, INSUNG, Seonggyeom Kim, Seokhie Hong
Secure Integrated Sensing and Communication
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining
Ziying Ni, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O’Neill, Weiqiang Liu
Ziying Ni, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O’Neill, Weiqiang Liu
On NTRU-ν-um Modulo $X^N − 1$
Marc Joye
Marc Joye
Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture
Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu
Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
Pirmission: Single-server PIR with Access Control
Andrew Beams, Sebastian Angel
Andrew Beams, Sebastian Angel
Tighter trail bounds for Xoodoo
Joan Daemen, Silvia Mella, Gilles Van Assche
Joan Daemen, Silvia Mella, Gilles Van Assche
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis
Guilherme Perin, Sengim Karayalcin, Lichao Wu, and Stjepan Picek
Guilherme Perin, Sengim Karayalcin, Lichao Wu, and Stjepan Picek
KaLi: A Crystal for Post-Quantum Security using Kyber and Dilithium
Aikata Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy
Aikata Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning
Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu
Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu
Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform
Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win
Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win
Enigmap : External-Memory Oblivious Map for Secure Enclaves
Afonso Tinoco, Sixiang Gao, Elaine Shi
Afonso Tinoco, Sixiang Gao, Elaine Shi
Assisted Private Information Retrieval
Natnatee Dokmai, L. Jean Camp, Ryan Henry
Natnatee Dokmai, L. Jean Camp, Ryan Henry
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception
Xavier Bultel, Cristina Onete
Xavier Bultel, Cristina Onete
A Lightweight, Secure Big data-based Authentication and Key-agreement Scheme for IoT with Revocability
Behnam Zahednejad
Behnam Zahednejad
The inspection model for zero-knowledge proofs and efficient Zerocash with secp256k1 keys
Huachuang Sun, Haifeng Sun, Kevin Singh, Akhil Sai Peddireddy, Harshad Patil, Jianwei Liu, Weikeng Chen
Huachuang Sun, Haifeng Sun, Kevin Singh, Akhil Sai Peddireddy, Harshad Patil, Jianwei Liu, Weikeng Chen
Skip Ratchet: A Hierarchical Hash System
Brooklyn Zelenka
Brooklyn Zelenka
New Bounds on the Multiplicative Complexity of Boolean Functions
Meltem Sonmez Turan
Meltem Sonmez Turan
Range Search over Encrypted Multi-Attribute Data
Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
Secure Branching Program Evaluation
Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram
Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram
On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
Juliane Krämer, Patrick Struck
Juliane Krämer, Patrick Struck
Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in ``VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning''
Xiaojie Guo
Xiaojie Guo
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification
Alexandre Belling, Azam Soleimanian, and Olivier Bégassat
Alexandre Belling, Azam Soleimanian, and Olivier Bégassat
Performance Evaluation of NIST LWC Finalists on AVR ATmega and ARM Cortex-M3 Microcontrollers
Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
Efficient Unique Ring Signatures From Lattices
Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto
Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model
Marten van Dijk, Chenglu Jin
Marten van Dijk, Chenglu Jin
Evaluating isogenies in polylogarithmic time
Damien Robert
Damien Robert
Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters
Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi
Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi
FairBlock: Preventing Blockchain Front-running with Minimal Overheads
Peyman Momeni, Sergey Gorbunov, Bohan Zhang
Peyman Momeni, Sergey Gorbunov, Bohan Zhang
A Note on the Theoretical and Practical Security of Block Ciphers
Öznur MUT SAĞDIÇOĞLU, Serhat Sağdıçoğlu, Ebru Küçükkubaş
Öznur MUT SAĞDIÇOĞLU, Serhat Sağdıçoğlu, Ebru Küçükkubaş
Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs
Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang
Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang
Rapidash: Foundations of Side-Contract-Resilient Fair Exchange
Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization
Haiyan Wang
Haiyan Wang
Breaking Category Five SPHINCS+ with SHA-256
Ray Perlner, John Kelsey, David Cooper
Ray Perlner, John Kelsey, David Cooper
Programmable Distributed Point Functions
Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
Classification of all DO planar polynomials with prime field coefficients over GF(3^n) for n up to 7
Diana Davidova, Nikolay Kaleyski
Diana Davidova, Nikolay Kaleyski
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings
Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
Rebound Attacks on SKINNY Hashing with Automatic Tools
Shun Li, Guozhen Liu, Phuong Pham
Shun Li, Guozhen Liu, Phuong Pham
Linear-Time Probabilistic Proofs with Sublinear Verification for Algebraic Automata Over Every Field
Jonathan Bootle, Alessandro Chiesa, Ziyi Guan, Siqi Liu
Jonathan Bootle, Alessandro Chiesa, Ziyi Guan, Siqi Liu
Exploring Integrity of AEADs with Faults: Definitions and Constructions
Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin
Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin
SIDH with masked torsion point images
Tako Boris Fouotsa
Tako Boris Fouotsa
Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
Double-Odd Jacobi Quartic
Thomas Pornin
Thomas Pornin
How to Verifiably Encrypt Many Bits for an Election?
Henri Devillez, Olivier Pereira, Thomas Peters
Henri Devillez, Olivier Pereira, Thomas Peters
RapidUp: Multi-Domain Permutation Protocol for Lookup Tables
Héctor Masip Ardevol, Jordi Baylina Melé, Daniel Lubarov, José L. Muñoz-Tapia
Héctor Masip Ardevol, Jordi Baylina Melé, Daniel Lubarov, José L. Muñoz-Tapia
Post Quantum Design in SPDM for Device Authentication and Key Establishment
Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer
Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer
Practical Sublinear Proofs for R1CS from Lattices
Ngoc Khanh Nguyen, Gregor Seiler
Ngoc Khanh Nguyen, Gregor Seiler
Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
Post-Quantum Multi-Recipient Public Key Encryption
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe
On UC-Secure Range Extension and Batch Verification for ECVRF
Christian Badertscher, Peter Gaži, Iñigo Querejeta-Azurmendi, Alexander Russell
Christian Badertscher, Peter Gaži, Iñigo Querejeta-Azurmendi, Alexander Russell
Oblivious Revocable Functions and Encrypted Indexing
Kevin Lewi, Jon Millican, Ananth Raghunathan, Arnab Roy
Kevin Lewi, Jon Millican, Ananth Raghunathan, Arnab Roy
A Study of Error Floor Behavior in QC-MDPC Codes
Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
Weak Subtweakeys in SKINNY
Daniël Kuijsters, Denise Verbakel, Joan Daemen
Daniël Kuijsters, Denise Verbakel, Joan Daemen
Lattice-Based Cryptography in Miden VM
Alan Szepieniec, Frederik Vercauteren
Alan Szepieniec, Frederik Vercauteren
A framework for constructing Single Secret Leader Election from MPC
Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov
Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov
Theoretical Limits of Provable Security Against Model Extraction by Efficient Observational Defenses
Ari Karchmer
Ari Karchmer
Breaking SIDH in polynomial time
Damien Robert
Damien Robert
RPM: Robust Anonymity at Scale
Donghang Lu, Aniket Kate
Donghang Lu, Aniket Kate
MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase
Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
Efficient Pseudorandom Correlation Generators from Ring-LPN
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Finding All Impossible Differentials When Considering the DDT
Kai Hu, Thomas Peyrin, and Meiqin Wang
Kai Hu, Thomas Peyrin, and Meiqin Wang
A Complete Characterization of Security for Linicrypt Block Cipher Modes
Tommy Hollenberg, Mike Rosulek, Lawrence Roy
Tommy Hollenberg, Mike Rosulek, Lawrence Roy
On Non-uniform Security for Black-box Non-Interactive CCA Commitments
Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich
Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich
Oblivious Extractors and Improved Security in Biometric-based Authentication Systems
Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian
Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation
Nina Bindel, Cas Cremers, Mang Zhao
Nina Bindel, Cas Cremers, Mang Zhao
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead
Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen
Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions
Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi
Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi
An attack on SIDH with arbitrary starting curve
Luciano Maino, Chloe Martindale
Luciano Maino, Chloe Martindale
Parallelizable Delegation from LWE
Cody Freitag, Rafael Pass, Naomi Sirkin
Cody Freitag, Rafael Pass, Naomi Sirkin
Multi-Input Attribute Based Encryption and Predicate Encryption
Shweta Agrawal, Anshu Yadav, Shota Yamada
Shweta Agrawal, Anshu Yadav, Shota Yamada
SIM: Secure Interval Membership Testing and Applications to Secure Comparison
Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji
Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe
Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe
Practical Statistically-Sound Proofs of Exponentiation in any Group
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Uncle Maker: (Time)Stamping Out The Competition in Ethereum
Aviv Yaish, Gilad Stern, and Aviv Zohar
Aviv Yaish, Gilad Stern, and Aviv Zohar
Masked-degree SIDH
Tomoki Moriya
Tomoki Moriya
Time-Deniable Signatures
Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari
Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari
PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords
Gareth T. Davies, Jeroen Pijnenburg
Gareth T. Davies, Jeroen Pijnenburg
Public Key Authenticated Encryption with Keyword Search from LWE
Leixiao Cheng, Fei Meng
Leixiao Cheng, Fei Meng
Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes
Maya Chartouny, Jacques Patarin, and Ambre Toulemonde
Maya Chartouny, Jacques Patarin, and Ambre Toulemonde
Correlated Pseudorandomness from Expand-Accumulate Codes
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
Dynamic Local Searchable Symmetric Encryption
Brice Minaud, Michael Reichle
Brice Minaud, Michael Reichle
Nonce-Misuse Resilience of Romulus-N and GIFT-COFB
Akiko Inoue, Chun Guo, Kazuhiko Minematsu
Akiko Inoue, Chun Guo, Kazuhiko Minematsu
Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching
Gayathri Garimella, Mike Rosulek, Jaspal Singh
Gayathri Garimella, Mike Rosulek, Jaspal Singh
Orion: Zero Knowledge Proof with Linear Prover Time
Tiancheng Xie, Yupeng Zhang, and Dawn Song
Tiancheng Xie, Yupeng Zhang, and Dawn Song
Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions
Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
Multimodal Private Signatures
Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang
Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang
zkQMC: Zero-Knowledge Proofs For (Some) Probabilistic Computations Using Quasi-Randomness
Zachary DeStefano, Dani Barrack, Michael Dixon
Zachary DeStefano, Dani Barrack, Michael Dixon
A Forward-secure Efficient Two-factor Authentication Protocol
Steven J. Murdoch, Aydin Abadi
Steven J. Murdoch, Aydin Abadi
PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement
Boyapally Harishma, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay
Boyapally Harishma, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay
Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting
Nils Fleischhacker, Suparno Ghoshal, Mark Simkin
Nils Fleischhacker, Suparno Ghoshal, Mark Simkin
Orbis Specification Language: a type theory for zk-SNARK programming
Morgan Thomas
Morgan Thomas
Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps
Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov
Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov
Quantum Security of FOX Construction based on Lai-Massey Scheme
Amit Kumar Chauhan, Somitra Sanadhya
Amit Kumar Chauhan, Somitra Sanadhya
Statistical Decoding 2.0: Reducing Decoding to LPN
Kevin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
Kevin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
PipeMSM: Hardware Acceleration for Multi-Scalar Multiplication
Charles. F. Xavier
Charles. F. Xavier
On the Hardness of the Finite Field Isomorphism Problem
Dipayan Das, Antoine Joux
Dipayan Das, Antoine Joux
Key-Recovery Attacks on CRAFT and WARP (Full Version)
Ling Sun, Wei Wang, Meiqin Wang
Ling Sun, Wei Wang, Meiqin Wang
Fast Hashing to $\mathbb{G}_2$ on Pairing-friendly Curves with the Lack of Twists
Yu Dai, Fangguo Zhang, and Chang-An Zhao
Yu Dai, Fangguo Zhang, and Chang-An Zhao
Sequential Digital Signatures for Cryptographic Software-Update Authentication
Bertram Poettering, Simon Rastikian
Bertram Poettering, Simon Rastikian
Faster Sounder Succinct Arguments and IOPs
Justin Holmgren, Ron Rothblum
Justin Holmgren, Ron Rothblum
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao
Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao
An $\mathcal{O}(n)$ Algorithm for Coefficient Grouping
Fukang Liu
Fukang Liu
Coefficient Grouping: Breaking Chaghri and More
Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe
Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe
Efficient Computation of (2^n,2^n)-Isogenies
Sabrina Kunzweiler
Sabrina Kunzweiler
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen
Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen
Modeling and Simulating the Sample Complexity of solving LWE using BKW-Style Algorithms
Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
A Signature-Based Gröbner Basis Algorithm with Tail-Reduced Reductors (M5GB)
Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger
Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger
Quantum Attacks on Lai-Massey Structure
Shuping Mao, Tingting Guo, Peng Wang, Lei Hu
Shuping Mao, Tingting Guo, Peng Wang, Lei Hu
Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain
Roy Rinberg, Nilaksh Agarwal
Roy Rinberg, Nilaksh Agarwal
ToSHI - Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance
Nidish Vashistha, Md Latifur Rahman, Md Saad Ul Haque, Azim Uddin, Md Sami Ul Islam Sami, Amit Mazumder Shuo, Paul Calzada, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, Mark Tehranipoor
Nidish Vashistha, Md Latifur Rahman, Md Saad Ul Haque, Azim Uddin, Md Sami Ul Islam Sami, Amit Mazumder Shuo, Paul Calzada, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, Mark Tehranipoor
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
Qian Guo, Erik Mårtensson
Qian Guo, Erik Mårtensson
Random-Index Oblivious RAM
Shai Halevi, Eyal Kushilevitz
Shai Halevi, Eyal Kushilevitz
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval
Alex Davidson, Gonçalo Pestana, Sofía Celi
Alex Davidson, Gonçalo Pestana, Sofía Celi
Fast norm computation in smooth-degree Abelian number fields
Daniel J. Bernstein
Daniel J. Bernstein
Secure and Lightweight User Authentication Scheme for Cloud-Aided Internet of Things
Chenyu Wang, Ding Wang, Yihe Duan, Xiaofeng Tao
Chenyu Wang, Ding Wang, Yihe Duan, Xiaofeng Tao
Non-Malleable Multi-Party Computation
Fuchun Lin
Fuchun Lin
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting
Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
Paras - A Private NFT Protocol
Vanishree Rao
Vanishree Rao
An efficient key recovery attack on SIDH
Wouter Castryck, Thomas Decru
Wouter Castryck, Thomas Decru
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies
Amirreza Sarencheh, Aggelos Kiayias, and Markulf Kohlweiss
Amirreza Sarencheh, Aggelos Kiayias, and Markulf Kohlweiss
MR-DSS – Smaller MinRank-based (Ring-)Signatures
Emanuele Bellini, Andre Esser, Carlo Sanna, Javier Verbel
Emanuele Bellini, Andre Esser, Carlo Sanna, Javier Verbel
Keyed Streebog is a secure PRF and MAC
Vitaly Kiryukhin
Vitaly Kiryukhin
Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications
Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
Related-key attacks on the compression function of Streebog
Vitaly Kiryukhin
Vitaly Kiryukhin
Certified Everlasting Functional Encryption
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
Code Equivalence in the Sum-Rank Metric: Hardness and Completeness
Giuseppe D'Alconzo
Giuseppe D'Alconzo
On the Computational Hardness of the Code Equivalence Problem in Cryptography
Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
On Linear Complexity of Finite Sequences : Coding Theory and Applications to Cryptography
Edoardo Persichetti, Tovohery Randrianarisoa
Edoardo Persichetti, Tovohery Randrianarisoa
PROLEAD - A Probing-Based Hardware Leakage Detection Tool
Nicolai Müller, Amir Moradi
Nicolai Müller, Amir Moradi
Hybrid Decoding -- Classical-Quantum Trade-Offs for Information Set Decoding
Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José Ignacio Latorre, Marc Manzano
Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José Ignacio Latorre, Marc Manzano
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis
Sengim Karayalcin, Stjepan Picek
Sengim Karayalcin, Stjepan Picek
Group Signatures with Designated Traceability over Openers' Attributes
Hiroaki Anada, Masayuki Fukumitsu, and Shingo Hasegawa
Hiroaki Anada, Masayuki Fukumitsu, and Shingo Hasegawa
Secure and Efficient Implicit Certificates: Improving the Performance for Host Identity Protocol in IoT
Zhaokang Lu, Jianzhu Lu
Zhaokang Lu, Jianzhu Lu
Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners
Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon
Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon
MEGA: Malleable Encryption Goes Awry
Matilda Backendal, Miro Haller, Kenneth G. Paterson
Matilda Backendal, Miro Haller, Kenneth G. Paterson
Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol
Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos
Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos
Caulk+: Table-independent lookup arguments
Jim Posen, Assimakis A. Kattis
Jim Posen, Assimakis A. Kattis
Improved Plantard Arithmetic for Lattice-based Cryptography
Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, and Donglong Chen
Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, and Donglong Chen
A Small GIFT-COFB: Lightweight Bit-Serial Architectures
Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni
Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni
XOR Compositions of Physically Related Functions
Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay
Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay
Big Brother Is Watching You: A Closer Look At Backdoor Construction
Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi
Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
Michael Fahr Jr., Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon
Michael Fahr Jr., Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon
MixCT: Mixing Confidential Transactions from Homomorphic Commitment
Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu
Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu
Private Balance-Checking on Blockchain Accounts Using Private Integer Addition
Birenjith Sasidharan, Emanuele Viterbo
Birenjith Sasidharan, Emanuele Viterbo
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan
Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan
A quantum polynomial time search algorithm for certain unsorted finite lists
Stephane Lemieux
Stephane Lemieux
Volume and Access Pattern Leakage-abuse Attack with Leaked Documents
Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang
Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection
Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
Searchable Encryption with randomized ciphertext and randomized keyword search
Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
Two-Round MPC without Round Collapsing Revisited -- Towards Efficient Malicious Protocols
Huijia Lin, Tianren Liu
Huijia Lin, Tianren Liu
DiSSECT: Distinguisher of Standard & Simulated Elliptic Curves via Traits
Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys, Vashek Matyas
Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys, Vashek Matyas
Foundations of Coin Mixing Services
Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri AravindaKrishnan Thyagarajan
Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri AravindaKrishnan Thyagarajan
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable
Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri AravindaKrishnan Thyagarajan
Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri AravindaKrishnan Thyagarajan
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
Multi-party Private Function Evaluation for RAM
Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren
Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren
Truncated EdDSA/ECDSA Signatures
Thomas Pornin
Thomas Pornin
Post-quantum Plaintext-awareness
Ehsan Ebrahimi, Jeroen van Wier
Ehsan Ebrahimi, Jeroen van Wier
PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree Evaluation
Sofiane Azogagh, Victor Delfour, Sébastien Gambs, Marc-Olivier Killijian
Sofiane Azogagh, Victor Delfour, Sébastien Gambs, Marc-Olivier Killijian
SALSA: Attacking Lattice Cryptography with Transformers
Emily Wenger, Mingjie Chen, Francois Charton, Kristin Lauter
Emily Wenger, Mingjie Chen, Francois Charton, Kristin Lauter
On Secure Computation of Solitary Output Functionalities With and Without Broadcast
Bar Alon, Eran Omri
Bar Alon, Eran Omri
Secure Quantized Training for Deep Learning
Marcel Keller, Ke Sun
Marcel Keller, Ke Sun
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities
Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu
Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond
Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay
Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
PH = PSPACE
Valerii Sopin
Valerii Sopin
Universal Gaussian Elimination Hardware for Cryptographic Purposes
Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang
Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang
Fit The Joint Moments - How to Attack any Masking Schemes
Valence Cristiani, Maxime Lecomte, Thomas Hiscock, Philippe Maurine
Valence Cristiani, Maxime Lecomte, Thomas Hiscock, Philippe Maurine
Zero-Knowledge in EasyCrypt
Denis Firsov, Dominique Unruh
Denis Firsov, Dominique Unruh
Ad Hoc Broadcast, Trace, and Revoke --- Plus Time-Space Trade-Offs for Attribute-Based Encryption
Ji Luo
Ji Luo
FICS PCB X-ray: A dataset for automated printed circuit board inter-layers inspection
Dhwani Mehta, John True, Olivia P. Dizon-Paradis, Nathan Jessurun, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor
Dhwani Mehta, John True, Olivia P. Dizon-Paradis, Nathan Jessurun, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor
All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation
Mariana Botelho da Gama, John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
Mariana Botelho da Gama, John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm
Léo Ducas
Léo Ducas
Low-Delay 4, 5 and 6-Term Karatsuba Formulae in $\mathbb{F}_2[x]$ Using Overlap-free Splitting
Haining Fan
Haining Fan
Distributed, Private, Sparse Histograms in the Two-Server Model
James Bell, Adria Gascon, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann
James Bell, Adria Gascon, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann
Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking
Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud
Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds
Wonseok Choi, Jooyoung Lee, and Yeongmin Lee
Wonseok Choi, Jooyoung Lee, and Yeongmin Lee
Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience
Ashish Choudhury
Ashish Choudhury
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
OpenFHE: Open-Source Fully Homomorphic Encryption Library
Ahmad Al Badawi, Andreea Alexandru, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Carlo Pascoe, Yuriy Polyakov, Ian Quah, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, and Vincent Zucca
Ahmad Al Badawi, Andreea Alexandru, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Carlo Pascoe, Yuriy Polyakov, Ian Quah, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, and Vincent Zucca
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications
Keegan Ryan, Nadia Heninger
Keegan Ryan, Nadia Heninger
On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience
Ashish Choudhury, Arpita Patra
Ashish Choudhury, Arpita Patra
Individual Discrete Logarithm with Sublattice Reduction
Haetham AL ASWAD and Cécile PIERROT
Haetham AL ASWAD and Cécile PIERROT
Some Security Arguments For Xifrat1
Jianfang "Danny" Niu
Jianfang "Danny" Niu
Round Optimal Blind Signatures: Short Signatures with Post-Quantum Blindness
Shweta Agrawal, Jung Hee Cheon, Hyeongmin Choe, Damien Stehlé, Anshu Yadav
Shweta Agrawal, Jung Hee Cheon, Hyeongmin Choe, Damien Stehlé, Anshu Yadav
Multi-Instance Secure Public-Key Encryption
Carlo Brunetta, Hans Heum, Martijn Stam
Carlo Brunetta, Hans Heum, Martijn Stam
On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files.
Tymoteusz Chojecki, Vasyl Ustimenko
Tymoteusz Chojecki, Vasyl Ustimenko
A New Approach to Post-Quantum Non-Malleability
Xiao Liang, Omkant Pandey, and Takashi Yamakawa
Xiao Liang, Omkant Pandey, and Takashi Yamakawa
A Random Oracle for All of Us
Marc Fischlin, Felix Rohrbach, Tobias Schmalz
Marc Fischlin, Felix Rohrbach, Tobias Schmalz
Tight Security Analysis of the Public Permutation-Based PMAC_Plus
Avijit Dutta, Mridul Nandi, Suprita Talnikar
Avijit Dutta, Mridul Nandi, Suprita Talnikar
Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
Fabio Campos, Michael Meyer, Krijn Reijnders, and Marc Stöttinger
Fabio Campos, Michael Meyer, Krijn Reijnders, and Marc Stöttinger
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling
Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert
Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert
MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably
Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .
Itamar Levi, Carmit Hazay
Itamar Levi, Carmit Hazay
On the key generation in SQISign
Hiroshi Onuki
Hiroshi Onuki
Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization
Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi
Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi
Ferveo: Threshold Decryption for Mempool Privacy in BFT networks
Joseph Bebel, Dev Ojha
Joseph Bebel, Dev Ojha
Constrained Pseudorandom Functions from Pseudorandom Synthesizers
Zachary A Kissel
Zachary A Kissel
Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$
Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, and Delaram Kahrobaei
Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, and Delaram Kahrobaei
Security Analysis of RSA-BSSA
Anna Lysyanskaya
Anna Lysyanskaya
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases
Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia
Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia
NJS: Database Protection Algorithm
Edimar Veríssimo da Silva
Edimar Veríssimo da Silva
Piranha: A GPU Platform for Secure Computation
Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa
Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa
Secure Physical Design
Sukanta Dey, Jungmin Park, Nitin Pundir, Dipayan Saha, Amit Mazumder Shuvo, Dhwani Mehta, Navid Asadi, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Sukanta Dey, Jungmin Park, Nitin Pundir, Dipayan Saha, Amit Mazumder Shuvo, Dhwani Mehta, Navid Asadi, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
One Network to rule them all. An autoencoder approach to encode datasets
Cristian-Alexandru Botocan
Cristian-Alexandru Botocan
Quantum Rewinding for Many-Round Protocols
Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner
Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner
Tweakable Sleeve: A Novel Sleeve Construction based on Tweakable Hash Functions
David Chaum, Mario Larangeira, Mario Yaksetig
David Chaum, Mario Larangeira, Mario Yaksetig
Round-Optimal Black-Box Protocol Compilers
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Deep Learning based Cryptanalysis of Lightweight Block Ciphers, Revisited
Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions
Akshima, Siyao Guo, Qipeng Liu
Akshima, Siyao Guo, Qipeng Liu
On the Feasibility of Unclonable Encryption, and More
Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
Differentially Oblivious Turing Machines
Ilan Komargodski, Elaine Shi
Ilan Komargodski, Elaine Shi
Randomness Optimization for Gadget Compositions in Higher-Order Masking
Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator
Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang
Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang
Efficient supersingularity testing over $\mathbb{F}_p$ and CSIDH key validation
Gustavo Banegas, Valerie Gilchrist, Benjamin Smith
Gustavo Banegas, Valerie Gilchrist, Benjamin Smith
Modular Polynomial Multiplication Using RSA/ECC coprocessor
Aurélien Greuet, Simon Montoya, Clémence Vermeersch
Aurélien Greuet, Simon Montoya, Clémence Vermeersch
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
Michael Rosenberg, Jacob White, Christina Garman, Ian Miers
Michael Rosenberg, Jacob White, Christina Garman, Ian Miers
A New Approach to the Constant-Round Re-encryption Mix-Net
Myungsun Kim
Myungsun Kim
Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions
Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations
Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Lattice Codes for Lattice-Based PKE
Shanxiang Lyu, Ling Liu, Cong Ling, Junzuo Lai, and Hao Chen
Shanxiang Lyu, Ling Liu, Cong Ling, Junzuo Lai, and Hao Chen
\(\texttt{POLKA}\): Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption
Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert
Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert
Nirvana: Instant and Anonymous Payment-Guarantees
Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel
Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel
Secure Plot Transfer for the Chia Blockchain
Shashank Agrawal
Shashank Agrawal
Supersingular Isogeny Diffie-Hellman with Legendre Form
Jesse Elliott, Aaron Hutchinson
Jesse Elliott, Aaron Hutchinson
Post-Quantum Insecurity from LWE
Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs
Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions
Huimin Li, Nele Mentens, Stjepan Picek
Huimin Li, Nele Mentens, Stjepan Picek
The State of the Union: Union-Only Signatures for Data Aggregation
Diego F. Aranha, Felix Engelmann, Sebastian Kolby, and Sophia Yakoubov
Diego F. Aranha, Felix Engelmann, Sebastian Kolby, and Sophia Yakoubov
Communication-Efficient Secure Logistic Regression
Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, and Karn Seth
Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, and Karn Seth
Linked Fault Analysis
Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, and Hamed Ramzanipour
Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, and Hamed Ramzanipour
BalanceProofs: Maintainable Vector Commitments with Fast Aggregation
Weijie Wang, Annie Ulichney, Charalampos Papamanthou
Weijie Wang, Annie Ulichney, Charalampos Papamanthou
Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers
Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on FHE
Ilaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel Paul Smart, and Barry Van Leeuwen
Ilaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel Paul Smart, and Barry Van Leeuwen
Genus Distribution of Random q-ary Lattices
Peter J. Bruin, Léo Ducas, Shane Gibbons
Peter J. Bruin, Léo Ducas, Shane Gibbons
AB-SIFA: SIFA with Adjacent-Byte Model
Chunya Hu, Yongbo Hu, Wenfeng Zhu, Zixin Tan, Qi Zhang, Zichao Gong, Yanhao Gong, Luyao Jin, Pengwei Feng
Chunya Hu, Yongbo Hu, Wenfeng Zhu, Zixin Tan, Qi Zhang, Zichao Gong, Yanhao Gong, Luyao Jin, Pengwei Feng
Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM
Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts
Yang Du, Daniel Genkin, Paul Grubbs
Yang Du, Daniel Genkin, Paul Grubbs
Succinct Classical Verification of Quantum Computation
James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang
James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang
Mix-Nets from Re-Randomizable and Replayable CCA-secure Public-Key Encryption
Antonio Faonio, Luigi Russo
Antonio Faonio, Luigi Russo
Tightness Subtleties for Multi-user PKE Notions
Hans Heum and Martijn Stam
Hans Heum and Martijn Stam
On Access Control Encryption without Sanitization
Cecilia Boschini, Ivan Damgård, Claudio Orlandi
Cecilia Boschini, Ivan Damgård, Claudio Orlandi
Hashing to Prime in Zero-Knowledge
Thomas Groß
Thomas Groß
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations
Ruize Wang, Kalle Ngo, Elena Dubrova
Ruize Wang, Kalle Ngo, Elena Dubrova
NIWI and New Notions of Extraction for Algebraic Languages
Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella
Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella
Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication
Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
Formal Verification of Arithmetic Masking in Hardware and Software
Barbara Gigerl, Robert Primas, Stefan Mangard
Barbara Gigerl, Robert Primas, Stefan Mangard
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version)
Alexandros Bakas, Eugene Frimpong, Antonis Michalas
Alexandros Bakas, Eugene Frimpong, Antonis Michalas
A note on key control in CSIDH
Antonio Sanso
Antonio Sanso
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers
Benoît Cogliati, Jérémy Jean, Thomas Peyrin, and Yannick Seurin
Benoît Cogliati, Jérémy Jean, Thomas Peyrin, and Yannick Seurin
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256
Jian Guo, Ling Song, Haoyang Wang
Jian Guo, Ling Song, Haoyang Wang
Security Analysis of a Recent Pairing-based Certificateless Authenticated Key Agreement Protocol for Blockchain-based WBANs
Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, Son-Gyong Kim
Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, Son-Gyong Kim
Predicting BKZ Z-Shapes on q-ary Lattices
Martin R. Albrecht, Jianwei Li
Martin R. Albrecht, Jianwei Li
Nearly Optimal Property Preserving Hashing
Justin Holmgren, Minghao Liu, LaKyah Tyner, Daniel Wichs
Justin Holmgren, Minghao Liu, LaKyah Tyner, Daniel Wichs
Faster Yet Safer: Logging System Via Fixed-Key Blockcipher
Viet Tung Hoang, Cong Wu, Xin Yuan
Viet Tung Hoang, Cong Wu, Xin Yuan
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions:Anemoi Permutations and Jive Compression Mode
Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems
Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems
Threshold Structure-Preserving Signatures
Elizabeth Crites, Markulf Kohlweiss, Bart Preneel, Mahdi Sedaghat, and Daniel Slamanig
Elizabeth Crites, Markulf Kohlweiss, Bart Preneel, Mahdi Sedaghat, and Daniel Slamanig
An Efficient Query Recovery Attack Against a Graph Encryption Scheme
Francesca Falzon, Kenneth G. Paterson
Francesca Falzon, Kenneth G. Paterson
Differential Cryptanalysis in the Fixed-Key Model
Tim Beyne and Vincent Rijmen
Tim Beyne and Vincent Rijmen
Authenticated Garbling from Simple Correlations
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
Covert Authentication from Lattices
Rajendra Kumar, Khoa Nguyen
Rajendra Kumar, Khoa Nguyen
A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling
Rafael del Pino, Shuichi Katsumata
Rafael del Pino, Shuichi Katsumata
Stronger Security for Non-Interactive Threshold Signatures: BLS and FROST
Mihir Bellare, Stefano Tessaro, and Chenzhi Zhu
Mihir Bellare, Stefano Tessaro, and Chenzhi Zhu
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions
Jeremiah Blocki and Blake Holman
Jeremiah Blocki and Blake Holman
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing
Vipul Goyal, Antigoni Polychroniadou, Yifan Song
Vipul Goyal, Antigoni Polychroniadou, Yifan Song
Near-Optimal Private Information Retrieval with Preprocessing
Arthur Lazzaretti and Charalampos Papamanthou
Arthur Lazzaretti and Charalampos Papamanthou
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung
Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung
Lower Bounds for (Batch) PIR with Private Preprocessing
Kevin Yeo
Kevin Yeo
Privacy-Preserving IP Verification
Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
Pika: Secure Computation using Function Secret Sharing over Rings
Sameer Wagh
Sameer Wagh
Romeo: Conversion and Evaluation of HDL Designs in the Encrypted Domain
Charles Gouert, Nektarios Georgios Tsoutsos
Charles Gouert, Nektarios Georgios Tsoutsos
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
Round Efficient Byzantine Agreement from VDFs
Poulami Das, Lisa Eckey, Sebastian Faust, Julian Loss, and Monosij Maitra
Poulami Das, Lisa Eckey, Sebastian Faust, Julian Loss, and Monosij Maitra
Traceable Receipt-Free Encryption
Henri Devillez, Olivier Pereira, Thomas Peters
Henri Devillez, Olivier Pereira, Thomas Peters
MPC for Group Reconstruction Circuits
Lúcás Críostóir Meier
Lúcás Críostóir Meier
Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash
Susumu Kiyoshima
Susumu Kiyoshima
Moz$\mathbb{Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs Over $\mathbb{Z}_{2^k}$
Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl
Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl
Provably Secure Reflection Ciphers
Tim Beyne, Yu Long Chen
Tim Beyne, Yu Long Chen
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels
Jean Paul Degabriele, Vukašin Karadžić
Jean Paul Degabriele, Vukašin Karadžić
Securing Approximate Homomorphic Encryption Using Differential Privacy
Baiyu Li, Daniele Micciancio, Mark Schultz, Jessica Sorrell
Baiyu Li, Daniele Micciancio, Mark Schultz, Jessica Sorrell
More Efficient Dishonest Majority Secure Computation over $\mathbb{Z}_{2^k}$ via Galois Rings
Daniel Escudero, Chaoping Xing, Chen Yuan
Daniel Escudero, Chaoping Xing, Chen Yuan
Suborn Channels: Incentives Against Timelock Bribes
Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos
Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications
Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra
Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
EZEE: Epoch Parallel Zero Knowledge for ANSI C
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached RAM for ANSI C Programs
David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov
David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov
A 2.1 KHz Zero-Knowledge Processor with BubbleRAM
David Heath, Vladimir Kolesnikov
David Heath, Vladimir Kolesnikov
Secret key generation from Gaussian sources using lattice-based extractors
Laura Luzzi, Cong Ling, Matthieu R. Bloch
Laura Luzzi, Cong Ling, Matthieu R. Bloch
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations
Ruize Wang, Kalle Ngo, Elena Dubrova
Ruize Wang, Kalle Ngo, Elena Dubrova
Multi-key and Multi-input Predicate Encryption from Learning with Errors
Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi
Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi
Authenticated Consensus in Synchronous Systems with Mixed Faults
Ittai Abraham, Danny Dolev, Alon Kagan, Gilad Stern
Ittai Abraham, Danny Dolev, Alon Kagan, Gilad Stern
Review of the White-Box Encodability of NIST Lightweight Finalists
Alex Charlès, Chloé Gravouil
Alex Charlès, Chloé Gravouil
How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs
Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz
Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz
VERI-ZEXE: Decentralized Private Computation with Universal Setup
Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic
Hadi Mardani Kamali
Hadi Mardani Kamali
BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators
Sameer Wagh
Sameer Wagh
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation
Vipul Goyal, Yuval Ishai, Yifan Song
Vipul Goyal, Yuval Ishai, Yifan Song
One Hot Garbling
David Heath, Vladimir Kolesnikov
David Heath, Vladimir Kolesnikov
Garbled Circuits With Sublinear Evaluator
Abida Haque, David Heath, Vladimir Kolesnikov, Steve Lu, Rafail Ostrovsky, Akash Shah
Abida Haque, David Heath, Vladimir Kolesnikov, Steve Lu, Rafail Ostrovsky, Akash Shah
Safe Permissionless Consensus
Youer Pu, Lorenzo Alvisi, Ittay Eyal
Youer Pu, Lorenzo Alvisi, Ittay Eyal
Efficient Generic Arithmetic for KKW Practical Linear: MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup
David Heath, Vladimir Kolesnikov, Jiahui Lu
David Heath, Vladimir Kolesnikov, Jiahui Lu
Generation of "independent" points on elliptic curves by means of Mordell--Weil lattices
Dmitrii Koshelev
Dmitrii Koshelev
LLAMA: A Low Latency Math Library for Secure Inference
Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta
Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta
Reliable Password Hardening Service with Opt-Out
Chunfu Jia, Shaoqiang Wu, Ding Wang
Chunfu Jia, Shaoqiang Wu, Ding Wang
log*-Round Game-Theoretically-Fair Leader Election
Ilan Komargodski, Shin’ichiro Matsuo, Elaine Shi, and Ke Wu
Ilan Komargodski, Shin’ichiro Matsuo, Elaine Shi, and Ke Wu
A Toolbox for Barriers on Interactive Oracle Proofs
Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev
Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256
Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang
Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang
Improved Preimage Attacks on Round-Reduced Keccak-384/512
Le He, Xiaoen Lin, Hongbo Yu, Jian Guo
Le He, Xiaoen Lin, Hongbo Yu, Jian Guo
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain
Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohmmad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla
Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohmmad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla
On the Necessity of Collapsing for Post-Quantum and Quantum Commitments
Marcel Dall'Agnol, Nicholas Spooner
Marcel Dall'Agnol, Nicholas Spooner
Shorter Hash-and-Sign Lattice-Based Signatures
Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation
Jiaxiang Tang, Jinbao Zhu, Songze Li, Kai Zhang, Lichao Sun
Jiaxiang Tang, Jinbao Zhu, Songze Li, Kai Zhang, Lichao Sun
Augmented Random Oracles
Mark Zhandry
Mark Zhandry
Simon’s Algorithm and Symmetric Crypto: Generalizations and Automatized Applications
Federico Canale, Gregor Leander, Lukas Stennes
Federico Canale, Gregor Leander, Lukas Stennes
Linear Communication in Malicious Majority MPC
S. Dov Gordon, Phi Hung Le, Daniel McVicker
S. Dov Gordon, Phi Hung Le, Daniel McVicker
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux
Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption -- Stronger Security and Smaller Ciphertexts
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost
Mikhail Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev
Mikhail Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev
Arithmetization of Σ¹₁ relations in Halo 2
Morgan Thomas
Morgan Thomas
Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation
Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
Asynchronous Verifiable Information Dispersal with Near-Optimal Communication
Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
Complexity Analysis of the SAT Attack on Logic Locking
Yadi Zhong, Ujjwal Guin
Yadi Zhong, Ujjwal Guin
Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF
Jelle Don, Serge Fehr, Yu-Hsuan Huang
Jelle Don, Serge Fehr, Yu-Hsuan Huang
Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation
Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
Field Instruction Multiple Data
Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo
Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo
Password-Authenticated Key Exchange from Group Actions
Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel
Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel
Faster Beta Weil Pairing on BLS Pairing Friendly Curves with Odd Embedding Degree
Azebaze Guimagang Laurian, Fouotsa Emmanuel, El Mrabet Nadia, Pecha Njiahouo Aminatou
Azebaze Guimagang Laurian, Fouotsa Emmanuel, El Mrabet Nadia, Pecha Njiahouo Aminatou
Public-Key Watermarking Schemes for Pseudorandom Functions
Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
A New Approach to Efficient Non-Malleable Zero-Knowledge
Allen Kim, Xiao Liang, Omkant Pandey
Allen Kim, Xiao Liang, Omkant Pandey
The Cost of Statistical Security in Interactive Proofs for Repeated Squaring
Cody Freitag, Ilan Komargodski
Cody Freitag, Ilan Komargodski
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks
Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li
Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li
Efficient Proofs of Retrievability using Expander Codes
Françoise Levy-dit-Vehel, Maxime Roméas
Françoise Levy-dit-Vehel, Maxime Roméas
SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners
Dominic Deuber, Viktoria Ronge, Christian Rückert
Dominic Deuber, Viktoria Ronge, Christian Rückert
The Price of Verifiability: Lower Bounds for Verifiable Random Functions
Nicholas Brandt, Dennis Hofheinz, Julia Kastner, Akin Ünal
Nicholas Brandt, Dennis Hofheinz, Julia Kastner, Akin Ünal
Quantum Procedures for Nested Search Problems with Applications in Cryptanalysis
André Schrottenloher and Marc Stevens
André Schrottenloher and Marc Stevens
Privacy Preserving Opinion Aggregation
Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos
Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos
SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves
Jorge Chávez-Saab, Francisco Rodrı́guez-Henrı́quez, and Mehdi Tibouchi
Jorge Chávez-Saab, Francisco Rodrı́guez-Henrı́quez, and Mehdi Tibouchi
Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW
Gilad Asharov, Ran Cohen, and Oren Shochat
Gilad Asharov, Ran Cohen, and Oren Shochat
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering
Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira
Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira
Curve Trees: Practical and Transparent Zero-Knowledge Accumulators
Matteo Campanelli, Mathias Hall-Andersen, and Simon Holmgaard Kamp
Matteo Campanelli, Mathias Hall-Andersen, and Simon Holmgaard Kamp
Low-latency Hardware Architecture for VDF Evaluation in Class Groups
Danyang Zhu, Jing Tian, Minghao Li, Zhongfeng Wang
Danyang Zhu, Jing Tian, Minghao Li, Zhongfeng Wang
Quantum impossible differential attacks: Applications to AES and SKINNY
Nicolas David, María Naya-Plasencia, André Schrottenloher
Nicolas David, María Naya-Plasencia, André Schrottenloher
Fast MILP Models for Division Property
Patrick Derbez, Baptiste Lambin
Patrick Derbez, Baptiste Lambin
Provably Minimum Data Complexity Integral Distinguisher Based on Conventional Division Property
Akram Khalesi and Zahra Ahmadian
Akram Khalesi and Zahra Ahmadian
SCALES: MPC with Small Clients and Larger Ephemeral Servers
Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
The Ideal Functionalities for Private Set Union, Revisited
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
Cryptanalysis of Draco
Subhadeep Banik
Subhadeep Banik
2DT-GLS: Faster and exception-free scalar multiplication in the GLS254 binary curve
Marius A. Aardal, Diego F. Aranha
Marius A. Aardal, Diego F. Aranha
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs
Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang
Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang
Efficient Proofs of Knowledge for Threshold Relations
Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti
Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti
Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE
Hosein Hadipour, Marcel Nageler, and Maria Eichlseder
Hosein Hadipour, Marcel Nageler, and Maria Eichlseder
MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero
Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin
Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis
David Mestel, Johannes Mueller, Pascal Reisert
David Mestel, Johannes Mueller, Pascal Reisert
Application of Automorphic Forms to Lattice Problems
Samed Düzlü, Juliane Krämer
Samed Düzlü, Juliane Krämer
Sapic+: protocol verifiers of the world, unite!
Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann
Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann
Practical Privacy-Preserving Authentication for SSH
Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek
Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek
Updatable Encryption from Group Actions
Antonin Leroux and Maxime Roméas
Antonin Leroux and Maxime Roméas
Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields
Buvana Ganesh, Paolo Palmieri
Buvana Ganesh, Paolo Palmieri
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results
Prasanna Ravi, Anupam Chattopadhyay, Jan Pieter D'Anvers, Anubhab Baksi
Prasanna Ravi, Anupam Chattopadhyay, Jan Pieter D'Anvers, Anubhab Baksi
Mathematical Aspects of Division Property
Phil Hebborn, Gregor Leander, Aleksei Udovenko
Phil Hebborn, Gregor Leander, Aleksei Udovenko
Multiparty Private Set Intersection Cardinality and Its Applications
Jiahui Gao, Ni Trieu, and Avishay Yanai
Jiahui Gao, Ni Trieu, and Avishay Yanai
Tight Preimage Resistance of the Sponge Construction
Charlotte Lefevre, Bart Mennink
Charlotte Lefevre, Bart Mennink
Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications’ cryptographic backbone
Vincent Ulitzsch and Jean-Pierre Seifert
Vincent Ulitzsch and Jean-Pierre Seifert
Structure-Preserving Compilers from New Notions of Obfuscations
Matteo Campanelli, Danilo Francati, Claudio Orlandi
Matteo Campanelli, Danilo Francati, Claudio Orlandi
Triangulating Rebound Attack on AES-like Hashing
Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks
Ittai Abraham, Gilad Stern
Ittai Abraham, Gilad Stern
Integral Cryptanalysis of WARP based on Monomial Prediction
Hosein Hadipour and Maria Eichlseder
Hosein Hadipour and Maria Eichlseder
Snowball: Another View on Side-Channel Key Recovery Tools
Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam
Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam
A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus
Parker Newton and Silas Richelson
Parker Newton and Silas Richelson
Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography
Chenar Abdulla Hassan, Oğuz Yayla
Chenar Abdulla Hassan, Oğuz Yayla
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool
Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen
Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem
Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl
Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery
Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng
Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng
Speedy Error Reconciliation
Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie
Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs
Jelle Vos, Mauro Conti, Zekeriya Erkin
Jelle Vos, Mauro Conti, Zekeriya Erkin
A Model Set Method to Search Integral Distinguishers Based on Division Property for Block Ciphers
Liu Zhang, Huawei Liu, Zilong Wang
Liu Zhang, Huawei Liu, Zilong Wang
Contingent payments from two-party signing and verification for abelian groups
Sergiu Bursuc, Sjouke Mauw
Sergiu Bursuc, Sjouke Mauw
A Post-Quantum Four-Party Outsourced Authentication
Reza Ghasemi, Alptekin Küpçü
Reza Ghasemi, Alptekin Küpçü
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments
Yacov Manevich, Adi Akavia
Yacov Manevich, Adi Akavia
x-Superoptimal Pairings on some Elliptic Curves with Odd Prime Embedding Degrees
Emmanuel Fouotsa, Azebaze Guimagang Laurian, Ayissi Raoul
Emmanuel Fouotsa, Azebaze Guimagang Laurian, Ayissi Raoul
Ultimate SLH: Taking Speculative Load Hardening to the Next Level
Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
MicroSecAgg: Streamlined Single-Server Secure Aggregation
Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, and Tucker Balch
Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, and Tucker Balch
More Efficient (Reusable) Private Set Union
Dov Gordon, Carmit Hazay, Phi Hung Le, and Mingyu Liang
Dov Gordon, Carmit Hazay, Phi Hung Le, and Mingyu Liang
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
Hanlin Liu, Xiao Wang, Kang Yang, and Yu Yu
Hanlin Liu, Xiao Wang, Kang Yang, and Yu Yu
Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement
Ittai Abraham, Naama Ben-David, Sravya Yandamuri
Ittai Abraham, Naama Ben-David, Sravya Yandamuri
Advanced Signature Functionalities from the Code Equivalence Problem
Alessandro Barenghi, Jean-Francois Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini
Alessandro Barenghi, Jean-Francois Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini
Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem
Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary
Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary
An Estimator for the Hardness of the MQ Problem
Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier Verbel
Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier Verbel
Efficiently Masking Polynomial Inversion at Arbitrary Order
Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
Finding and Evaluating Parameters for BGV
Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj
Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj
Linear-map Vector Commitments and their Practical Applications
Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico
Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico
Parameter Optimization & Larger Precision for (T)FHE
Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
Proof-of-possession for KEM certificates using verifiable generation
Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
Kevlar: Transparent, Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs on Efficient Groups
Frank Y.C. Lu
Frank Y.C. Lu
Truncated Boomerang Attacks and Application to AES-based Ciphers
Augustin Bariant, Gaëtan Leurent
Augustin Bariant, Gaëtan Leurent
Grief-free Atomic Swaps
Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer
Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer
On the Quantum Security of OCB
Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman
Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman
State Machine Replication under Changing Network Conditions
Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss
Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss
Rate-1 Incompressible Encryption from Standard Assumptions
Pedro Branco, Nico Döttling, Jesko Dujmovic
Pedro Branco, Nico Döttling, Jesko Dujmovic
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups
Dario Catalano, Dario Fiore, Rosario Gennaro, and Emanuele Giunta
Dario Catalano, Dario Fiore, Rosario Gennaro, and Emanuele Giunta
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES
Marek Bielik, Martin Jureček, Olha Jurečková, Róbert Lórencz
Marek Bielik, Martin Jureček, Olha Jurečková, Róbert Lórencz
Squirrel: Efficient Synchronized Multi-Signatures from Lattices
Nils Fleischhacker, Mark Simkin, Zhenfei Zhang
Nils Fleischhacker, Mark Simkin, Zhenfei Zhang
Unified View for Notions of Bit Security
Shun Watanabe and Kenji Yasunaga
Shun Watanabe and Kenji Yasunaga
LIKE – Lattice Isomorphism-based Non-Interactive Key Exchange via Group Actions
Alessandro Budroni, Jesús-Javier Chi-Domínguez, Mukul Kulkarni
Alessandro Budroni, Jesús-Javier Chi-Domínguez, Mukul Kulkarni
QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore
Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
Authentication in the Bounded Storage Model
Yevgeniy Dodis, Willy Quach, Daniel Wichs
Yevgeniy Dodis, Willy Quach, Daniel Wichs
Tight Multi-User Security Bound of $\textsf{DbHtS}$
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar
Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets
Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay
Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay
Adaptively Secure Single Secret Leader Election from DDH
Dario Catalano, Dario Fiore, Emanuele Giunta
Dario Catalano, Dario Fiore, Emanuele Giunta
Proof of Mirror Theory for a Wide Range of $\xi_{\max}$
Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha
Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
RSK: A Bitcoin sidechain with stateful smart-contracts
Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini
Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini
Quantum Analysis of AES
Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, and Anupam Chattopadhyay
Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, and Anupam Chattopadhyay
Secure Federated Clustering
Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr
Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs
Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures
Omid Mir, Daniel Slamanig, Balthazar Bauer, and René Mayrhofer
Omid Mir, Daniel Slamanig, Balthazar Bauer, and René Mayrhofer
Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems
Katharina Boudgoust, Amin Sakzad, Ron Steinfeld
Katharina Boudgoust, Amin Sakzad, Ron Steinfeld
New Constructions of Collapsing Hashes
Mark Zhandry
Mark Zhandry
A Conjecture on Hermite Constants
Leon Mächler, David Naccache
Leon Mächler, David Naccache
Finding many Collisions via Reusable Quantum Walks
Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen
Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen
MPClan: Protocol Suite for Privacy-Conscious Computations
Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
A Note on Key Ranking for Optimal Collision Side-Channel Attacks
Cezary Glowacz
Cezary Glowacz
Meet-in-the-Filter and Dynamic Counting with Applications to Speck
Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas
Tassos Dimitriou and Khazam Alhamdan
Tassos Dimitriou and Khazam Alhamdan
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions
Shujiao Cao, Rui Xue
Shujiao Cao, Rui Xue
Practical UC-Secure Zero-Knowledge Smart Contracts
Jayamine Alupotha, Xavier Boyen
Jayamine Alupotha, Xavier Boyen
On those Boolean functions that are coset leaders of first order Reed-Muller codes
Claude Carlet, Serge Feukoua
Claude Carlet, Serge Feukoua
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security
Yaobin Shen, Ferdinand Sibleyras
Yaobin Shen, Ferdinand Sibleyras
Arithmetic Tuples for MPC
Pascal Reisert, Marc Rivinius, Toomas Krips, and Ralf Küsters
Pascal Reisert, Marc Rivinius, Toomas Krips, and Ralf Küsters
Deciding and reconstructing linear equivalence of uniformly distributed functions
Ivana Ivkovic, Nikolay Kaleyski
Ivana Ivkovic, Nikolay Kaleyski
NOVA, a Noncommutative-ring Based Unbalanced Oil and Vinegar Signature Scheme with Key-randomness Alignment
Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
The $c-$differential uniformity and boomerang uniformity of three classes of permutation polynomials over $\mathbb{F}_{2^n}$
Qian Liu, Zhiwei Huang, Jianrui Xie, Ximeng Liu, Jian Zou
Qian Liu, Zhiwei Huang, Jianrui Xie, Ximeng Liu, Jian Zou
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning
Harsh Chaudhari, Matthew Jagielski, Alina Oprea
Harsh Chaudhari, Matthew Jagielski, Alina Oprea
SHORTSTACK : Distributed, Fault-tolerant, Oblivious Data Access
Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal
Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric
Aisling Connolly, Jerome Deschamps, Pascal Lafourcade, Octavio Perez Kempner
Aisling Connolly, Jerome Deschamps, Pascal Lafourcade, Octavio Perez Kempner
Secure Sampling with Sublinear Communication
Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security
Hanjun Li, Huijia Lin, Ji Luo
Hanjun Li, Huijia Lin, Ji Luo
Unclonable Polymers and Their Cryptographic Applications
Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe’er, Anna Roitburd-Berman, Eran Tromer
Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe’er, Anna Roitburd-Berman, Eran Tromer
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, and David W. Archer
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, and David W. Archer
Quantum Augmented Dual Attack
Martin R. Albrecht, Yixin Shen
Martin R. Albrecht, Yixin Shen
Bit Security as Cost to Demonstrate Advantage
Keewoo Lee
Keewoo Lee
Torsion point attacks on ``SIDH-like'' cryptosystems
Péter Kutas, Christophe Petit
Péter Kutas, Christophe Petit
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption
Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
Private Set Operations from Multi-Query Reverse Private Membership Test
Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, and Weiran Liu
Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, and Weiran Liu
Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
Supersingular Non-Superspecial Abelian Surfaces in Cryptography
Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig
Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig
IBE with Incompressible Master Secret and Small Identity Secrets
Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang
Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions
Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
Quantum Implementation and Analysis of DEFAULT
Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay
Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay
Faster Non-interactive Verifiable Computing
Pascal Lafourcade, Gael Marcadet, Léo Robert
Pascal Lafourcade, Gael Marcadet, Léo Robert
Round-Optimal Multi-Party Computation with Identifiable Abort
Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner
Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner
DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium
Peeter Laud, Nikita Snetkov, and Jelizaveta Vakarjuk
Peeter Laud, Nikita Snetkov, and Jelizaveta Vakarjuk
Accelerating the Best Trail Search on AES-Like Ciphers
Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
Statistical Effective Fault Attacks: The other Side of the Coin
Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany
Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany
Self-Timed Masking: Implementing Masked S-Boxes Without Registers
Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno
Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno
Dialektos: Privacy-preserving Smart Contracts
Tadas Vaitiekūnas
Tadas Vaitiekūnas
Anamorphic Encryption: Private Communication against a Dictator
Giuseppe Persiano, Duong Hieu Phan, Moti Yung
Giuseppe Persiano, Duong Hieu Phan, Moti Yung
Impossibilities in Succinct Arguments: Black-box Extraction and More
Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, and Janno Siim
Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, and Janno Siim
Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE
Lisha Yao, Jian Weng, Pengfei Wu, Xiaoguo Li, Yi Liu, Junzuo Lai, Guomin Yang, and Robert H. Deng
Lisha Yao, Jian Weng, Pengfei Wu, Xiaoguo Li, Yi Liu, Junzuo Lai, Guomin Yang, and Robert H. Deng
Integer Syndrome Decoding in the Presence of Noise
Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
Post-Quantum Secure Boot on Vehicle Network Processors
Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Daan Sprenkels, Geoffrey P. Waters
Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Daan Sprenkels, Geoffrey P. Waters
Round-Optimal Lattice-Based Threshold Signatures, Revisited
Shweta Agrawal, Damien Stehle, Anshu Yadav
Shweta Agrawal, Damien Stehle, Anshu Yadav
CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes
Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao
Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao
Recovering Rainbow's Secret Key with a First-Order Fault Attack
Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui
Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui
Watermarking PRFs against Quantum Adversaries
Fuyuki Kitagawa and Ryo Nishimaki
Fuyuki Kitagawa and Ryo Nishimaki
Enforcing fine-grained constant-time policies
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?
Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad
Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad
High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU
Elizabeth Carter, Pengzhou He, Jiafeng Xie
Elizabeth Carter, Pengzhou He, Jiafeng Xie
Secure Hierarchical Deterministic Wallet Supporting Stealth Address
Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
New method for combining Matsui’s bounding conditions with sequential encoding method
Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
Dashing and Star: Byzantine Fault Tolerance with Weak Certificates
Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, and Xiaoyun Wang
Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, and Xiaoyun Wang
Cryptanalysis of Three Quantum Money Schemes
Andriyan Bilyk, Javad Doliskani, Zhiyong Gong
Andriyan Bilyk, Javad Doliskani, Zhiyong Gong
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority
Anders Dalskov, Daniel Escudero, Ariel Nof
Anders Dalskov, Daniel Escudero, Ariel Nof
Efficient and Accurate homomorphic comparisons
Olive Chakraborty, Martin Zuber
Olive Chakraborty, Martin Zuber
Caulk: Lookup Arguments in Sublinear Time
Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits
Zhenyu Huang, Siwei Sun
Zhenyu Huang, Siwei Sun
Breaking the $t< n/3$ Consensus Bound: Asynchronous Dynamic Proactive Secret Sharing under Honest Majority
Christophe Levrat, Matthieu Rambaud, Antoine Urban
Christophe Levrat, Matthieu Rambaud, Antoine Urban
A simple proof of ARX completeness
Adriano Koleci
Adriano Koleci
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model
Shingo Sato, Junji Shikata
Shingo Sato, Junji Shikata
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles
Ren Ishibashi, Kazuki Yoneyama
Ren Ishibashi, Kazuki Yoneyama
Smoothing Codes and Lattices: Systematic Study and New Bounds
Thomas Debris, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich
Thomas Debris, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich
PPRKS: A Privacy Preserving Range Keyword Search Scheme
Yu Zhang, Zongbin Wang, Tihong Qin
Yu Zhang, Zongbin Wang, Tihong Qin
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs
Marloes Venema, Greg Alpár
Marloes Venema, Greg Alpár
Cryptanalysis of Reduced Round SPEEDY
Raghvendra Rohit, Santanu Sarkar
Raghvendra Rohit, Santanu Sarkar
Further Cryptanalysis of a Type of RSA Variants
Gongyu Shi, Geng Wang, Dawu Gu
Gongyu Shi, Geng Wang, Dawu Gu
On the Differential Spectrum of a Differentially $3$-Uniform Power Function
Tingting Pang, Nian Li, Xiangyong Zeng
Tingting Pang, Nian Li, Xiangyong Zeng
Optimal Single-Server Private Information Retrieval
Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi
Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi
Practical Provably Secure Flooding for Blockchains
Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen
Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version)
Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan
Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability
Li Duan, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp
Li Duan, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp
Weighted Attribute-Based Encryption with Parallelized Decryption
Alexandru Ionita
Alexandru Ionita
Algorithm Substitution Attacks against Receivers
Marcel Armour, Bertram Poettering
Marcel Armour, Bertram Poettering
Distributed Blockchain Price Oracle
Léonard Lys, Maria Potop-Butucaru
Léonard Lys, Maria Potop-Butucaru
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing
Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
A Better Method to Analyze Blockchain Consistency
Lucianna Kiffer, Rajmohan Rajaraman, abhi shelat
Lucianna Kiffer, Rajmohan Rajaraman, abhi shelat
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations
Loïc Masure, Olivier Rioul, François-Xavier Standaert
Loïc Masure, Olivier Rioul, François-Xavier Standaert
TenderTee: Secure Tendermint
Lionel Beltrando, Maria Potop-Butucaru, Jose Alfaro
Lionel Beltrando, Maria Potop-Butucaru, Jose Alfaro
Verifiable and forward private conjunctive keyword search from DIA tree
Laltu Sardar, Sushmita Ruj
Laltu Sardar, Sushmita Ruj
Foundations of Dynamic BFT
Sisi Duan, Haibin Zhang
Sisi Duan, Haibin Zhang
Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity
Liam Eagen
Liam Eagen
On the Cryptographic Fragility of the Telegram Ecosystem
Theo von Arx, Kenneth G. Paterson
Theo von Arx, Kenneth G. Paterson
A CONCRETE approach to torus fully homomorphic encryption
Maria Ferrara, Antonio Tortora
Maria Ferrara, Antonio Tortora
On the Security Proof of CKO+21 Secret Sharing Scheme
Yupu Hu, Shanshan Zhang, Baocang Wang, Siyue Dong
Yupu Hu, Shanshan Zhang, Baocang Wang, Siyue Dong
Chaghri --- an FHE-friendly Block Cipher
Tomer Ashur, Mohammad Mahzoun, and Dilara Toprakhisar
Tomer Ashur, Mohammad Mahzoun, and Dilara Toprakhisar
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography
Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama
Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama
Secure Merge in Linear Time and O(log log N) Rounds
Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, and Rafail Ostrovsky
Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, and Rafail Ostrovsky
Unnecessary Input Heuristics & PayJoin Transactions
Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter and
Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter and
Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures
Daniel Kales, Greg Zaverucha
Daniel Kales, Greg Zaverucha
Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings
Eduardo Soria-Vazquez
Eduardo Soria-Vazquez
A survey of elliptic curves for proof systems
Diego F. Aranha, Youssef El Housni, Aurore Guillevic
Diego F. Aranha, Youssef El Housni, Aurore Guillevic
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
Yi Liu, Qi Wang, Siu-Ming Yiu
Yi Liu, Qi Wang, Siu-Ming Yiu
Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
Lior Rotem
Lior Rotem
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff
Lior Rotem, Gil Segev
Lior Rotem, Gil Segev
Ponyta: Foundations of Side-Contract-Resilient Fair Exchange
Hao Chung, Elisaweta Masserova, Elaine Shi, and Sri AravindaKrishnan Thyagarajan
Hao Chung, Elisaweta Masserova, Elaine Shi, and Sri AravindaKrishnan Thyagarajan
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage
Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian
Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian
How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing
Samuel Sousa, Roman Kern
Samuel Sousa, Roman Kern
Compact and Efficient KEMs over NTRU Lattices
Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao
Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
Construction of generalized-involutory MDS matrices
Xuting Zhou, Tianshuo Cong
Xuting Zhou, Tianshuo Cong
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage
Akira Ito, Rei Ueno, Naofumi Homma
Akira Ito, Rei Ueno, Naofumi Homma
Optimizing Homomorphic Encryption Parameters for Arbitrary Applications
Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos
Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos
Comparison-Based MPC in Star Topology (Full Version)
Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
Finding One Common Item, Privately
Tyler Beauregard, Janabel Xia, Mike Rosulek
Tyler Beauregard, Janabel Xia, Mike Rosulek
Homomorphically counting elements with the same property
Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
Entropically secure cipher for messages generated by Markov chains with unknown statistics
Boris Ryabko
Boris Ryabko
Secure and Private Source Coding with Private Key and Decoder Side Information
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
Marloes Venema, Greg Alpár
Marloes Venema, Greg Alpár
Improved MITM Cryptanalysis on Streebog
Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher
Michele Fabbrini
Michele Fabbrini
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
Power Contracts: Provably Complete Power Leakage Models for Processors
Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, and Robert Primas
Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, and Robert Primas
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization
Christopher van der Beets, Raine Nieminen, Thomas Schneider
Christopher van der Beets, Raine Nieminen, Thomas Schneider
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
Orientations and cycles in supersingular isogeny graphs
Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine Stange, Ha T. N. Tran
Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine Stange, Ha T. N. Tran
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes
Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim
Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim
Distributed Shuffling in Adversarial Environments
Kasper Green Larsen, Maciej Obremski, Mark Simkin
Kasper Green Larsen, Maciej Obremski, Mark Simkin
DeCAF: Decentralizable Continuous Group Key Agreement with Fast Healing
Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, and Krzysztof Pietrzak
Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, and Krzysztof Pietrzak
On Seedless PRNGs and Premature Next
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro
Honest Majority Multi-Prover Interactive Arguments
Alexander R. Block, Christina Garman
Alexander R. Block, Christina Garman
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
Adapting Belief Propagation to Counter Shuffling of NTTs
Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication
Sisi Duan, Haibin Zhang
Sisi Duan, Haibin Zhang
Secure Storage with Deduplication
John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla
John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
Marlin: Two-Phase BFT with Linearity
Xiao Sui, Sisi Duan, Haibin Zhang
Xiao Sui, Sisi Duan, Haibin Zhang
ROAST: Robust Asynchronous Schnorr Threshold Signatures
Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder
Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder
Smart Contracts Obfuscation from Blockchain-based One-time Program
Sora Suegami
Sora Suegami
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
Yuyu Wang, Jiaxin Pan
Yuyu Wang, Jiaxin Pan
Fast signing method in RSA with high speed verification
GyuChol. Kim, YongBok. Jong
GyuChol. Kim, YongBok. Jong
He-HTLC: Revisiting Incentives in HTLC
Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak
Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak
Logic Locking - Connecting Theory and Practice
Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence Pileggi, Vipul Goyal, Bryan Parno
Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence Pileggi, Vipul Goyal, Bryan Parno
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting
Donghoon Chang, Deukjo Hong, Jinkeon Kang
Donghoon Chang, Deukjo Hong, Jinkeon Kang
Aura: private voting with reduced trust on tallying authorities
Aram Jivanyan and Aaron Feickert
Aram Jivanyan and Aaron Feickert
On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles
Mathias Hall-Andersen, Jesper Buus Nielsen
Mathias Hall-Andersen, Jesper Buus Nielsen
The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols
Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell
Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell
On the revision of NIST 800-22 Test Suites
Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello
Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello
Post Quantum Noise
Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, and Fiona Johanna Weber
Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, and Fiona Johanna Weber
Post-Quantum Signatures on RISC-V with Hardware Acceleration
Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl
Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version)
Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee, Mincheol Son
Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee, Mincheol Son
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma
Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round
Damiano Abram, Peter Scholl, Sophia Yakoubov
Damiano Abram, Peter Scholl, Sophia Yakoubov
On the Adaptive Security of the Threshold BLS Signature Scheme
Renas Bacho and Julian Loss
Renas Bacho and Julian Loss
Băhēm: A Symmetric Cipher with Provable 128-bit Security
M. Rajululkahf
M. Rajululkahf
Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption
Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, and Jong-Seon No
Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, and Jong-Seon No
Jammin' on the deck
Norica Băcuieți, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
Norica Băcuieți, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
Laconic Private Set-Intersection From Pairings
Diego Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin
Diego Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin
On Random Sampling of Supersingular Elliptic Curves
Marzio Mula, Nadir Murru, Federico Pintore
Marzio Mula, Nadir Murru, Federico Pintore
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms
Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
Optimal Tightness for Chain-Based Unique Signatures
Fuchun Guo, Willy Susilo
Fuchun Guo, Willy Susilo
Breaking Goppa-Based McEliece with Hints
Elena Kirshanova, Alexander May
Elena Kirshanova, Alexander May
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings
Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder
Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder
A side-channel based disassembler for the ARM-Cortex M0
Jurian van Geest, Ileana Buhan
Jurian van Geest, Ileana Buhan
The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem
George Teseleanu
George Teseleanu
On The Distributed Discrete Logarithm Problem with Preprocessing
Pavel Hubáček, Ľubica Jančová, Veronika Králová
Pavel Hubáček, Ľubica Jančová, Veronika Králová
Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest
Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roychowdhury
Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roychowdhury
Failing to hash into supersingular isogeny graphs
Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig
Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig
Local permutation polynomials and the action of e-Klenian groups
Jaime Gutierrez, Jorge Jimenez Urroz
Jaime Gutierrez, Jorge Jimenez Urroz
zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge
Dimitris Mouris, Charles Gouert, and Nektarios Georgios Tsoutsos
Dimitris Mouris, Charles Gouert, and Nektarios Georgios Tsoutsos
MOSFHET: Optimized Software for FHE over the Torus
Antonio Guimarães, Edson Borin, and Diego F. Aranha
Antonio Guimarães, Edson Borin, and Diego F. Aranha
A Key-Recovery Side-Channel Attack on Classic McEliece
Qian Guo, Andreas Johansson, Thomas Johansson
Qian Guo, Andreas Johansson, Thomas Johansson
Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks (CASCADA)
Adrián Ranea, Vincent Rijmen
Adrián Ranea, Vincent Rijmen
A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis
Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels
Mo Zhang, Eduard Marin, David Oswald, Vassilis Kostakos, Mark Ryan, Benjamin Tag, Kleomenis Katevas
Mo Zhang, Eduard Marin, David Oswald, Vassilis Kostakos, Mark Ryan, Benjamin Tag, Kleomenis Katevas
Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments
Liam Eagen, Sanket Kanjalkar, Tim Ruffing, Jonas Nick
Liam Eagen, Sanket Kanjalkar, Tim Ruffing, Jonas Nick
Lattice Signature with Efficient Protocols, Application to Anonymous Credentials
Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
Security of Truncated Permutation Without Initial Value
Lorenzo Grassi, Bart Mennink
Lorenzo Grassi, Bart Mennink
Low-Latency Hardware Private Circuits
David Knichel, Amir Moradi
David Knichel, Amir Moradi
Design and analysis of a distributed ECDSA signing service
Jens Groth, Victor Shoup
Jens Groth, Victor Shoup
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions
Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev
Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev
Towards a Formal Treatment of Logic Locking
Peter Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo
Peter Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo
Fast Diffusion Block for Secret Key Cryptography
Vlastimil Klima
Vlastimil Klima
Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim
Multi-Server PIR with Full Error Detection and Limited Error Correction
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
Cryptographic Oracle-Based Conditional Payments
Varun Madathil, Sri AravindaKrishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez
Varun Madathil, Sri AravindaKrishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez
Limitations of Information-theoretic Incompressible Encodings
Petr Sedláček
Petr Sedláček
Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium
Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha
Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha
Maliciously Circuit-Private FHE from Information-Theoretic Principles
Nico Döttling, Jesko Dujmovic
Nico Döttling, Jesko Dujmovic
Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM
Emre Karabulut, Erdem Alkim, Aydin Aysu
Emre Karabulut, Erdem Alkim, Aydin Aysu
Don’t Learn What You Already Know: Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking
Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
Towards Smart Contract-based Verification of Anonymous Credentials
Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch
Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch
Multi-Party Computation in the GDPR
Lukas Helminger, Christian Rechberger
Lukas Helminger, Christian Rechberger
Information Bounds and Convergence Rates for Side-Channel Security Evaluators
Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
A Practical-Quantum Differential Attack on Block Ciphers
Tarun Yadav, Manoj Kumar, Amit Kumar, S K Pal
Tarun Yadav, Manoj Kumar, Amit Kumar, S K Pal
OrgAn: Organizational Anonymity with Low Latency
Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate
Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate
New Key-Recovery Attack on Reduced-Round AES
Navid Ghaedi Bardeh, Vincent Rijmen
Navid Ghaedi Bardeh, Vincent Rijmen
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing
Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert
Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert
Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic
Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang
Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications
Geoff Twardokus, Nina Bindel, Hanif Rahbari, and Sarah McCarthy
Geoff Twardokus, Nina Bindel, Hanif Rahbari, and Sarah McCarthy
cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption
KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang
KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang
India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities
Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta
Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption
Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi
Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi
Property-Preserving Hash Functions and Combinatorial Group Testing
Kazuhiko Minematsu
Kazuhiko Minematsu
Subverting Cryptographic Hardware used in Blockchain Consensus
Pratyush Ranjan Tiwari and Matthew Green
Pratyush Ranjan Tiwari and Matthew Green
On the Security of TrCBC
Debrup Chakraborty, Samir Kundu
Debrup Chakraborty, Samir Kundu
SIDH-sign: an efficient SIDH PoK-based signature
Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin
Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin
Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication
Catinca Mujdei, Arthur Beckers, Jose Maria Bermudo Mera, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede
Catinca Mujdei, Arthur Beckers, Jose Maria Bermudo Mera, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede
Understanding binary-Goppa decoding
Daniel J. Bernstein
Daniel J. Bernstein
On the Hardness of Module Learning With Errors with Short Distributions
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020
Aron Gohr, Friederike Laus, Werner Schindler
Aron Gohr, Friederike Laus, Werner Schindler
Designated-Verifier Linkable Ring Signatures
Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou
Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou
Efficient ASIC Architectures for Low Latency Niederreiter Decryption
Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
Improved Pump and Jump BKZ by Sharp Simulator
Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu
Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu
Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification
Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier
Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier
Quantum binary quadratic form reduction
Nicolas David, Thomas Espitau, Akinori Hosoyamada
Nicolas David, Thomas Espitau, Akinori Hosoyamada
Băhēm: A Provably Secure Symmetric Cipher
M. Rajululkahf
M. Rajululkahf
Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations
Shaoxuan Zhang, Chun Guo, Qingju Wang
Shaoxuan Zhang, Chun Guo, Qingju Wang
Reducing the Depth of Quantum FLT-Based Inversion Circuit
Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim
Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim
New optimization techniques for PlonK’s arithmetization
Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems
Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks
Wei Cheng, Sylvain Guilley, Jean-Luc Danger
Wei Cheng, Sylvain Guilley, Jean-Luc Danger
A Novel NIZK-based Privacy Preserving Biometric Identification Scheme for Internet of Things
Lin You, Qiang Zhu, Gengran Hu
Lin You, Qiang Zhu, Gengran Hu
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
Multilinear Schwartz-Zippel mod N with Applications to Succinct Arguments
Benedikt Bünz and Ben Fisch
Benedikt Bünz and Ben Fisch
Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT
Liu Zhang, Zilong Wang
Liu Zhang, Zilong Wang
Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption
Anis Bkakria
Anis Bkakria
Proof of Availability & Retrieval in a Modular Blockchain Architecture
Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman
Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
Thomas Attema, Vincent Dunning, Maarten Everts, Peter Langenkamp
Thomas Attema, Vincent Dunning, Maarten Everts, Peter Langenkamp
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach
Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam
Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam
UTT: Decentralized Ecash with Accountable Privacy
Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai
Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai
Improved Stock Market Structure Using Cryptography
Charanjit S. Jutla, Barry Mishra
Charanjit S. Jutla, Barry Mishra
Astrape: Anonymous Payment Channels with Boring Cryptography
Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba
Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba
On End-to-End Encryption
Britta Hale, Chelsea Komlo
Britta Hale, Chelsea Komlo
Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021
Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
Leveled Multikey FHE with constant-size ciphertexts from RLWE
Vanesa Daza, Paz Morillo, Sergi Rovira
Vanesa Daza, Paz Morillo, Sergi Rovira
Fast Side-Channel Key-Recovery Attack against Elephant Dumbo
Louis Vialar
Louis Vialar
TWAP Oracle Attacks: Easier Done than Said?
Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer
Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer
A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version)
Joachim Vandersmissen, Adrián Ranea, Bart Preneel
Joachim Vandersmissen, Adrián Ranea, Bart Preneel
Attack on SHealS and HealS: the Second Wave of GPST
Steven D. Galbraith, Yi-Fu Lai
Steven D. Galbraith, Yi-Fu Lai
Quantum Attacks on PRFs Based on Public Random Permutations
Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection
Paola de Perthuis, David Pointcheval
Paola de Perthuis, David Pointcheval
A Security Model for Randomization-based Protected Caches
Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó
Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó
Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang
Computing isogenies between finite Drinfeld modules
Benjamin Wesolowski
Benjamin Wesolowski
Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures
Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan
Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan
Publicly Accountable Robust Multi-Party Computation
Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Kuesters
Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Kuesters
Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement
Frédéric Dupuis, Philippe Lamontagne, and Louis Salvail
Frédéric Dupuis, Philippe Lamontagne, and Louis Salvail
Verifiable Quantum Advantage without Structure
Takashi Yamakawa and Mark Zhandry
Takashi Yamakawa and Mark Zhandry
McFly: Verifiable Encryption to the Future Made Practical
Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
Classical Verification of Quantum Computations in Linear Time
Jiayu Zhang
Jiayu Zhang
Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
Xinyu Mao, Noam Mazor, Jiapeng Zhang
Xinyu Mao, Noam Mazor, Jiapeng Zhang
Is the JCJ voting system really coercion-resistant?
Véronique Cortier, Pierrick Gaudry, and Quentin Yang
Véronique Cortier, Pierrick Gaudry, and Quentin Yang
Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt
Jianfang "Danny" Niu
Jianfang "Danny" Niu
Implicit White-Box Implementations: White-Boxing ARX Ciphers
Adrián Ranea, Joachim Vandersmissen, Bart Preneel
Adrián Ranea, Joachim Vandersmissen, Bart Preneel
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications
Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras
Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras
Spectre Declassified: Reading from the Right Place at the Wrong Time
Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom
Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2
Dor Amzaleg, Itai Dinur
Dor Amzaleg, Itai Dinur
Polynomial Approximation of Inverse sqrt Function for FHE
Samanvaya Panda
Samanvaya Panda
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, and Tjerand Silde
Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, and Tjerand Silde
Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant
Aritra Banerjee, Hitesh Tewari
Aritra Banerjee, Hitesh Tewari
Gemini: Elastic SNARKs for Diverse Environments
Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù
Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù
Dew: Transparent Constant-sized zkSNARKs
Arasu Arun, Chaya Ganesh, Satya Lokam, Tushar Mopuri, Sriram Sridhar
Arasu Arun, Chaya Ganesh, Satya Lokam, Tushar Mopuri, Sriram Sridhar
LLTI: Low-Latency Threshold Implementations
Victor Arribas, Zhenda Zhang, Svetla Nikova
Victor Arribas, Zhenda Zhang, Svetla Nikova
Efficient, Actively Secure MPC with a Dishonest Majority: a Survey
Emmanuela Orsini
Emmanuela Orsini
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives
Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security
Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption
Mila Anastasova, Panos Kampanakis, Jake Massimo
Mila Anastasova, Panos Kampanakis, Jake Massimo
Instachain: Breaking the Sharding Limits via Adjustable Quorums
Mustafa Safa Ozdayi, Yue Guo, Mahdi Zamani
Mustafa Safa Ozdayi, Yue Guo, Mahdi Zamani
Complete and Improved FPGA Implementation of Classic McEliece
Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
Quotient Approximation Modular Reduction
Aurélien Greuet, Simon Montoya, Clémence Vermeersch
Aurélien Greuet, Simon Montoya, Clémence Vermeersch
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar
Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar
Proof-of-Stake Is a Defective Mechanism
Vicent Sus
Vicent Sus
On the weightwise nonlinearity of weightwise perfectly balanced functions
Agnese Gini, Pierrick Méaux
Agnese Gini, Pierrick Méaux
Improving the Privacy of Tor Onion Services
Edward Eaton, Sajin Sasy, Ian Goldberg
Edward Eaton, Sajin Sasy, Ian Goldberg
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK
Helger Lipmaa, Janno Siim, Michal Zajac
Helger Lipmaa, Janno Siim, Michal Zajac
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
James Howe, Bas Westerbaan
James Howe, Bas Westerbaan
Constant Latency in Sleepy Consensus
Atsuki Momose, Ling Ren
Atsuki Momose, Ling Ren
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, and Qingju Wang
Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, and Qingju Wang
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
Cas Cremers, Caroline Fontaine, Charlie Jacomme
Cas Cremers, Caroline Fontaine, Charlie Jacomme
Quantum Advantage from Any Non-Local Game
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang
Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang
The Inverse of $\chi$ and Its Applications to Rasta-like Ciphers
Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas Pattengale
Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas Pattengale
Revocable Hierarchical Attribute-based Signatures from Lattices
Daniel Gardham, Mark Manulis
Daniel Gardham, Mark Manulis
Side-channel attacks based on power trace decomposition
Fanliang Hu, Huanyu Wang, Junnian Wang
Fanliang Hu, Huanyu Wang, Junnian Wang
A lightweight verifiable secret sharing scheme in IoTs
Likang Lu, Jianzhu Lu
Likang Lu, Jianzhu Lu
Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions
Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh, Nurun N. Mondol, Fahim Rahman, Mark Tehranipoor, Farimah Farahmandi
Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh, Nurun N. Mondol, Fahim Rahman, Mark Tehranipoor, Farimah Farahmandi
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation
Yashvanth Kondi, abhi shelat
Yashvanth Kondi, abhi shelat
Poly Onions: Achieving Anonymity in the Presence of Churn
Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin
Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin
An Improved Model on the Vague Sets-Based DPoS’s Voting Phase in Blockchain
Lin You, Zhuobiao Wang, Gengran Hu, Chengtang Cao
Lin You, Zhuobiao Wang, Gengran Hu, Chengtang Cao
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain
Lin You, Xinhua Zhang, Gengran Hu, Longbo Han
Lin You, Xinhua Zhang, Gengran Hu, Longbo Han
Higher-order masked Saber
Suparna Kundu, Jan-Pieter D’Anvers, Michiel Van Beirendonck, Angshuman Karmakar, and Ingrid Verbauwhede
Suparna Kundu, Jan-Pieter D’Anvers, Michiel Van Beirendonck, Angshuman Karmakar, and Ingrid Verbauwhede
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing
Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu
Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu
Phase-shift Fault Analysis of Grain-128
HRIDYA P R and Jimmy Jose
HRIDYA P R and Jimmy Jose
Secure Two-party Computation Approach for NTRUEncrypt
Lin You, Yan Wang, Liang Li, Gengran Hu
Lin You, Yan Wang, Liang Li, Gengran Hu
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest
Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
Light Clients for Lazy Blockchains
Ertem Nusret Tas, David Tse, Lei Yang, and Dionysis Zindros
Ertem Nusret Tas, David Tse, Lei Yang, and Dionysis Zindros
On Succinct Non-Interactive Arguments in Relativized Worlds
Megan Chen, Alessandro Chiesa, Nicholas Spooner
Megan Chen, Alessandro Chiesa, Nicholas Spooner
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups
Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo
Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
Hirotomo Shinoki, Koji Nuida
Hirotomo Shinoki, Koji Nuida
A Linear-Time 2-Party Secure Merge Protocol
Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky
Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky
Fully Secure PSI via MPC-in-the-Head
S. Dov Gordon, Carmit Hazay, Phi Hung Le
S. Dov Gordon, Carmit Hazay, Phi Hung Le
Share $\&$ Shrink: (In-)Feasibility of MPC from one Broadcast-then-Asynchrony, and Delegated Computation
Antoine Urban and Matthieu Rambaud
Antoine Urban and Matthieu Rambaud
(Commit-and-Prove) Predictable Arguments with Privacy
Hamidreza Khoshakhlagh
Hamidreza Khoshakhlagh
Universally Composable End-to-End Secure Messaging
Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia
Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia
A Note on the Security Framework of Two-key DbHtS MACs
Tingting Guo, Peng Wang
Tingting Guo, Peng Wang
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability
Yehuda Lindell
Yehuda Lindell
Blind accumulators for e-voting
Sergey Agievich
Sergey Agievich
Shorter quantum circuits
Vadym Kliuchnikov, Kristin Lauter, Romy Minko, Christophe Petit, Adam Paetznick
Vadym Kliuchnikov, Kristin Lauter, Romy Minko, Christophe Petit, Adam Paetznick
A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier
Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim
Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim
Efficient NIZKs from LWE via Polynomial Reconstruction and ``MPC in the Head"
Riddhi Ghosal, Paul Lou, Amit Sahai
Riddhi Ghosal, Paul Lou, Amit Sahai
Matching Attacks on Romulus-M
Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata
Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
Samir Jordan Menon, David J. Wu
Samir Jordan Menon, David J. Wu
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings
Patrick Longa
Patrick Longa
On the Algebraic Degree of Iterated Power Functions
Clémence Bouvier, Anne Canteaut, Léo Perrin
Clémence Bouvier, Anne Canteaut, Léo Perrin
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform
Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE
Aymeric Genêt, Novak Kaluđerović
Aymeric Genêt, Novak Kaluđerović
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security
Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl
Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl
How to Backdoor (Classic) McEliece and How to Guard Against Backdoors
Tobias Hemmert, Alexander May, Johannes Mittmann, Carl Richard Theodor Schneider
Tobias Hemmert, Alexander May, Johannes Mittmann, Carl Richard Theodor Schneider
Base64 Malleability in Practice
Panagiotis Chatzigiannis, Konstantinos Chalkias
Panagiotis Chatzigiannis, Konstantinos Chalkias
Privacy-Preserving Contrastive Explanations with Local Foil Trees
Thijs Veugen, Bart Kamphorst, Michiel Marcus
Thijs Veugen, Bart Kamphorst, Michiel Marcus
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippel
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippel
Linear Private Set Union from Multi-Query Reverse Private Membership Test
Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves
Antonin Leroux
Antonin Leroux
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles
MUSTAIN BILLAH, SK. TANZIR MEHEDI, ADNAN ANWAR, ZIAUR RAHMAN, RAFIQUL ISLAM
MUSTAIN BILLAH, SK. TANZIR MEHEDI, ADNAN ANWAR, ZIAUR RAHMAN, RAFIQUL ISLAM
A More Complete Analysis of the Signal Double Ratchet Algorithm
Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, Srinivasan Raghuraman
Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, Srinivasan Raghuraman
Optimal Synchronous Approximate Agreement with Asynchronous Fallback
Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
SNARGs for P from Sub-exponential DDH and QR
James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan
James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan
Co-factor clearing and subgroup membership testing on pairing-friendly curves
Youssef El Housni, Aurore Guillevic, Thomas Piellard
Youssef El Housni, Aurore Guillevic, Thomas Piellard
Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION
Bruno Mazorra, Victor Adan, Vanesa Daza
Bruno Mazorra, Victor Adan, Vanesa Daza
Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields
Antoine Leudière, Pierre-Jean Spaenlehauer
Antoine Leudière, Pierre-Jean Spaenlehauer
Fast Subgroup Membership Testings for $\mathbb{G}_1$, $\mathbb{G}_2$ and $\mathbb{G}_T$ on Pairing-friendly Curves
Yu Dai, Kaizhan Lin, Chang-An Zhao, Zijian Zhou
Yu Dai, Kaizhan Lin, Chang-An Zhao, Zijian Zhou
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition
Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, and Yongsoo Song
Recovering the tight security proof of $SPHINCS^{+}$
Andreas Hülsing, Mikhail Kudinov
Andreas Hülsing, Mikhail Kudinov
On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski
Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski
Shorter Signatures from MQ
William Wang
William Wang
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation
Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai
Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications
Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch
Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher
Nicoleta-Norica Băcuieți, Lejla Batina, Stjepan Picek
Nicoleta-Norica Băcuieți, Lejla Batina, Stjepan Picek
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA
Azade Rezaeezade, Guilherme Perin, Stjepan Picek
Azade Rezaeezade, Guilherme Perin, Stjepan Picek
New Digital Signature Algorithm EHT
Igor Semaev
Igor Semaev
Communication-Efficient Inner Product Private Join and Compute with Cardinality
Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, and Junichi Tomida
Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, and Junichi Tomida
Improving Software Quality in Cryptography Standardization Projects
Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers
Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers
Batch Arguments for NP and More from Standard Bilinear Group Assumptions
Brent Waters, David J. Wu
Brent Waters, David J. Wu
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System
Tuan-Hong Chua, Iftekhar Salam
Tuan-Hong Chua, Iftekhar Salam
Improved Private Set Intersection for Sets with Small Entries
Dung Bui, Geoffroy Couteau
Dung Bui, Geoffroy Couteau
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption
Dandan Yuan, Shujie Cui, Giovanni Russello
Dandan Yuan, Shujie Cui, Giovanni Russello
CostCO: An automatic cost modeling framework for secure multi-party computation
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
Parallelizable Authenticated Encryption with Small State Size
Akiko Inoue, Kazuhiko Minematsu
Akiko Inoue, Kazuhiko Minematsu
A Simple and Generic Approach to Dynamic Collusion Model
Rachit Garg, Rishab Goyal, and George Lu
Rachit Garg, Rishab Goyal, and George Lu
Rolling up lattice cryptography primes
Daniel R. L. Brown
Daniel R. L. Brown
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks
Lennert Wouters, Benedikt Gierlichs, Bart Preneel
Lennert Wouters, Benedikt Gierlichs, Bart Preneel
Provable Secure Software Masking in the Real-World
Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
Composable Dynamic Secure Emulation
Pierre Civit, Maria Potop-Butucaru
Pierre Civit, Maria Potop-Butucaru
FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level
Michail Moraitis, Elena Dubrova
Michail Moraitis, Elena Dubrova
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption
Yao Jiang Galteland, Jiaxin Pan
Yao Jiang Galteland, Jiaxin Pan
Dilithium for Memory Constrained Devices
Joppe W. Bos, Joost Renes, Amber Sprenkels
Joppe W. Bos, Joost Renes, Amber Sprenkels
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance
Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb
Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb
Blazing Fast PSI from Improved OKVS and Subfield VOLE
Srinivasan Raghuraman, Peter Rindal
Srinivasan Raghuraman, Peter Rindal
A Blockchain-based Long-term Time-Stamping Scheme
Long Meng, Liqun Chen
Long Meng, Liqun Chen
Efficient Online-friendly Two-Party ECDSA Signature
Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui
Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui
Thora: Atomic and Privacy-Preserving Multi-Channel Updates
Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei
Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions
Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN
Damiano Abram, Peter Scholl
Damiano Abram, Peter Scholl
Batch-OT with Optimal Rate
Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu
Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu
Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols
Shahar P. Cohen, Moni Naor
Shahar P. Cohen, Moni Naor
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH
Peihan Miao, Sikhar Patranabis, Gaven Watson
Peihan Miao, Sikhar Patranabis, Gaven Watson
Dispute-free Scalable Open Vote Network using zk-SNARKs
Muhammad ElSheikh, Amr M. Youssef
Muhammad ElSheikh, Amr M. Youssef
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing
Ashrujit Ghoshal, Ilan Komargodski
Ashrujit Ghoshal, Ilan Komargodski
Colordag: An Incentive-Compatible Blockchain
Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern
Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehle
Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehle
The More You Know: Improving Laser Fault Injection with Prior Knowledge
Marina Krček, Thomas Ordas, Daniele Fronte, Stjepan Picek
Marina Krček, Thomas Ordas, Daniele Fronte, Stjepan Picek
Surveying definitions of election verifiability
Ben Smyth, Michael R. Clarkson
Ben Smyth, Michael R. Clarkson
Multi-User BBB Security of Public Permutations Based MAC
Yu Long Chen, Avijit Dutta, Mridul Nandi
Yu Long Chen, Avijit Dutta, Mridul Nandi
Unlinkable Delegation of WebAuthn Credentials
Nick Frymann, Daniel Gardham, Mark Manulis
Nick Frymann, Daniel Gardham, Mark Manulis
SoK: Oblivious Pseudorandom Functions
Sílvia Casacuberta, Julia Hesse, Anja Lehmann
Sílvia Casacuberta, Julia Hesse, Anja Lehmann
How Practical are Fault Injection Attacks, Really?
Jakub Breier, Xiaolu Hou
Jakub Breier, Xiaolu Hou
Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication
Irem Keskinkurt Paksoy, Murat Cenk
Irem Keskinkurt Paksoy, Murat Cenk
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3
Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
Constructive Post-Quantum Reductions
Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai
Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai
Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie
Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie
On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory.
Vasyl Ustimenko
Vasyl Ustimenko
Quantum Proofs of Deletion for Learning with Errors
Alexander Poremba
Alexander Poremba
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets
Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
Minimizing Setup in Broadcast-Optimal Two Round MPC
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
Comment on ``SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices''
Michael Amar, Amit Kama, Kang Wang, Yossi Oren
Michael Amar, Amit Kama, Kang Wang, Yossi Oren
Provable security of CFB mode of operation with external re-keying
Vadim Tsypyschev, Iliya Morgasov
Vadim Tsypyschev, Iliya Morgasov
Universally Composable Sigma-protocols in the Global Random-Oracle Model
Anna Lysyanskaya, Leah Namisa Rosenbloom
Anna Lysyanskaya, Leah Namisa Rosenbloom
Two Attacks On Proof-of-Stake GHOST/Ethereum
Joachim Neu, Ertem Nusret Tas, David Tse
Joachim Neu, Ertem Nusret Tas, David Tse
Spats: confidential assets and non-fungible tokens
Aaron Feickert and Aram Jivanyan
Aaron Feickert and Aram Jivanyan
User-Perceived Privacy in Blockchain
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Provably Secure Identity-Based Remote Password Registration
Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
Block-Cipher-Based Tree Hashing
Aldo Gunsing
Aldo Gunsing
Achievable CCA2 Relaxation for Homomorphic Encryption
Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald
Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald
Succinct Interactive Oracle Proofs: Applications and Limitations
Shafik Nassar, Ron D. Rothblum
Shafik Nassar, Ron D. Rothblum
Efficient Homomorphic Evaluation on Large Intervals
Jung Hee Cheon, Wootae Kim, Jai Hyun Park
Jung Hee Cheon, Wootae Kim, Jai Hyun Park
Permutation rotation-symmetric S-boxes, liftings and affine equivalence
Tron Omland, Pantelimon Stanica
Tron Omland, Pantelimon Stanica
Incompressiblity and Next-Block Pseudoentropy
Iftach Haitner, Noam Mazor, Jad Silbak
Iftach Haitner, Noam Mazor, Jad Silbak
Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields
Robin Salen, Vijaykumar Singh, Vladimir Soukharev
Robin Salen, Vijaykumar Singh, Vladimir Soukharev
Hardness estimates of the Code Equivalence Problem in the Rank Metric
Krijn Reijnders, Simona Samardjiska, and Monika Trimoska
Krijn Reijnders, Simona Samardjiska, and Monika Trimoska
Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction
Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha
Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha
EcGFp5: a Specialized Elliptic Curve
Thomas Pornin
Thomas Pornin
Compact Storage for Homomorphic Encryption
Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality
Shingo Sato, Junji Shikata
Shingo Sato, Junji Shikata
Approximate Divisor Multiples -- Factoring with Only a Third of the Secret CRT-Exponents
Alexander May, Julian Nowakowski, Santanu Sarkar
Alexander May, Julian Nowakowski, Santanu Sarkar
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
On Codes and Learning With Errors over Function Fields
Maxime Bombar, Alain Couvreur, and Thomas Debris-Alazard
Maxime Bombar, Alain Couvreur, and Thomas Debris-Alazard
Efficient Schemes for Committing Authenticated Encryption
Mihir Bellare and Viet Tung Hoang
Mihir Bellare and Viet Tung Hoang
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms
Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo
Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo
Verifiably Distributed Multi-User Secret Sharing schemes
Likang Lu, Jianzhu Lu
Likang Lu, Jianzhu Lu
Non-interactive Mimblewimble transactions, revisited
Georg Fuchsbauer, Michele Orrù
Georg Fuchsbauer, Michele Orrù
Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security
Ittai Abraham, Gilad Asharov
Ittai Abraham, Gilad Asharov
Rethinking Modular Multi-Exponentiation in Real-World Applications
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
Secure Non-Interactive Reduction and Spectral Analysis of Correlations
Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan
Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan
Sublinear GMW-Style Compiler for MPC with Preprocessing
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Advances in Logic Locking: Past, Present, and Prospects
Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark Tehranipoor
Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark Tehranipoor
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU
Andre Esser, Alexander May, Javier Verbel, Weiqiang Wen
Andre Esser, Alexander May, Javier Verbel, Weiqiang Wen
Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications
Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark Tehranipoor, Fahim Rahman
Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark Tehranipoor, Fahim Rahman
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols
Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
Multi-Designated Receiver Signed Public Key Encryption
Ueli Maurer, Christopher Portmann, and Guilherme Rito
Ueli Maurer, Christopher Portmann, and Guilherme Rito
Round-Optimal Byzantine Agreement
Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang
Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang
Unprotected and Masked Hardware Implementations of Spook v2
Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
The Side-Channel Metrics Cheat Sheet
Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic
Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic
Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
CoCoA: Concurrent Continuous Group Key Agreement
Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
Private Circuits with Quasilinear Randomness
Vipul Goyal, Yuval Ishai, Yifan Song
Vipul Goyal, Yuval Ishai, Yifan Song
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
Aldo Gunsing, Bart Mennink
Aldo Gunsing, Bart Mennink
Collapseability of Tree Hashes
Aldo Gunsing, Bart Mennink
Aldo Gunsing, Bart Mennink
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Aldo Gunsing, Joan Daemen, Bart Mennink
Aldo Gunsing, Joan Daemen, Bart Mennink
On the Concrete Security of TLS 1.3 PSK Mode
Hannah Davis, Denis Diemert, Felix Günther, and Tibor Jager
Hannah Davis, Denis Diemert, Felix Günther, and Tibor Jager
Entropic Hardness of Module-LWE from Module-NTRU
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
Universally Composable Subversion-Resilient Cryptography
Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi
Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi
A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis
Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang
Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring
Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring
Coalition and Threshold Hash-Based Signatures
John Kelsey, Stefan Lucks, Nathalie Lang
John Kelsey, Stefan Lucks, Nathalie Lang
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
Hamza Abusalah, Georg Fuchsbauer, Peter Gaži, Karen Klein
Hamza Abusalah, Georg Fuchsbauer, Peter Gaži, Karen Klein
Several Improvements on BKZ Algorithm
Ziyu Zhao, Jintai Ding
Ziyu Zhao, Jintai Ding
HEAD: an FHE-based Privacy-preserving Cloud Computing Protocol with Compact Storage and Efficient Computation
Lijing Zhou, Ziyu Wang, Hongrui Cui, Xiao Zhang, Xianggui Wang, Yu Yu
Lijing Zhou, Ziyu Wang, Hongrui Cui, Xiao Zhang, Xianggui Wang, Yu Yu
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions
Jesper Buus Nielsen, João Ribeiro, and Maciej Obremski
Jesper Buus Nielsen, João Ribeiro, and Maciej Obremski
Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation
Tristan Nemoz, Zoé AMBLARD, Aurélien DUPIN
Tristan Nemoz, Zoé AMBLARD, Aurélien DUPIN
Limits of Preprocessing for Single-Server PIR
Giuseppe Persiano, Kevin Yeo
Giuseppe Persiano, Kevin Yeo
New algorithms for the Deuring correspondence: Towards practical and secure SQISign signatures
Luca De Feo, Antonin Leroux, Patrick Longa, Benjamin Wesolowski
Luca De Feo, Antonin Leroux, Patrick Longa, Benjamin Wesolowski
Variational quantum solutions to the Shortest Vector Problem
Martin R. Albrecht, Miloš Prokop, Yixin Shen, Petros Wallden
Martin R. Albrecht, Miloš Prokop, Yixin Shen, Petros Wallden
Conditional Variational AutoEncoder based on Stochastic Attack
Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
Towards Low-Latency Implementation of Linear Layers
Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang
Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang
Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto
Gregor Haas, Aydin Aysu
Gregor Haas, Aydin Aysu
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Semi-Quantum Tokenized Signatures
Omri Shmueli
Omri Shmueli
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects
Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov
Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov
To Label, or Not To Label (in Generic Groups)
Mark Zhandry
Mark Zhandry
Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms
Monika Henzinger, Jalaj Upadhyay
Monika Henzinger, Jalaj Upadhyay
Embedding the UC Model into the IITM Model
Daniel Rausch, Ralf Kuesters, Céline Chevalier
Daniel Rausch, Ralf Kuesters, Céline Chevalier
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud
Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud
Half-Aggregation of Schnorr Signatures with Tight Reductions
Yanbo Chen, Yunlei Zhao
Yanbo Chen, Yunlei Zhao
Secure Joint Communication and Sensing
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security
Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi
Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication
Hanyu Jia, Xiangxue Li
Hanyu Jia, Xiangxue Li
On the Impossibility of Key Agreements from Quantum Random Oracles
Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody
Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody
High-Performance Hardware Implementation of Lattice-Based Digital Signatures
Luke Beckwith, Duc Tri Nguyen, Kris Gaj
Luke Beckwith, Duc Tri Nguyen, Kris Gaj
Short Leakage Resilient and Non-malleable Secret Sharing Schemes
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Multi-Client Functional Encryption with Fine-Grained Access Control
Ky Nguyen, Duong Hieu Phan, David Pointcheval
Ky Nguyen, Duong Hieu Phan, David Pointcheval
Breaking Rainbow Takes a Weekend on a Laptop
Ward Beullens
Ward Beullens
Issuer-Hiding Attribute-Based Credentials
Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin
Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin
Tight Analysis of Decrypton Failure Probability of Kyber in Reality
Boyue Fang, Weize Wang, Yunlei Zhao
Boyue Fang, Weize Wang, Yunlei Zhao
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts
Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh
Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh
An Analysis of the Algebraic Group Model
Jonathan Katz, Cong Zhang, Hong-Sheng Zhou
Jonathan Katz, Cong Zhang, Hong-Sheng Zhou
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
ZiXi Hee, Iftekhar Salam
ZiXi Hee, Iftekhar Salam
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
Alon Shakevsky, Eyal Ronen, Avishai Wool
Alon Shakevsky, Eyal Ronen, Avishai Wool
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding
Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding
Proving UNSAT in Zero Knowledge
Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang
Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang
Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions
Dipayan Das, Antoine Joux, Anand Kumar Narayanan
Dipayan Das, Antoine Joux, Anand Kumar Narayanan
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library
Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu
Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV
Jean-Charles Faugère, Gilles macario-Rat, Jacques Patarin, Ludovic Perret
Jean-Charles Faugère, Gilles macario-Rat, Jacques Patarin, Ludovic Perret
Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's
Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas
Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas
Enig: Player Replaceable Finality Layers with Optimal Validity
Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds
Akshayaram Srinivasan
Akshayaram Srinivasan
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing
Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo
Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo
Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption
Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo
Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo
Nice Attacks --- but What is the Cost? Computational Models for Cryptanalysis
Charles Bouillaguet
Charles Bouillaguet
Generalising Fault Attacks to Genus Two Isogeny Cryptosystems
Ariana Goh, Chu-Wee Lim, Yan Bo Ti
Ariana Goh, Chu-Wee Lim, Yan Bo Ti
Quantum and Classical Algorithms for Bounded Distance Decoding
Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul
Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul
Finding Collisions against 4-round SHA3-384 in Practical Time
Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov
Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov
OptRand: Optimistically responsive distributed random beacons
Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
SoftSpokenOT: Communication--Computation Tradeoffs in OT Extension
Lawrence Roy
Lawrence Roy
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead
Andrew Park, Wei-Kai Lin, Elaine Shi
Andrew Park, Wei-Kai Lin, Elaine Shi
Short-lived zero-knowledge proofs and signatures
Arasu Arun, Joseph Bonneau, Jeremy Clark
Arasu Arun, Joseph Bonneau, Jeremy Clark
Simplified MITM Modeling for Permutations: New (Quantum) Attacks
André Schrottenloher, Marc Stevens
André Schrottenloher, Marc Stevens
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
Thibauld Feneuil, Antoine Joux, Matthieu Rivain
Thibauld Feneuil, Antoine Joux, Matthieu Rivain
Constant-Round YOSO MPC Without Setup
Sebastian Kolby, Divya Ravi, Sophia Yakoubov
Sebastian Kolby, Divya Ravi, Sophia Yakoubov
Overflow-detectable Floating-point Fully Homomorphic Encryption
Seunghwan Lee, Dong-Joon Shin
Seunghwan Lee, Dong-Joon Shin
Statistically Sender-Private OT from LPN and Derandomization
Nir Bitansky, Sapir Freizeit
Nir Bitansky, Sapir Freizeit
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3 (Full Version)
Jian Guo, Guozhen Liu, Ling Song, Yi Tu
Jian Guo, Guozhen Liu, Ling Song, Yi Tu
Improving Differential-Neural Cryptanalysis
Liu Zhang, Zilong Wang, and Baocang wang
Liu Zhang, Zilong Wang, and Baocang wang
A Novel Framework for Explainable Leakage Assessment
Si Gao and Elisabeth Oswald
Si Gao and Elisabeth Oswald
Vector Commitments over Rings and Compressed $\Sigma$-Protocols
Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero
Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero
Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
Locally Verifiable Signature and Key Aggregation
Rishab Goyal, Vinod Vaikuntanathan
Rishab Goyal, Vinod Vaikuntanathan
Lower Bound on SNARGs in the Random Oracle Model
Iftach Haitner, Daniel Nukrai, Eylon Yogev
Iftach Haitner, Daniel Nukrai, Eylon Yogev
The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms
Mingxun Zhou, Elaine Shi
Mingxun Zhou, Elaine Shi
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems
Minze Xu, Yuan Zhang, Sheng Zhong
Minze Xu, Yuan Zhang, Sheng Zhong
WeRLman: To Tackle Whale (Transactions), Go Deep (RL)
Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar
Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar
How to Launch a Powerful Side-Channel Collision Attack?
Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng
Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng
Collision-Resistance from Multi-Collision-Resistance
Ron D. Rothblum, Prashant Nalini Vasudevan
Ron D. Rothblum, Prashant Nalini Vasudevan
A remark on NIST SP 800-22 serial test
Corina-Elena Bogos, Razvan Mocanu, Emil Simion
Corina-Elena Bogos, Razvan Mocanu, Emil Simion
Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions
Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies
Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker
Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker
SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs
Gal Arnon, Alessandro Chiesa, Eylon Yogev
Gal Arnon, Alessandro Chiesa, Eylon Yogev
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority
Benny Applebaum, Eliran Kachlon, Arpita Patra
Benny Applebaum, Eliran Kachlon, Arpita Patra
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges
Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti
Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti
PAC Learnability of iPUF Variants
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees
Yunzhou Yan, Yu Xia, Srinivas Devadas
Yunzhou Yan, Yu Xia, Srinivas Devadas
A High Performance Payment Processing System Designed for Central Bank Digital Currencies
James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula
James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula
On the precision loss in approximate homomorphic encryption
Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, and Rachel Player
Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, and Rachel Player
D-KODE: Mechanism to Generate and Maintain a Billion Keys
Easwar Vivek Mangipudi, Aniket Kate
Easwar Vivek Mangipudi, Aniket Kate
Random primes in arithmetic progressions
Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche
Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche
A Note on Blockchain Authentication Methods For Mobile Devices In Healthcare
George-Mircea Grosu, Silvia-Elena Nistor, Emil Simion
George-Mircea Grosu, Silvia-Elena Nistor, Emil Simion
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs
Olivier Bronchain, Gaëtan Cassiers
Olivier Bronchain, Gaëtan Cassiers
Shuffle-based Private Set Union: Faster and More Secure
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
Universal Reductions: Reductions Relative to Stateful Oracles
Benjamin Chan, Cody Freitag, Rafael Pass
Benjamin Chan, Cody Freitag, Rafael Pass
FairTraDEX: A Decentralised Exchange Preventing Value Extraction
Conor McMenamin, Vanesa Daza, Matthias Fitzi, Padraic O'Donoghue
Conor McMenamin, Vanesa Daza, Matthias Fitzi, Padraic O'Donoghue
Coeus: A System for Oblivious Document Ranking and Retrieval
Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
Faulty isogenies: a new kind of leakage
Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez
Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez
K-XMSS and K-SPHINCS$^+$:Hash based Signatures with\\Korean Cryptography Algorithms
Minjoo Sim, Siwoo Eum, Gyeongju Song, HyeokDong Kwon, Kyungbae Jang, HyunJun Kim, HyunJi Kim, Yujin Yang, Wonwoong Kim, Wai-Kong Lee, Hwajeong Seo
Minjoo Sim, Siwoo Eum, Gyeongju Song, HyeokDong Kwon, Kyungbae Jang, HyunJun Kim, HyunJi Kim, Yujin Yang, Wonwoong Kim, Wai-Kong Lee, Hwajeong Seo
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun, Wei Wang, Meiqin Wang
Ling Sun, Wei Wang, Meiqin Wang
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping
Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler
Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler
Attacks on the Firekite cipher
Thomas Johansson, Willi Meier, Vu Nguyen
Thomas Johansson, Willi Meier, Vu Nguyen
Constructing new superclasses of bent functions from known ones
Amar Bapić, Enes Pasalic, Fengrong Zhang, Samir Hodžić
Amar Bapić, Enes Pasalic, Fengrong Zhang, Samir Hodžić
Training Differentially Private Models with Secure Multiparty Computation
Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock
Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock
An elementary construction of QR-UOV
Yasufumi Hashimoto
Yasufumi Hashimoto
Rainbow Differential Privacy
Ziqi Zhou, Onur Gunlu, Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi, Rafael F. Schaefer
Ziqi Zhou, Onur Gunlu, Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi, Rafael F. Schaefer
Composition construction of new bent functions from known dually isomorphic bent functions
Guangpu Gao, Weiguo Zhang, Yongjuan Wang
Guangpu Gao, Weiguo Zhang, Yongjuan Wang
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications
Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs
Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, and Sushmita Ruj
Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, and Sushmita Ruj
On the Related-Key Attack Security of Authenticated Encryption Schemes
Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck
Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck
Sponge-based Authenticated Encryption: Security against Quantum Attackers
Christian Janson, Patrick Struck
Christian Janson, Patrick Struck
Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model
Pierre Galissant, Louis Goubin
Pierre Galissant, Louis Goubin
Ten years of cube attacks
Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
Twilight: A Differentially Private Payment Channel Network
Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers
Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier
Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier
Functional Cryptanalysis: Application to reduced-round Xoodoo
Emanuele Bellini, Rusydi H. Makarim
Emanuele Bellini, Rusydi H. Makarim
Faster verification of V2X BSM messages via Message Chaining
Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio Jr., Harsh Kupwade Patil, Jefferson E. Ricardini
Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio Jr., Harsh Kupwade Patil, Jefferson E. Ricardini
On Defeating Graph Analysis of Anonymous Transactions
Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin
Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange
Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding
Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding
A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion
Gideon Samid
Gideon Samid
TOFU - Toggle Count Analysis made simple
Michael Gruber, Georg Sigl
Michael Gruber, Georg Sigl
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes
Pierre Karpman, Charlotte Lefevre
Pierre Karpman, Charlotte Lefevre
CCA secure ElGamal encryption over an integer group where ICDH assumption holds
Gyu-Chol. Kim, Jae-Yong. Sin, Yong-Bok. Jong
Gyu-Chol. Kim, Jae-Yong. Sin, Yong-Bok. Jong
Storage Security in Cloud Computing: Data Auditing Protocols
Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion
Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion
Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem
Brice Colombier, Vlad-Florin Drăgoi, Pierre-Louis Cayrel, Vincent Grosso
Brice Colombier, Vlad-Florin Drăgoi, Pierre-Louis Cayrel, Vincent Grosso
On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case
Dor Salomon, Itamar Levi
Dor Salomon, Itamar Levi
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
Subhra Mazumdar, Sushmita Ruj
Subhra Mazumdar, Sushmita Ruj
Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more
Alexandru Gheorghiu, Tony Metger, Alexander Poremba
Alexandru Gheorghiu, Tony Metger, Alexander Poremba
Crime and Punishment in Distributed Byzantine Decision Tasks (Extended Version)
Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi
Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi
Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators
Florette Martinez
Florette Martinez
Hardware Implementation of SpoC-128
Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi
Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi
Streebog compression function as PRF in secret-key settings
Vitaly Kiryukhin
Vitaly Kiryukhin
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version)
Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks
Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang
Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat
Ziaur Rahman, Xun Yi, Ibrahim Khalil
Ziaur Rahman, Xun Yi, Ibrahim Khalil
XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets
Theodore Bugnet, Alexei Zamyatin
Theodore Bugnet, Alexei Zamyatin
Faster Kyber and Dilithium on the Cortex-M4
Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
Breaking Panther
Christina Boura, Rachelle Heim Boissier, Yann Rotella
Christina Boura, Rachelle Heim Boissier, Yann Rotella
Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations
Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede
Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
Rohon Kundu, Alessandro de Piccoli, Andrea Visconti
Rohon Kundu, Alessandro de Piccoli, Andrea Visconti
Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims
Aydin Abadi, Steven J. Murdoch
Aydin Abadi, Steven J. Murdoch
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert
Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert
Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces
Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly
Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly
Minotaur: Multi-Resource Blockchain Consensus
Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System
Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar
Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar
MPC-Friendly Commitments for Publicly Verifiable Covert Security
Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
Lattice-Based Linkable Ring Signature in the Standard Model
Mingxing Hu, Zhen Liu
Mingxing Hu, Zhen Liu
Development of Cryptography since Shannon
Funda Özdemir, Çetin Kaya Koç
Funda Özdemir, Çetin Kaya Koç
Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference
Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
Orienteering with one endomorphism
Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran
Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran
Lattice Signature can be as Simple as Lattice Encryption
Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu
Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications
Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung
Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies
Nir Drucker, Tomer Pelleg
Nir Drucker, Tomer Pelleg
Public-Key Encryption from Homogeneous CLWE
Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen
Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen
Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs
N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor
N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor
The multiplicative complexity of interval checking
Thomas Häner, Mathias Soeken
Thomas Häner, Mathias Soeken
Attacks on Encrypted Range Search Schemes in Multiple Dimensions
Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus
Kamil Kluczniak
Kamil Kluczniak
A survey on the security protocols employed by mobile messaging applications
Ștefania Andrieș, Andrei-Daniel Miron, Andrei Cristian, Emil Simion
Ștefania Andrieș, Andrei-Daniel Miron, Andrei Cristian, Emil Simion
The Internet Computer for Geeks
The DFINITY Team
The DFINITY Team
PlonKup: Reconciling PlonK with plookup
Luke Pearson, Joshua Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia
Luke Pearson, Joshua Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia
Cross-Domain Identity-based Matchmaking Encryption
Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang
Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2
Lucjan Hanzlik, Julian Loss, Benedikt Wagner
Lucjan Hanzlik, Julian Loss, Benedikt Wagner
Zef: Low-latency, Scalable, Private Payments
Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis
Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
Single-Server Private Information Retrieval with Sublinear Amortized Time
Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan
Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
Yu Long Chen, Stefano Tessaro
Yu Long Chen, Stefano Tessaro
Lightweight Secure Integer Comparison
Thijs Veugen
Thijs Veugen
Secure Lossy Function Computation with Multiple Private Remote Source Observations
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
Multiple Noisy Private Remote Source Observations for Secure Function Computation
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan
Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets
Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, and Aniket Kate
Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, and Aniket Kate
FINAL: Faster FHE instantiated with NTRU and LWE
Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart
Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart
Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain
Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide
Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction
Keita Emura
Keita Emura
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable
Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor
Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor
(Nondeterministic) Hardness vs. Non-Malleability
Marshall Ball, Dana Dachman-Soled, Julian Loss
Marshall Ball, Dana Dachman-Soled, Julian Loss
Small-Box Cryptography
Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
Updatable Public Key Encryption in the Standard Model
Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
Parallel Operations over TFHE-Encrypted Multi-Digit Integers
Jakub Klemsa, Melek Önen
Jakub Klemsa, Melek Önen
A remark on the Discrete Fourier Transform statistical test
Anghel Florin, Asandoaiei David, Tabacaru Robert
Anghel Florin, Asandoaiei David, Tabacaru Robert
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev
Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev
A Framework for the Design of Secure and Efficient Proofs of Retrievability
Françoise Levy-dit-Vehel, Maxime Roméas
Françoise Levy-dit-Vehel, Maxime Roméas
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
Kang Yang, Xiao Wang
Kang Yang, Xiao Wang
An Introduction to Secret-Sharing-Based Secure Multiparty Computation
Daniel Escudero
Daniel Escudero
A remark on the NIST 800-22 Binary Matrix Rank Test
Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
Quantum Boomerang Attacks and Some Applications
Paul Frixons, María Naya-Plasencia, André Schrottenloher
Paul Frixons, María Naya-Plasencia, André Schrottenloher
SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme
Kaiyi Zhang, Hongrui Cui, Yu Yu
Kaiyi Zhang, Hongrui Cui, Yu Yu
First-Order Masked Kyber on ARM Cortex-M4
Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, and Amber Sprenkels
Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, and Amber Sprenkels
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi
Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi
LedgerHedger: Gas Reservation for Smart-Contract Security
Itay Tsabary, Alex Manuskin, Roi Bar-Zur, and Ittay Eyal
Itay Tsabary, Alex Manuskin, Roi Bar-Zur, and Ittay Eyal
Key lifting : Multi-key Fully Homomorphic Encryption in plain model without noise flooding
Xiaokang Dai, Wenyuan Wu, and Yong Feng
Xiaokang Dai, Wenyuan Wu, and Yong Feng
SIKE Channels
Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
Brute Force Cryptanalysis
Aron Gohr
Aron Gohr
Near-optimal Balanced Reliable Broadcast and Asynchronous Verifiable Information Dispersal
Sourav Das, Zhuolun Xiang, Ling Ren
Sourav Das, Zhuolun Xiang, Ling Ren
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security
Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz
Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA
Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim
Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim
Small MACs from Small Permutations
Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger
Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger
RSA, DH, and DSA in the Wild
Nadia Heninger
Nadia Heninger
Short Pairing-Free Blind Signatures with Exponential Security
Stefano Tessaro, Chenzhi Zhu
Stefano Tessaro, Chenzhi Zhu
Membership Privacy for Asynchronous Group Messaging
Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake
Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes
Atakan Arslan, Muhammed Ali Bingöl
Atakan Arslan, Muhammed Ali Bingöl
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges
Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji
Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji
Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher
AMBILI K N, JIMMY JOSE
AMBILI K N, JIMMY JOSE
Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack
AMBILI K N, JIMMY JOSE
AMBILI K N, JIMMY JOSE
Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption
AMBILI K N, JIMMY JOSE
AMBILI K N, JIMMY JOSE
Outsourced CP-ABE with Whitebox Accountability in IoT Systems
AMBILI K N, JIMMY JOSE
AMBILI K N, JIMMY JOSE
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption
Antonio de la Piedra, Marloes Venema, Greg Alpár
Antonio de la Piedra, Marloes Venema, Greg Alpár
Subgroup membership testing on elliptic curves via the Tate pairing
Dmitrii Koshelev
Dmitrii Koshelev
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber
Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert
Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert
Time-Traveling Simulators Using Blockchains and Their Applications
Vipul Goyal, Justin Raizes, Pratik Soni
Vipul Goyal, Justin Raizes, Pratik Soni
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic
Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi
Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi
Deletion-Compliance in the Absence of Privacy
Jonathan Godin, Philippe Lamontagne
Jonathan Godin, Philippe Lamontagne
Formal Analysis of Non-Malleability for Commitments in EasyCrypt
Denis Firsov, Sven Laur, Ekaterina Zhuchko
Denis Firsov, Sven Laur, Ekaterina Zhuchko
BAT: Small and Fast KEM over NTRU Lattices
Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers
Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
CRYScanner: Finding cryptographic libraries misuse
Amit Choudhari, Sylvain Guilley, Khaled Karray
Amit Choudhari, Sylvain Guilley, Khaled Karray
Locality-Preserving Hashing for Shifts with Connections to Cryptography
Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective
Andrada-Teodora Ciulei, Marian-Codrin Crețu, Emil Simion
Andrada-Teodora Ciulei, Marian-Codrin Crețu, Emil Simion
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
Mostafizar Rahman, Dhiman Saha, Goutam Paul
Mostafizar Rahman, Dhiman Saha, Goutam Paul
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits
Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi
Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation
Xiuju Huang, Jiashuo Song, Zichen Li
Xiuju Huang, Jiashuo Song, Zichen Li
WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT
Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
Haibin Zhang, Sisi Duan
Haibin Zhang, Sisi Duan
Algebraic Meet-in-the-Middle Attack on LowMC
Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe
Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe
Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup
Ahmet Ramazan Ağırtaş, Oğuz Yayla
Ahmet Ramazan Ağırtaş, Oğuz Yayla
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation
Shingo Sato, Keita Emura, and Atsushi Takayasu
Shingo Sato, Keita Emura, and Atsushi Takayasu
An algebraic attack to the Bluetooth stream cipher E0
Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti
Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti
Lattice-based Signatures with Tight Adaptive Corruptions and More
Jiaxin Pan, Benedikt Wagner
Jiaxin Pan, Benedikt Wagner
Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors
Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak
Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
Security of Identity-based Encryption Schemes from Quadratic Residues
Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
Alfredo Rial, Ania M. Piotrowska
Alfredo Rial, Ania M. Piotrowska
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen
Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen
Algebraic Reductions of Knowledge
Abhiram Kothapalli, Bryan Parno
Abhiram Kothapalli, Bryan Parno
Beating Classical Impossibility of Position Verification
Jiahui Liu, Qipeng Liu, Luowen Qian
Jiahui Liu, Qipeng Liu, Luowen Qian
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More
Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner
Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
Pseudorandom Bit Generation with Asymmetric Numeral Systems
Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe
Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe
Publicly verifiable anonymous tokens with private metadata bit
Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova
Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova
Merged with 2022/007
Rutchathon Chairattana-Apirom, Anna Lysyanskaya
Rutchathon Chairattana-Apirom, Anna Lysyanskaya
Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes
Wenshuo Guo, Fang-Wei Fu
Wenshuo Guo, Fang-Wei Fu
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
GoUncle: A Blockchain Of, By, For Modest Computers
Mao Wenbo, Wang Wenxiang
Mao Wenbo, Wang Wenxiang
Verifiable Encryption from MPC-in-the-Head
Akira Takahashi and Greg Zaverucha
Akira Takahashi and Greg Zaverucha
The Maiorana-McFarland structure based cryptanalysis of Simon
Hao Chen
Hao Chen
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning
Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti
Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti
Cryptanalysis of the Cryptosystems Based on the Generalized Hidden Discrete Logarithm Problem
Ma Yanlong
Ma Yanlong
A Unified Framework for Non-Universal SNARKs
Helger Lipmaa
Helger Lipmaa
A Compact Digital Signature Scheme Based on the Module-LWR problem*
Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains
Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier
Andrea Basso, Furkan Aydin, Daniel Dinu, Joseph Friel, Avinash Varna, Manoj Sastry, Santosh Ghosh
Andrea Basso, Furkan Aydin, Daniel Dinu, Joseph Friel, Avinash Varna, Manoj Sastry, Santosh Ghosh
Categorization of Faulty Nonce Misuse Resistant Message Authentication
Yu Long Chen, Bart Mennink, and Bart Preneel
Yu Long Chen, Bart Mennink, and Bart Preneel
Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over $\mathbb F_p^n$
Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi
Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi
RLWE-based distributed key generation and threshold decryption
Ferran Alborch, Ramiro Martínez, and Paz Morillo
Ferran Alborch, Ramiro Martínez, and Paz Morillo
Verifiable Decryption for BGV
Tjerand Silde
Tjerand Silde
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version)
Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
Quantum commitments and signatures without one-way functions
Tomoyuki Morimae, Takashi Yamakawa
Tomoyuki Morimae, Takashi Yamakawa
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey
Yaqi Xu, Baofeng Wu, Dongdai Lin
Yaqi Xu, Baofeng Wu, Dongdai Lin
Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2
Baofeng Wu
Baofeng Wu
Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions
Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, Woosuk Choi
Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, Woosuk Choi
Computational Irrelevancy: Bridging the Gap between Pseudo- and Real Randomness in MPC Protocols
Nariyasu Heseri, Koji Nuida
Nariyasu Heseri, Koji Nuida
Hecate: Abuse Reporting in Secure Messengers with Sealed Sender
Rawane Issa, Nicolas Alhaddad, Mayank Varia
Rawane Issa, Nicolas Alhaddad, Mayank Varia
Divide and Funnel: a Scaling Technique for Mix-Networks
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs
Li Yao, Yilei Chen, Yu Yu
Li Yao, Yilei Chen, Yu Yu
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Valerie Fetzer, Marcel Keller, Sven Maier, Markus Raiber, Andy Rupp, Rebecca Schwerdt
Valerie Fetzer, Marcel Keller, Sven Maier, Markus Raiber, Andy Rupp, Rebecca Schwerdt
Making Private Function Evaluation Safer, Faster, and Simpler
Yi Liu, Qi Wang, Siu-Ming Yiu
Yi Liu, Qi Wang, Siu-Ming Yiu
On the security of OSIDH
Pierrick Dartois, Luca De Feo
Pierrick Dartois, Luca De Feo
Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes
Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner
Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner
Incompressible Cryptography
Jiaxin Guan, Daniel Wichs, Mark Zhandry
Jiaxin Guan, Daniel Wichs, Mark Zhandry
Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers
Matteo Campanelli, Felix Engelmann, Claudio Orlandi
Matteo Campanelli, Felix Engelmann, Claudio Orlandi
Improving Support-Minors rank attacks: applications to G$e$MSS and Rainbow
John Baena, Pierre Briaud, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone, Javier Verbel
John Baena, Pierre Briaud, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone, Javier Verbel
Cryptographic Symmetric Structures Based on Quasigroups
George Teseleanu
George Teseleanu
Traceable PRFs: Full Collusion Resistance and Active Security
Sarasij Maitra, David J. Wu
Sarasij Maitra, David J. Wu
Efficient and Post-Quantum Zero-Knowledge Proofs for Blockchain Confidential Transaction Protocols
Shang GAO, Tianyu ZHENG, Yu GUO, Bin XIAO
Shang GAO, Tianyu ZHENG, Yu GUO, Bin XIAO
Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead
Noga Ron-Zewi, Ron D. Rothblum
Noga Ron-Zewi, Ron D. Rothblum
Succinct Zero-Knowledge Batch Proofs for Set Accumulators
Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh
Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh
IronMask: Versatile Verification of Masking Security
Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb
Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb
The complexity of solving Weil restriction systems
Alessio Caminata, Michela Ceria, Elisa Gorla
Alessio Caminata, Michela Ceria, Elisa Gorla
Multi-Issuer Anonymous Credentials Without a Root Authority
Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki
Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki
Secure Publish-Process-Subscribe System for Dispersed Computing
Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright
Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright
Using data compression and randomization to build an unconditionally secure short key cipher
Boris Ryabko
Boris Ryabko
Approximate Distance-Comparison-Preserving Symmetric Encryption
Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill
Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill
Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
Towards a Simpler Lattice Gadget Toolkit
Shiduo Zhang, Yang Yu
Shiduo Zhang, Yang Yu
Cryptography from Pseudorandom Quantum States
Prabhanjan Ananth, Luowen Qian, Henry Yuen
Prabhanjan Ananth, Luowen Qian, Henry Yuen
Information Security in the Quantum Era. Threats to modern cryptography: Grover’s algorithm
Mihai-Zicu Mina, Emil Simion
Mihai-Zicu Mina, Emil Simion
Waldo: A Private Time-Series Database from Function Secret Sharing
Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
Identity-Based Matchmaking Encryption without Random Oracles
Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi
Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi
XTR and Tori
Martijn Stam
Martijn Stam
Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol
Alonso González, Hamy Ratoanina, Robin Salen, Setareh Sharifian, Vladimir Soukharev
Alonso González, Hamy Ratoanina, Robin Salen, Setareh Sharifian, Vladimir Soukharev
SoK: Blockchain Light Clients
Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
Efficient Set Membership Proofs using MPC-in-the-Head
Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
Grover on Present: Quantum Resource Estimation
Mostafizar Rahman, Goutam Paul
Mostafizar Rahman, Goutam Paul
Quantifiable Assurance: From IPs to Platforms
Bulbul Ahmed, Md Kawser Bepary, Nitin Pundir, Mike Borza, Oleg Raikhman, Amit Garg, Dale Donchin, Adam Cron, Mohamed A Abdel-moneum, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor
Bulbul Ahmed, Md Kawser Bepary, Nitin Pundir, Mike Borza, Oleg Raikhman, Amit Garg, Dale Donchin, Adam Cron, Mohamed A Abdel-moneum, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor
A Note on Non-Interactive Key Exchange from Code Equivalence
Lindsey Knowles, Edoardo Persichetti, Tovohery Randrianarisoa, Paolo Santini
Lindsey Knowles, Edoardo Persichetti, Tovohery Randrianarisoa, Paolo Santini
Financially Backed Covert Security
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
A compiler for multi-key homomorphic signatures for Turing machines
Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini
Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt
Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt
A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber
Huimin Li, Nele Mentens, Stjepan Picek
Huimin Li, Nele Mentens, Stjepan Picek
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
Loïc Ferreira
Loïc Ferreira
A Method for Securely Comparing Integers using Binary Trees
Anselme Tueno, Jonas Janneck
Anselme Tueno, Jonas Janneck
Sequential Indifferentiability of Confusion-Diffusion Networks
Qi Da, Shanjie Xu, Chun Guo
Qi Da, Shanjie Xu, Chun Guo
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes
Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang
Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang
STROBE: Stake-based Threshold Random Beacons
Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino
Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino
SecNDP: Secure Near-Data Processing with Untrusted Memory
Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee.
Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee.
Differential Cryptanalysis of WARP
Je Sen Teh, Alex Biryukov
Je Sen Teh, Alex Biryukov
New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON
Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap
Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap
A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over $\mathbb{F}_2$
Charles Bouillaguet, Claire Delaplace, Monika Trimoska
Charles Bouillaguet, Claire Delaplace, Monika Trimoska
00
Nguyen Thoi Minh Quan
Nguyen Thoi Minh Quan
Internet Security and Quantum Computing
Hilarie Orman
Hilarie Orman
Does Fully Homomorphic Encryption Need Compute Acceleration?
Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi
Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi
Synchronous Distributed Key Generation without Broadcasts
Nibesh Shrestha, Adithya Bhat, Aniket Kate, and Kartik Nayak
Nibesh Shrestha, Adithya Bhat, Aniket Kate, and Kartik Nayak
McEliece needs a Break -- Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD
Andre Esser, Alexander May, Floyd Zweydinger
Andre Esser, Alexander May, Floyd Zweydinger
Zero Knowledge Proofs towards Verifiable Decentralized AI Pipelines
Nitin Singh, Pankaj Dayama, Vinayaka Pandit
Nitin Singh, Pankaj Dayama, Vinayaka Pandit
Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits
Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Secure Sampling of Constant-Weight Words – Application to BIKE
Nicolas Sendrier
Nicolas Sendrier
Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis
Abderahmanne Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian
Abderahmanne Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian
Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis
Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah
Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah
SoK: Mitigation of Front-running in Decentralized Finance
Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Lorenzo Gentile
Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Lorenzo Gentile
A PKI-based Framework for Establishing Efficient MPC Channels
Daniel Masny, Gaven Watson
Daniel Masny, Gaven Watson
A Successful Subfield Lattice Attack on a Fully Homomorphic Encryption Scheme
Martha Norberg Hovd
Martha Norberg Hovd
A note on the QFT randomness spectral test a new approach of DST
Emil SIMION, Elena-Corina CIPU, Vasile-Laurențiu DOSAN, Andrei-Voicu TOMUȚ, Eugen Neacsu
Emil SIMION, Elena-Corina CIPU, Vasile-Laurențiu DOSAN, Andrei-Voicu TOMUȚ, Eugen Neacsu
On the IND-CCA1 Security of FHE Schemes
Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
On the Short Principal Ideal Problem over some real Kummer fields
Andrea Lesavourey, Thomas Plantard, Willy Susilo
Andrea Lesavourey, Thomas Plantard, Willy Susilo
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
Jeroen Delvaux
Jeroen Delvaux
Alpha-Rays: Key Extraction Attacks on Threshold ECDSA Implementations
Dmytro Tymokhanov, Omer Shlomovits
Dmytro Tymokhanov, Omer Shlomovits
Unicity distance of the Zodiac-340 cipher
Joachim von zur Gathen
Joachim von zur Gathen
Code-Based Non-Interactive Key Exchange Can Be Made
Zhuoran Zhang, Fangguo Zhang
Zhuoran Zhang, Fangguo Zhang
Succinct Publicly-Certifiable Proofs (or: Can a Blockchain Verify a Designated-Verifier Proof?)
Matteo Campanelli, Hamidreza Khoshakhlagh
Matteo Campanelli, Hamidreza Khoshakhlagh
Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications
Chao Chen, Fangguo Zhang
Chao Chen, Fangguo Zhang
A Note on the Post-Quantum Security of (Ring) Signatures
Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
High-order Polynomial Comparison and Masking Lattice-based Encryption
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
PEPFL: A Framework for a Practical and Efficient Privacy-Preserving Federated Learning
Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Benyu Zhang, Chengdong Liu, Zhiyong Hong, Yupu Hua
Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Benyu Zhang, Chengdong Liu, Zhiyong Hong, Yupu Hua
Privacy-preserving Federated Learning with Lightweight and Heterogeneity in IoT
Yange Chen, Baocang Wang, Rongxing Lu, Xu An Wang
Yange Chen, Baocang Wang, Rongxing Lu, Xu An Wang
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sánchez
Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sánchez
Solving degree, last fall degree, and related invariants
Alessio Caminata, Elisa Gorla
Alessio Caminata, Elisa Gorla
Factoring Primes to Factor Moduli: Backdooring and Distributed Generation of Semiprimes
Giuseppe Vitto
Giuseppe Vitto
Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings
Hiroki Furue and Momonari Kudo
Hiroki Furue and Momonari Kudo
An Optimized Quantum Implementation of ISD on Scalable Quantum Resources
Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano
Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano
Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V
ZhaoCun Zhou, DengGuo Feng, Bin Zhang
ZhaoCun Zhou, DengGuo Feng, Bin Zhang
An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography
Long Meng, Liqun Chen
Long Meng, Liqun Chen
Inflation-Tracking Proof-of-Work Crypto-Currencies
Charanjit S. Jutla
Charanjit S. Jutla
The most efficient indifferentiable hashing to elliptic curves of $j$-invariant $1728$
Dmitrii Koshelev
Dmitrii Koshelev
CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Two-party Oblivious Inference in the Cloud
Deepika Natarajan, Andrew Loveless, Wei Dai, Ronald Dreslinski
Deepika Natarajan, Andrew Loveless, Wei Dai, Ronald Dreslinski
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme
Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu
Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu
Post-Quantum Security of the Even-Mansour Cipher
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz
A New Isogeny Representation and Applications to Cryptography
Antonin Leroux
Antonin Leroux
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy
Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy
Modelling IBE-based Key Exchange Protocol using Tamarin Prover
Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
Marc Fischlin and Olga Sanina
Marc Fischlin and Olga Sanina
SHealS and HealS: isogeny-based PKEs from akey validation method for SIDH
Tako Boris Fouotsa, Christophe Petit
Tako Boris Fouotsa, Christophe Petit
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
On the Bottleneck Complexity of MPC with Correlated Randomness
Claudio Orlandi, Divya Ravi, Peter Scholl
Claudio Orlandi, Divya Ravi, Peter Scholl
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption
Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang
Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA
Guilherme Perin, Lichao Wu, Stjepan Picek
Guilherme Perin, Lichao Wu, Stjepan Picek
Practical Asynchronous Distributed Key Generation
Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren
Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren
Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation
David Heath, Vladimir Kolesnikov, Stanislav Peceny
David Heath, Vladimir Kolesnikov, Stanislav Peceny
SoK: Validating Bridges as a Scaling Solution for Blockchains
Patrick McCorry, Chris Buckland, Bennet Yee, Dawn Song
Patrick McCorry, Chris Buckland, Bennet Yee, Dawn Song
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing
Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Aydin Sezgin, Christof Paar
Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Aydin Sezgin, Christof Paar
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators
Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits
Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits
Cryptanalysis of a Type of White-Box Implementations of the SM4 Block Cipher
Jiqiang Lu, Jingyu Li
Jiqiang Lu, Jingyu Li
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang
Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang
ppSAT: Towards Two-Party Private SAT Solving
Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang
Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang
Orientations and the supersingular endomorphism ring problem
Benjamin Wesolowski
Benjamin Wesolowski
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks
Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam
Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam
Anonymous Authenticated Communication
Fabio Banfi, Ueli Maurer
Fabio Banfi, Ueli Maurer
High Order Side-Channel Security for Elliptic-Curve Implementations
Sonia Belaïd, Matthieu Rivain
Sonia Belaïd, Matthieu Rivain
Le Mans: Dynamic and Fluid MPC for Dishonest Majority
Rahul Rachuri, Peter Scholl
Rahul Rachuri, Peter Scholl
On Quantum Query Complexities of Collision-Finding in Non-Uniform Random Functions
Tianci Peng, Shujiao Cao, Rui Xue
Tianci Peng, Shujiao Cao, Rui Xue
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
Michael Rosenberg, Mary Maller, Ian Miers
Michael Rosenberg, Mary Maller, Ian Miers
Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature
Thibauld Feneuil, Antoine Joux, Matthieu Rivain
Thibauld Feneuil, Antoine Joux, Matthieu Rivain
Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon, Gregor Seiler
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon, Gregor Seiler
Ascon PRF, MAC, and Short-Input MAC
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer
Improved Security Bound of \textsf{(E/D)WCDM}
Nilanjan Datta, Avijit Dutta, Kushankur Dutta
Nilanjan Datta, Avijit Dutta, Kushankur Dutta
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128 (Full version)
Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang
Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang
Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys
Stefano Tessaro, Xihu Zhang
Stefano Tessaro, Xihu Zhang
Multicast Key Agreement, Revisited
Alexander Bienstock, Yevgeniy Dodis, Yi Tang
Alexander Bienstock, Yevgeniy Dodis, Yi Tang
ABBY: Automating leakage modeling for side-channels analysis
Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina
Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina
Impeccable Circuits III
Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi
Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations
Tomer Ashur, Mohsin Khan, Kaisa Nyberg
Tomer Ashur, Mohsin Khan, Kaisa Nyberg
Towards Using Blockchain Technology to Prevent Diploma Fraud
Qiang Tang
Qiang Tang
Practical, Round-Optimal Lattice-Based Blind Signatures
Shweta Agrawal, Elena Kirshanova, Damien Stehle, Anshu Yadav
Shweta Agrawal, Elena Kirshanova, Damien Stehle, Anshu Yadav
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
Sebastian Paul, Patrik Scheible, Friedrich Wiemer
Sebastian Paul, Patrik Scheible, Friedrich Wiemer
Concurrently Composable Non-Interactive Secure Computation
Andrew Morgan, Rafael Pass
Andrew Morgan, Rafael Pass
Quantum Time/Memory/Data Tradeoff Attacks
Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo
Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo
Facial Template Protection via Lattice-based Fuzzy Extractors
Kaiyi Zhang, Hongrui Cui, Yu Yu
Kaiyi Zhang, Hongrui Cui, Yu Yu
RSA Key Recovery from Digit Equivalence Information
Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
Performance bounds for QC-MDPC codes decoders
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini
Diving Deep into the Weak Keys of Round Reduced Ascon
Raghvendra Rohit, Santanu Sarkar
Raghvendra Rohit, Santanu Sarkar
Accelerator for Computing on Encrypted Data
Sujoy Sinha Roy, Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo
Sujoy Sinha Roy, Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo
How to Claim a Computational Feat
Clémence Chevignard, Rémi Géraud-Stewart, Antoine Houssais, David Naccache, Edmond de Roffignac
Clémence Chevignard, Rémi Géraud-Stewart, Antoine Houssais, David Naccache, Edmond de Roffignac
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
Time-memory Trade-offs for Saber+ on Memory-constrained RISC-V
Jipeng Zhang, Junhao Huang, Zhe Liu, Sujoy Sinha Roy
Jipeng Zhang, Junhao Huang, Zhe Liu, Sujoy Sinha Roy
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev
Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
Ziaur Rahman, Ibrahim Khalil, Mousumi Sumi
Ziaur Rahman, Ibrahim Khalil, Mousumi Sumi
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui
Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui
Just how hard are rotations of $\mathbb{Z}^n$? Algorithms and cryptography with the simplest lattice
Huck Bennett, Atul Ganju, Pura Peetathawatchai, Noah Stephens-Davidowitz
Huck Bennett, Atul Ganju, Pura Peetathawatchai, Noah Stephens-Davidowitz
SoK: Plausibly Deniable Storage
Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion
Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion
Improving Deep Learning Networks for Profiled Side-Channel Analysis Using Performance Improvement Techniques
Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso
Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso
Longest Chain Consensus Under Bandwidth Constraint
Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh
Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh
Information Dispersal with Provable Retrievability for Rollups
Kamilla Nazirkhanova, Joachim Neu, David Tse
Kamilla Nazirkhanova, Joachim Neu, David Tse
Post-Quantum Zero Knowledge, Revisited (or: How to do Quantum Rewinding Undetectably)
Alex Lombardi, Fermi Ma, Nicholas Spooner
Alex Lombardi, Fermi Ma, Nicholas Spooner
An End-to-End Bitstream Tamper Attack Against Flip-Chip FPGAs
Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Revisiting the Security of COMET Authenticated Encryption Scheme
Shay Gueron, Ashwin Jha, Mridul Nandi
Shay Gueron, Ashwin Jha, Mridul Nandi
Lightweight Swarm Authentication
George Teseleanu
George Teseleanu
Route Discovery in Private Payment Channel Networks
Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, and Michelle Yeo
Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, and Michelle Yeo
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost
Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah
Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah
PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher
Shotaro Miyashita, Ryoma Ito, and Atsuko Miyaji
Shotaro Miyashita, Ryoma Ito, and Atsuko Miyaji
SoK: Tokenization on Blockchain
Gang Wang, Mark Nixon
Gang Wang, Mark Nixon
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Manicillas Lopez, Mridul Nandi
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Manicillas Lopez, Mridul Nandi
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n
Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger
Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger
On the Download Rate of Homomorphic Secret Sharing
Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters
Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning
Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao
Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
Alex Ozdemir, Dan Boneh
Alex Ozdemir, Dan Boneh
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hosein Hadipour and Maria Eichlseder
Hosein Hadipour and Maria Eichlseder
An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH
Kaizhan Lin, Weize Wang, Lin Wang, Chang-An Zhao
Kaizhan Lin, Weize Wang, Lin Wang, Chang-An Zhao
CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication
Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
Amortizing Rate-1 OT and Applications to PIR and PSI
Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, Peihan Miao
Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, Peihan Miao
An Improved Range Proof with Base-3 Construction
Esra Günsay, Cansu Betin Onur, Murat Cenk
Esra Günsay, Cansu Betin Onur, Murat Cenk
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives
Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang
Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang
On Cryptocurrency Wallet Design
Ittay Eyal
Ittay Eyal
Security evaluation against side-channel analysis at compilation time
Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley
Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley
Ark of the ECC: An open-source ECDSA power analysis attack on a FPGA based Curve P-256 implementation
Jean-Pierre Thibault, Colin O’Flynn, Alex Dewar
Jean-Pierre Thibault, Colin O’Flynn, Alex Dewar
Practical Garbled RAM: GRAM with $O(\log^2 n)$ Overhead
David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs
Valence Cristiani, Maxime Lecomte, Philippe Maurine
Valence Cristiani, Maxime Lecomte, Philippe Maurine
HOLMES: Efficient Distribution Testing for Secure Collaborative Learning
Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Ada Popa
Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Ada Popa
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, and Takashi Yamakawa
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, and Takashi Yamakawa
Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System
Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
Clarion: Anonymous Communication from Multiparty Shuffling Protocols
Saba Eskandarian, Dan Boneh
Saba Eskandarian, Dan Boneh
InterTrust: Towards an Efficient Blockchain Interoperability Architecture with Trusted Services
Gang Wang, Mark Nixon
Gang Wang, Mark Nixon
BLOCK CIPHER DEFINED BY MATRIX PRESENTATION OF QUASIGROUPS
Smile Markovski, Vesna Dimitrova, Zlatka Trajcheska, Marija Petkovska, Mile Kostadinoski, Damjan Buhov
Smile Markovski, Vesna Dimitrova, Zlatka Trajcheska, Marija Petkovska, Mile Kostadinoski, Damjan Buhov
Compressed SIKE Round 3 on ARM Cortex-M4
Mila Anastasova, Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
Mila Anastasova, Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
Pattern Devoid Cryptography
Gideon Samid
Gideon Samid
More Lessons: Analysis of PUF-based Authentication Protocols for IoT
Karim Lounis, Mohammad Zulkernine
Karim Lounis, Mohammad Zulkernine
High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Viet Ba Dang, Kamyar Mohajerani, Kris Gaj
Viet Ba Dang, Kamyar Mohajerani, Kris Gaj
Parallel Quantum Addition for Korean Block Cipher
Kyungbae Jang, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, Hwajeong Seo
Kyungbae Jang, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, Hwajeong Seo
z-OTS: a one-time hash-based digital signaturescheme with fast verification
Amos Zheng, Marcos A. Simplicio Jr.
Amos Zheng, Marcos A. Simplicio Jr.
EVA Improved: Compiler and Extension Library for CKKS
Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi
Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi
CCA SecureA Posteriori Openable Encryption in the Standard Model
Xavier Bultel
Xavier Bultel
Interaction-Preserving Compilers for Secure Computation
Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes
Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes
Strong and Tight Security Guarantees against Integral Distinguishers
Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
Alisa Pankova, Jan Willemson
Alisa Pankova, Jan Willemson
Succinct Erasure Coding Proof Systems
Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
Improved Lattice-Based Mix-Nets for Electronic Voting
Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik
Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik
Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms
Navid Nasr Esfahani, Douglas Stinson
Navid Nasr Esfahani, Douglas Stinson
GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
Veri
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
On the efficiency of a general attack against the MOBS cryptosystem
Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti
Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti
VASA: Vector AES Instructions for Security Applications
Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
Feng Hao, Paul C. van Oorschot
Feng Hao, Paul C. van Oorschot
The Hidden Lattice Problem
Luca Notarnicola, Gabor Wiese
Luca Notarnicola, Gabor Wiese
Precio: Private Aggregate Measurement via Oblivious Shuffling
F. Betül Durak, Chenkai Weng, Erik Anderson, Kim Laine, and Melissa Chase
F. Betül Durak, Chenkai Weng, Erik Anderson, Kim Laine, and Melissa Chase
Estimating the Effectiveness of Lattice Attacks
Kotaro Abe, Makoto Ikeda
Kotaro Abe, Makoto Ikeda
Accelerating the Delfs-Galbraith algorithm with fast subfield root detection
Maria Corte-Real Santos, Craig Costello, Jia Shi
Maria Corte-Real Santos, Craig Costello, Jia Shi
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking
Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert
Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert
Mitaka: a simpler, parallelizable, maskable variant of Falcon
Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer
Robin M. Berger, Marcel Tiepelt
Robin M. Berger, Marcel Tiepelt
A Practical Forward-Secure DualRing
Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
The Optimal Error Resilience of Interactive Communication Over Binary Channels
Meghal Gupta, Rachel Yun Zhang
Meghal Gupta, Rachel Yun Zhang
Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption
Meghal Gupta, Yael Tauman Kalai, Rachel Zhang
Meghal Gupta, Yael Tauman Kalai, Rachel Zhang
Extractors: Low Entropy Requirements Colliding With Non-Malleability
Divesh Aggarwal, Eldon Chung, Maciej Obremski
Divesh Aggarwal, Eldon Chung, Maciej Obremski
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher
Amirhossein Ebrahimi, Francesco Regazzoni, Paolo Palmieri
Amirhossein Ebrahimi, Francesco Regazzoni, Paolo Palmieri
Zarcanum: A Proof-of-Stake Scheme for Confidential Transactions with Hidden Amounts
sowle, koe
sowle, koe
Multisignature with double threshold condition in the blockchain and its application to and strong keys generating
Ruslan Skuratovskii, Alexandr Kalenyk
Ruslan Skuratovskii, Alexandr Kalenyk
Multivariate public key cryptography with polynomial composition
Emile Hautefeuille
Emile Hautefeuille
Circuit-based PSI for Covid-19 Risk Scoring
Leonie Reichert, Marcel Pazelt, Björn Scheuermann
Leonie Reichert, Marcel Pazelt, Björn Scheuermann
Foundations of Transaction Fee Mechanism Design
Hao Chung, Elaine Shi
Hao Chung, Elaine Shi
Computational self-testing for entangled magic states
Akihiro Mizutani, Yuki Takeuchi, Ryo Hiromasa, Yusuke Aikawa, Seiichiro Tani
Akihiro Mizutani, Yuki Takeuchi, Ryo Hiromasa, Yusuke Aikawa, Seiichiro Tani
Improving Cryptography Based On Entropoids
Anisha Mukherjee, Saibal K. Pal
Anisha Mukherjee, Saibal K. Pal
Efficient Searchable Symmetric Encryption for Join Queries
Charanjit Jutla, Sikhar Patranabis
Charanjit Jutla, Sikhar Patranabis
Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE
Saikrishna Badrinarayanan, Rex Fernando, Amit Sahai
Saikrishna Badrinarayanan, Rex Fernando, Amit Sahai
New Indifferentiability Security Proof of MDPH Hash Function
Chun Guo, Tetsu Iwata, Kazuhiko Minematsu
Chun Guo, Tetsu Iwata, Kazuhiko Minematsu
LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions
Quentin L. Meunier, Etienne Pons, Karine Heydemann
Quentin L. Meunier, Etienne Pons, Karine Heydemann
On the Round Complexity of Black-box Secure MPC
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
On semigroups of multivariate transformations constructed in terms of time dependent linguistic graphs and solutions of Post Quantum Multivariate Cryptography.
V. Ustimenko
V. Ustimenko
Themis: Fast, Strong Order-Fairness in Byzantine Consensus
Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan
Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan
Polynomial-time targeted attacks on coin tossing for any number of corruptions
Omid Etesami, Ji Gao, Saeed Mahloujifar, Mohammad Mahmoody
Omid Etesami, Ji Gao, Saeed Mahloujifar, Mohammad Mahmoody
3-Party Distributed ORAM from Oblivious Set Membership
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
Prime pairing in algorithms searching for smooth group order
Pavel Atnashev, George Woltman
Pavel Atnashev, George Woltman
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata Aikata, Ahmet Can Mert, David Jacquemin, Amitabh Das, Donald Matthews, Santosh Ghosh, Sujoy Sinha Roy
Aikata Aikata, Ahmet Can Mert, David Jacquemin, Amitabh Das, Donald Matthews, Santosh Ghosh, Sujoy Sinha Roy
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
Itai Dinur, Nathan Keller, and Ohad Klein
Itai Dinur, Nathan Keller, and Ohad Klein
Privacy-preserving Identity Management System
Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim
Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim
QC-MDPC codes DFR and the IND-CCA security of BIKE
Valentin Vasseur
Valentin Vasseur
An In-Depth Symbolic Security Analysis of the ACME Standard
Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Tim Wuertele
Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Tim Wuertele
Server-Aided Continuous Group Key Agreement
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud
Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud
Russian Federal Remote E-voting Scheme of 2021 -- Protocol Description and Analysis
Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
A State-Separating Proof for Yao’s Garbling Scheme
Chris Brzuska and Sabine Oechsner
Chris Brzuska and Sabine Oechsner
A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj
Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj
High-Performance Hardware Implementation of CRYSTALS-Dilithium
Luke Beckwith, Duc Tri Nguyen, Kris Gaj
Luke Beckwith, Duc Tri Nguyen, Kris Gaj
Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier
Sungwook Kim, Hyeonbum Lee, Jae Hong Seo
Sungwook Kim, Hyeonbum Lee, Jae Hong Seo
One-more Unforgeability of Blind ECDSA
Xianrui Qin, Cailing Cai, Tsz Hon Yuen
Xianrui Qin, Cailing Cai, Tsz Hon Yuen
Secure Featurization and Applications to Secure Phishing Detection
Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu
Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen
Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen
Batch point compression in the context of advanced pairing-based protocols
Dmitrii Koshelev
Dmitrii Koshelev
Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers
Lukas Aumayr, Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei
Lukas Aumayr, Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei
Streamlined NTRU Prime on FPGA
Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen
Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation
Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
On the {\sf P/poly} Validity of the Agr17 FE Scheme
Yupu Hu, Siyue Dong, and Baocang Wang
Yupu Hu, Siyue Dong, and Baocang Wang
Length-preserving encryption with HCTR2
Paul Crowley, Nathan Huckleberry, and Eric Biggers
Paul Crowley, Nathan Huckleberry, and Eric Biggers
Improved Circuit-based PSI via Equality Preserving Compression
Kyoohyung Han, Dukjae Moon, Yongha Son
Kyoohyung Han, Dukjae Moon, Yongha Son
An Addendum to the ZUC-256 Stream Cipher
ZUC Design Team
ZUC Design Team
Incremental Offline/Online PIR (extended version)
Yiping Ma, Ke Zhong, Tal Rabin, and Sebastian Angel
Yiping Ma, Ke Zhong, Tal Rabin, and Sebastian Angel
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu
Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu
Efficient Representation of Numerical Optimization Problems for SNARKs
Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods
Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a
ZhaoCun Zhou, DengGuo Feng, Bin Zhang
ZhaoCun Zhou, DengGuo Feng, Bin Zhang
The Language's Impact on the Enigma Machine
Daniel Matyas Perendi, Prosanta Gope
Daniel Matyas Perendi, Prosanta Gope
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds
Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
Gustavo Banegas, Thomas Debris-Alazard, Milena Nedeljković, Benjamin Smith
Gustavo Banegas, Thomas Debris-Alazard, Milena Nedeljković, Benjamin Smith
Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption
Chinmoy Biswas, Ratna Dutta
Chinmoy Biswas, Ratna Dutta
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
Yi Liu, Qi Wang, Siu-Ming Yiu
Yi Liu, Qi Wang, Siu-Ming Yiu
Reviewing ISO/IEC Standard for Time-stamping Services
Long Meng, Liqun Chen
Long Meng, Liqun Chen
Non-randomness of S-unit lattices
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Public-Key Quantum Money with a Classical Bank
Omri Shmueli
Omri Shmueli
On Unpadded NTRU Quantum (In)Security
Théodore Conrad-Frenkiel, Rémi Géraud-Stewart, David Naccache
Théodore Conrad-Frenkiel, Rémi Géraud-Stewart, David Naccache
Improving First-Order Threshold Implementations of SKINNY
Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik
Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik
PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions
Yang Wang, Yanmin Zhao, Mingqiang Wang
Yang Wang, Yanmin Zhao, Mingqiang Wang
Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees
Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen
Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography
Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel van Beirendonck, Ingrid Verbauwhede
Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel van Beirendonck, Ingrid Verbauwhede
Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge
Aleksei Udovenko and Giuseppe Vitto
Aleksei Udovenko and Giuseppe Vitto
Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting
Fabian Hertel, Nicolas Huber, Jonas Kittelberger, Ralf Kuesters, Julian Liedtke, Daniel Rausch
Fabian Hertel, Nicolas Huber, Jonas Kittelberger, Ralf Kuesters, Julian Liedtke, Daniel Rausch
With a Little Help from My Friends: Constructing Practical Anonymous Credentials
Lucjan Hanzlik, Daniel Slamanig
Lucjan Hanzlik, Daniel Slamanig
Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets
Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang
Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang
How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption
Koji Nuida
Koji Nuida
SME: Scalable Masking Extensions
Ben Marshall, Dan Page
Ben Marshall, Dan Page
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers
Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai
Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
Guilherme Perin, Lichao Wu, Stjepan Picek
Guilherme Perin, Lichao Wu, Stjepan Picek
Three Attacks on Proof-of-Stake Ethereum
Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse
Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse
A General Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Key-Aggregation
Hyesun Kwak, Dongwon Lee, Yongsoo Song, and Sameer Wagh
Hyesun Kwak, Dongwon Lee, Yongsoo Song, and Sameer Wagh
Analysis of Client-side Security for Long-term Time-stamping Services
Long Meng, Liqun Chen
Long Meng, Liqun Chen
Franchised Quantum Money
Bhaskar Roberts, Mark Zhandry
Bhaskar Roberts, Mark Zhandry
Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming
Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, Stefano Tessaro
Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, Stefano Tessaro
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis
Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs
Keitaro Hashimoto, Shuichi Katsumata, Eamonn Postlethwaite, Thomas Prest, Bas Westerbaan
Keitaro Hashimoto, Shuichi Katsumata, Eamonn Postlethwaite, Thomas Prest, Bas Westerbaan
Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG)
Veronika Kuchta, Joseph K. Liu
Veronika Kuchta, Joseph K. Liu
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols
Tianyu Zheng, Shang Gao, Yubo Song, Bin Xiao
Tianyu Zheng, Shang Gao, Yubo Song, Bin Xiao
Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments
Dakshita Khurana
Dakshita Khurana
Efficient Adaptively-Secure Byzantine Agreement for Long Messages
Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak
Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak
Guide to Fully Homomorphic Encryption over the [Discretized] Torus
Marc Joye
Marc Joye
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks
Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo
Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe
Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe
Iterated Inhomogeneous Polynomials
Jiaxin Guan, Mark Zhandry
Jiaxin Guan, Mark Zhandry
Universally Composable Almost-Everywhere Secure Computation
Nishanth Chandran, Pouyan Forghani, Juan Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas
Nishanth Chandran, Pouyan Forghani, Juan Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
Craig Gentry, Shai Halevi, Vadim Lyubashevsky
Craig Gentry, Shai Halevi, Vadim Lyubashevsky
NTT software optimization using an extended Harvey butterfly
Jonathan Bradbury, Nir Drucker, Marius Hillenbrand
Jonathan Bradbury, Nir Drucker, Marius Hillenbrand
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials
Reo Eriguchi, Koji Nuida
Reo Eriguchi, Koji Nuida
Rethinking Modular Multi-Exponentiation in Real-World Applications
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
Fiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)
Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
Differential fault attack on DEFAULT
Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar
Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar
A note on a Claim of Eldar & Hallgren: LLL already solves it
Léo Ducas, Wessel van Woerden
Léo Ducas, Wessel van Woerden
UC Secure Private Branching Program and Decision Tree Evaluation
Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren
Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren
DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs
Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Angshuman Karmakar, Jose Maria Bermudo Mera, Ramachandra Achar
Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Angshuman Karmakar, Jose Maria Bermudo Mera, Ramachandra Achar
Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128
Tarun Yadav, Manoj Kumar
Tarun Yadav, Manoj Kumar
Triplicate functions
Lilya Budaghyan, Ivana Ivkovic, Nikolay Kaleyski
Lilya Budaghyan, Ivana Ivkovic, Nikolay Kaleyski
Efficient Threshold-Optimal ECDSA
Michaella Pettit
Michaella Pettit
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson
Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson
Log-$\mathcal{S}$-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP
Olivier Bernard, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois
Olivier Bernard, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois
MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP
Jung Hee Cheon, Dongwoo Kim, Keewoo Lee
Jung Hee Cheon, Dongwoo Kim, Keewoo Lee
ZPiE: Zero-knowledge Proofs in Embedded systems
Xavier Salleras, Vanesa Daza
Xavier Salleras, Vanesa Daza
Multi-Authority ABE, Revisited
Miguel Ambrona, Romain Gay
Miguel Ambrona, Romain Gay
Orca: Blocklisting in Sender-Anonymous Messaging
Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol
Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
Fiat-Shamir Transformation of Multi-Round Interactive Proofs
Thomas Attema, Serge Fehr, Michael Klooß
Thomas Attema, Serge Fehr, Michael Klooß
Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks
Ivan Damgård, Daniel Escudero, Antigoni Polychroniadou
Ivan Damgård, Daniel Escudero, Antigoni Polychroniadou
How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures
Elizabeth Crites, Chelsea Komlo, Mary Maller
Elizabeth Crites, Chelsea Komlo, Mary Maller
Information-Combining Differential Fault Attacks on DEFAULT
Marcel Nageler, Christoph Dobraunig, and Maria Eichlseder
Marcel Nageler, Christoph Dobraunig, and Maria Eichlseder
Highly Efficient OT-Based Multiplication Protocols
Iftach Haitner, Nikolaos Makriyannis, Samuel Ranellucci, Eliad Tsfadia
Iftach Haitner, Nikolaos Makriyannis, Samuel Ranellucci, Eliad Tsfadia
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones
Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas
Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas
A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test
Kyoichi Asano, Keita Emura, Atsushi Takayasu, and Yohei Watanabe
Kyoichi Asano, Keita Emura, Atsushi Takayasu, and Yohei Watanabe
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments
Dimitris Mouris, Nektarios Georgios Tsoutsos
Dimitris Mouris, Nektarios Georgios Tsoutsos
Faster Isogenies for Quantum-Safe SIKE
Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
Isogeny-based Group Signatures and Accountable Ring Signatures in QROM
Kai-Min Chung, Yao-Ching Hsieh, Mi-Ying Huang, Yu-Hsuan Huang, Tanja Lange, and Bo-Yin Yang
Kai-Min Chung, Yao-Ching Hsieh, Mi-Ying Huang, Yu-Hsuan Huang, Tanja Lange, and Bo-Yin Yang
Hybrid Steganography deployed in hospitals for compression of medical images
Avinash Vijayarangan, K. R. Sekar, R. Srikanth
Avinash Vijayarangan, K. R. Sekar, R. Srikanth
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient
Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore
Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore
Collusion Resistant Revocable Ring Signatures and Group Signatures from Hard Homogeneous Spaces
Yi-Fu Lai, Samuel Dobson
Yi-Fu Lai, Samuel Dobson
Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber
Vadim Lyubashevsky, Damien Stehlé
Vadim Lyubashevsky, Damien Stehlé
On Entropy and Bit Patterns of Ring Oscillator Jitter
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Practical Multiple Persistent Faults Analysis
Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
Plumo: An Ultralight Blockchain Client
Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More
Behzad Abdolmaleki, Daniel Slamanig
Behzad Abdolmaleki, Daniel Slamanig
Families of SNARK-friendly 2-chains of elliptic curves
Youssef El Housni, Aurore Guillevic
Youssef El Housni, Aurore Guillevic
The Hardness of LWE and Ring-LWE: A Survey
David Balbás
David Balbás
Two-Round Concurrently Secure Two-Party Computation
Behzad Abdolmaleki, Giulio Malavolta, Ahmadreza Rahimi
Behzad Abdolmaleki, Giulio Malavolta, Ahmadreza Rahimi
Structural Mutual Information and Its Application
Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma
Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma
Curve448 on 32-bit ARM Cortex-M4
Hwajeong Seo, Reza Azarderakhsh
Hwajeong Seo, Reza Azarderakhsh
SoK: On the Security of Cryptographic Problems from Linear Algebra
Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
Noise-Tolerant Quantum Tokens for MAC
Amit Behera, Or Sattath, Uriel Shinar
Amit Behera, Or Sattath, Uriel Shinar
A Thorough Treatment of Highly-Efficient NTRU Instantiations
Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing
Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler
Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler
Generalized Proof of Liabilities
Yan Ji, Konstantinos Chalkias
Yan Ji, Konstantinos Chalkias
Updatable Private Set Intersection
Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie
Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie
Beyond quadratic speedups in quantum attacks on symmetric schemes
Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras
Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras
TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security
Zhaomin Yang, Xiang Xie, Huajie Shen, Shiying Chen, Jun Zhou
Zhaomin Yang, Xiang Xie, Huajie Shen, Shiying Chen, Jun Zhou
WeStat: a Privacy-Preserving Mobile Data Usage Statistics System
Sébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello
Sébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair
Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan
Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW
Hanlin Liu, Yu Yu
Hanlin Liu, Yu Yu
Efficient Functional Commitments: How to Commit to a Private Function
Dan Boneh, Wilson Nguyen, Alex Ozdemir
Dan Boneh, Wilson Nguyen, Alex Ozdemir
Anonymous Whistleblowing over Authenticated Channels
Thomas Agrikola, Geoffroy Couteau, Sven Maier
Thomas Agrikola, Geoffroy Couteau, Sven Maier
TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption
Eik List
Eik List
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms
Luk Bettale, Simon Montoya, Guénaël Renault
Luk Bettale, Simon Montoya, Guénaël Renault
Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption)
Dongxi Liu
Dongxi Liu
Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping
Zeyu Liu, Daniele Micciancio, Yuriy Polyakov
Zeyu Liu, Daniele Micciancio, Yuriy Polyakov
Improved Computational Extractors and their Applications
Dakshita Khurana, Akshayaram Srinivasan
Dakshita Khurana, Akshayaram Srinivasan
Integer Functions Suitable for Homomorphic Encryption over Finite Fields
Ilia Iliashenko, Christophe Nègre, Vincent Zucca
Ilia Iliashenko, Christophe Nègre, Vincent Zucca
Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0
Aayush Jain, Huijia Lin, Amit Sahai
Aayush Jain, Huijia Lin, Amit Sahai
Paradoxical Compression with Verifiable Delay Functions
Thomas Pornin
Thomas Pornin
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography
Léo Ducas, Wessel van Woerden
Léo Ducas, Wessel van Woerden
Communicating Through Subliminal-Free Signatures
George Teseleanu
George Teseleanu
On the security of ECDSA with additive key derivation and presignatures
Jens Groth, Victor Shoup
Jens Groth, Victor Shoup
Trail Search with CRHS Equations
John Petter Indrøy, Håvard Raddum
John Petter Indrøy, Håvard Raddum
Cross Subkey Side Channel Analysis Based on Small Samples
Fanliang Hu, Huanyu Wang, Junnian Wang
Fanliang Hu, Huanyu Wang, Junnian Wang
Secure Multiparty Computation in the Bounded Storage Model
Jiahui Liu, Satyanarayana Vusirikala
Jiahui Liu, Satyanarayana Vusirikala
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
Mo Zhang, Eduard Marin, David Oswald, Dave Singelee
Mo Zhang, Eduard Marin, David Oswald, Dave Singelee
Decentralized Multi-Authority ABE for NC^1 from Computational-BDH
Pratish Datta, Ilan Komargodski, Brent Waters
Pratish Datta, Ilan Komargodski, Brent Waters
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
Kamil Kluczniak
Kamil Kluczniak
Anonymity of NIST PQC Round 3 KEMs
Keita Xagawa
Keita Xagawa
A New Adaptive Attack on SIDH
Tako Boris Fouotsa, Christophe Petit
Tako Boris Fouotsa, Christophe Petit
Blockchain-based Privacy-preserving Fair Data Trading Protocol
Yao Jiang Galteland, Shuang Wu
Yao Jiang Galteland, Shuang Wu
Faster Key Generation of Supersingular Isogeny Diffie-Hellman
Kaizhan Lin, Fangguo Zhang, Chang-An Zhao
Kaizhan Lin, Fangguo Zhang, Chang-An Zhao
Maliciously-Secure MrNISC in the Plain Model
Rex Fernando, Aayush Jain, Ilan Komargodski
Rex Fernando, Aayush Jain, Ilan Komargodski
Supersingular Isogeny-Based Ring Signature
Maryam Sheikhi Garjan, N. Gamze Orhon Kılıç, Murat Cenk
Maryam Sheikhi Garjan, N. Gamze Orhon Kılıç, Murat Cenk
m-Stability: Threshold Security Meets Transferable Utility
Osman Biçer, Burcu Yıldız, and Alptekin Küpçü
Osman Biçer, Burcu Yıldız, and Alptekin Küpçü
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment
Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores
Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores
Certified Everlasting Zero-Knowledge Proof for QMA
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries
Amin Rezaei, Jie Gu, Hai Zhou
Amin Rezaei, Jie Gu, Hai Zhou
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability
Ashley Fraser, Lydia Garms, Anja Lehmann
Ashley Fraser, Lydia Garms, Anja Lehmann
Power analysis attack on Kyber
Alexandre Karlov, Natacha Linard de Guertechin
Alexandre Karlov, Natacha Linard de Guertechin
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu
Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu
Faster Final Exponentiation on the KSS18 Curve
Shiping Cai, Zhi Hu, Chang-An Zhao
Shiping Cai, Zhi Hu, Chang-An Zhao
No-Commit Proofs: Defeating Livelock in BFT
Neil Giridharan, Heidi Howard, Ittai Abraham, Natacha Crooks, Alin Tomescu
Neil Giridharan, Heidi Howard, Ittai Abraham, Natacha Crooks, Alin Tomescu
In-depth Analysis of Side-Channel Countermeasures for CRYSTALS-Kyber Message Encoding on ARM Cortex-M4
Hauke Malte Steffen, Lucie Johanna Kogelheide, Timo Bartkewitz
Hauke Malte Steffen, Lucie Johanna Kogelheide, Timo Bartkewitz
Probabilistic micropayments with transferability
Taisei Takahashi, Akira Otsuka
Taisei Takahashi, Akira Otsuka
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin
Pratish Datta, Tapas Pal
Pratish Datta, Tapas Pal
An Open Problem on the Bentness of Mesnager’s Functions
Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
Black-Box Accumulation Based on Lattices
Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch, Astrid Ottenhues, Markus Raiber
Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch, Astrid Ottenhues, Markus Raiber
Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare
Sajad Meisami, Mohammad Beheshti-Atashgah, Mohammad Reza Aref
Sajad Meisami, Mohammad Beheshti-Atashgah, Mohammad Reza Aref
An Isogeny-Based ID Protocol Using Structured Public Keys
Karim Baghery, Daniele Cozzo, Robi Pedersen
Karim Baghery, Daniele Cozzo, Robi Pedersen
Report and Trace Ring Signatures
Ashley Fraser, Elizabeth A. Quaglia
Ashley Fraser, Elizabeth A. Quaglia
Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper
Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper
Post-Quantum Authentication with Lightweight Cryptographic Primitives
Henrique Faria, José Manuel Valença
Henrique Faria, José Manuel Valença
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
Partition Oracles from Weak Key Forgeries
Marcel Armour, Carlos Cid
Marcel Armour, Carlos Cid
Improved Quantum Hypercone Locality Sensitive Filtering in Lattice Sieving
Max Heiser
Max Heiser
Quantum Money from Quaternion Algebras
Daniel M. Kane, Shahed Sharif, Alice Silverberg
Daniel M. Kane, Shahed Sharif, Alice Silverberg
TIDE: A novel approach to constructing timed-release encryption
Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia
Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion
Kavya Sreedhar, Mark Horowitz, Christopher Torng
Kavya Sreedhar, Mark Horowitz, Christopher Torng
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation
Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval
Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval
Large-Scale Non-Interactive Threshold Cryptosystems in the YOSO Model
Andreas Erwig, Sebastian Faust, Siavash Riahi
Andreas Erwig, Sebastian Faust, Siavash Riahi
Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF
Jorge Chavez-Saab, Francisco Rodríguez Henríquez, Mehdi Tibouchi
Jorge Chavez-Saab, Francisco Rodríguez Henríquez, Mehdi Tibouchi
FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan, Serge Vaudenay
Loïs Huguenin-Dumittan, Serge Vaudenay
The Exact Security of BIP32 Wallets
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
Post-quantum Efficient Proof for Graph 3-Coloring Problem
Ehsan Ebrahimi
Ehsan Ebrahimi
Convexity of division property transitions: theory, algorithms and compact models
Aleksei Udovenko
Aleksei Udovenko
APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations
Song Bian, Dur E Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato
Song Bian, Dur E Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato
Parallel Verification of Serial MAC and AE Modes
Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo
Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo
On the Claims of Weak Block Synchronization in Bitcoin
Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang
Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang
Leveled Homomorphic Encryption Schemes with Hensel Codes
David W. H. A. da Silva, Luke Harmon, Gaetan Delavignette, and Carlos Araujo
David W. H. A. da Silva, Luke Harmon, Gaetan Delavignette, and Carlos Araujo
Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage
Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
Quantum Diffie-Hellman Key Exchange
Dirk Fischer
Dirk Fischer
A survey of algorithmic methods in IC reverse engineering
Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosara, Avi Mendelson, Christof Paar
Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosara, Avi Mendelson, Christof Paar
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
On the Security and Performance of Blockchain Sharding
Runchao Han, Jiangshan Yu, Haoyu Lin, Shiping Chen, Paulo Esteves-Veríssimo
Runchao Han, Jiangshan Yu, Haoyu Lin, Shiping Chen, Paulo Esteves-Veríssimo
Counterexample to OWF Self-XOR Being a DOWF
Nathan Geier
Nathan Geier
A Tight Computational Indistinguishability Bound for Product Distributions
Nathan Geier
Nathan Geier
OpenSquare: Decentralized Repeated Modular Squaring Service
Sri AravindaKrishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
Sri AravindaKrishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
Efficient CCA Timed Commitments in Class Groups
Sri AravindaKrishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
Sri AravindaKrishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
Computing the Jacobi symbol using Bernstein-Yang
Mike Hamburg
Mike Hamburg
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited
Yevgeniy Dodis, Willy Quach, Daniel Wichs
Yevgeniy Dodis, Willy Quach, Daniel Wichs
Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio
Antonio Faonio
Simulation-Based Bi-Selective Opening Security for Public Key Encryption
Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng
Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng
Tight Quantum Indifferentiability of a Rate-1/3 Compression Function
Jan Czajkowski
Jan Czajkowski
Update-Sensitive Structured Encryption with Backward Privacy
Zhiqiang Wu, Jin Wang, Keqin Li
Zhiqiang Wu, Jin Wang, Keqin Li
Special Soundness in the Random Oracle Model
Douglas Wikström
Douglas Wikström
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac, Arne Tobias Ødegaard
Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac, Arne Tobias Ødegaard
Transparency Dictionaries with Succinct Proofs of Correct Operation
Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath Setty
Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath Setty
Reverse Firewalls for Adaptively Secure MPC without Setup
Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar
Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE
Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung
Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Jelle Vos, Zekeriya Erkin, Christian Doerr
Jelle Vos, Zekeriya Erkin, Christian Doerr
Parallel Repetition of $(k_1,\dots,k_{\mu})$-Special-Sound Multi-Round Interactive Proofs
Thomas Attema and Serge Fehr
Thomas Attema and Serge Fehr
Bit Security as Computational Cost for Winning Games with High Probability
Shun Watanabe, Kenji Yasunaga
Shun Watanabe, Kenji Yasunaga
Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy
S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu
S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu
Oblivious Message Retrieval
Zeyu Liu, Eran Tromer
Zeyu Liu, Eran Tromer
How to Find Ternary LWE Keys Using Locality Sensitive Hashing
Elena Kirshanova, Alexander May
Elena Kirshanova, Alexander May
Vector and Functional Commitments from Lattices
Chris Peikert, Zachary Pepin, Chad Sharp
Chris Peikert, Zachary Pepin, Chad Sharp
EasyPQC: Verifying Post-Quantum Cryptography
Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou
Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou
Complete Practical Side-Channel-Assisted Reverse Engineering of AES-Like Ciphers
Andrea Caforio, Fatih Balli, Subhadeep Banik
Andrea Caforio, Fatih Balli, Subhadeep Banik
Efficient NIZKs for Algebraic Sets
Geoffroy Couteau, Helger Lipmaa, Roberto Parisella, Arne Tobias Ødegaard
Geoffroy Couteau, Helger Lipmaa, Roberto Parisella, Arne Tobias Ødegaard
Efficient Leakage-Resilient MACs without Idealized Assumptions
Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert
Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert
Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
Wei Dai
Wei Dai
The Adversary Capabilities In Practical Byzantine Fault Tolerance
Yongge Wang
Yongge Wang
A Geometric Approach to Linear Cryptanalysis
Tim Beyne
Tim Beyne
Astrolabous: A Universally Composable Time-Lock Encryption Scheme
Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias
Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias
SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation
Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu
Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu
IvyCross: A Privacy-Preserving and Concurrency Control Framework for Blockchain Interoperability
Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Guowen Xu, Robert Deng
Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Guowen Xu, Robert Deng
Syndrome Decoding Estimator
Andre Esser, Emanuele Bellini
Andre Esser, Emanuele Bellini
Non-Interactive Differentially Anonymous Router
Benedikt Bünz, Yuncong Hu, Shin’ichiro Matsuo, Elaine Shi
Benedikt Bünz, Yuncong Hu, Shin’ichiro Matsuo, Elaine Shi
Shuffling Public Keys (A Peer-to-peer Voting Algorithm)
Santi J. Vives
Santi J. Vives
Count Me In! Extendability for Threshold Ring Signatures
Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov
Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov
Quantum Linearization Attacks
Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher
Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher
Generic Framework for Key-Guessing Improvements
Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia
Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia
Hierarchical Integrated Signature and Encryption
Yu Chen, Qiang Tang, Yuyu Wang
Yu Chen, Qiang Tang, Yuyu Wang
Architecture Support for Bitslicing
Pantea Kiaei, Tom Conroy, Patrick Schaumont
Pantea Kiaei, Tom Conroy, Patrick Schaumont
Saidoyoki: Evaluating side-channel leakage in pre- and post-silicon setting
Pantea Kiaei, Zhenyuan Liu, Ramazan Kaan Eren, Yuan Yao, Patrick Schaumont
Pantea Kiaei, Zhenyuan Liu, Ramazan Kaan Eren, Yuan Yao, Patrick Schaumont
Policy-Compliant Signatures
Christian Badertscher, Christian Matt, Hendrik Waldner
Christian Badertscher, Christian Matt, Hendrik Waldner
Blockchains Enable Non-Interactive MPC
Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song
Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song
Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf
Gizem Kara, Oğuz Yayla
Gizem Kara, Oğuz Yayla
Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation
Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
Direct Product Hardness Amplification
David Lanzenberger, Ueli Maurer
David Lanzenberger, Ueli Maurer
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy
Hanwen Feng, Qiang Tang
Hanwen Feng, Qiang Tang
Efficient Boolean Search over Encrypted Data with Reduced Leakage
Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
Succinct LWE Sampling, Random Polynomials, and Obfuscation
Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
Massive Superpoly Recovery with Nested Monomial Predictions
Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang
Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang
Trojan-Resilience without Cryptography
Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo
Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof
Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof
Fault-enabled chosen-ciphertext attacks on Kyber
Julius Hermelink, Peter Pessl, Thomas Pöppelmann
Julius Hermelink, Peter Pessl, Thomas Pöppelmann
Simple, Fast Malicious Multiparty Private Set Intersection
Ofri Nevo, Ni Trieu, Avishay Yanai
Ofri Nevo, Ni Trieu, Avishay Yanai
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting
Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
Towards Tight Adaptive Security of Non-Interactive Key Exchange
Julia Hesse, Dennis Hofheinz, Lisa Kohl, Roman Langrehr
Julia Hesse, Dennis Hofheinz, Lisa Kohl, Roman Langrehr
Algebraic Adversaries in the Universal Composability Framework
Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu
Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu
EMFI for Safety-Critical Testing of Automotive Systems
Colin O'Flynn
Colin O'Flynn
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage
Akira Ito, Rei Ueno, Naofumi Homma
Akira Ito, Rei Ueno, Naofumi Homma
Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme
Eunsang Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
Eunsang Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness
Susumu Kiyoshima
Susumu Kiyoshima
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding
Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding
SPEEDY on Cortex--M3: Efficient Software Implementation of SPEEDY on ARM Cortex--M3
Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo
Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo
Grover on SPEEDY
Gyeongju Song, Kyungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
Gyeongju Song, Kyungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
LedMAC: More Efficient Variants of LightMAC
Yaobin Shen, Lei Wang, Dawu Gu
Yaobin Shen, Lei Wang, Dawu Gu
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions
Lior Rotem
Lior Rotem
On Actively-Secure Elementary MPC Reductions
Benny Applebaum, Aarushi Goel
Benny Applebaum, Aarushi Goel
Non-Malleable Vector Commitments via Local Equivocability
Lior Rotem and Gil Segev
Lior Rotem and Gil Segev
Efficient Perfectly Secure Computation with Optimal Resilience
Ittai Abraham, Gilad Asharov, Avishay Yanai
Ittai Abraham, Gilad Asharov, Avishay Yanai
FASTA - a stream cipher for fast FHE evaluation
Carlos Cid, John Petter Indrøy, Håvard Raddum
Carlos Cid, John Petter Indrøy, Håvard Raddum
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
Florette Martinez
Florette Martinez
The irreducible vectors of a lattice: Some theory and applications
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
Design Space Exploration of SABER in 65nm ASIC
Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
Provably Improving Election Verifiability in Belenios
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
KDM Security for the Fujisaki-Okamoto Transformations in the QROM
Fuyuki Kitagawa, Ryo Nishimaki
Fuyuki Kitagawa, Ryo Nishimaki
Compressed Oblivious Encoding for Homomorphically Encrypted Search
Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
Clustering Effect in Simon and Simeck
Gaëtan Leurent, Clara Pernot, André Schrottenloher
Gaëtan Leurent, Clara Pernot, André Schrottenloher
($\epsilon,\delta$)-indistinguishable Mixing for Cryptocurrencies
Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, Dov Gordon, Mayank Varia
Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, Dov Gordon, Mayank Varia
Concurrent Composition of Differential Privacy
Salil Vadhan, Tianhao Wang
Salil Vadhan, Tianhao Wang
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing
Miti Mazmudar, Stan Gurtler, Ian Goldberg
Miti Mazmudar, Stan Gurtler, Ian Goldberg
Automated Truncation of Differential Trails and Trail Clustering in ARX
Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto
Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto
JUBILEE: Secure Debt Relief and Forgiveness
David Cerezo Sánchez
David Cerezo Sánchez
Simple Constructions from (Almost) Regular One-Way Functions
Noam Mazor, Jiapeng Zhang
Noam Mazor, Jiapeng Zhang
A Simpler Model for Recovering Superpoly onTrivium
Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
Differential Fault Attack on Lightweight Block Cipher PIPO
SeongHyuck Lim, JaeSeung Han, Tae-Ho Lee, Dong-Guk Han
SeongHyuck Lim, JaeSeung Han, Tae-Ho Lee, Dong-Guk Han
A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
Interhead Hydra Two Heads are Better than One
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
Post-Quantum Signal Key Agreement with SIDH
Samuel Dobson, Steven D. Galbraith
Samuel Dobson, Steven D. Galbraith
A Privacy-Preserving Distributed Identity Offline-First PoCP Blockchain Paradigm
Andrew M. K. Nassief
Andrew M. K. Nassief
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework)
Ueli Maurer, Christopher Portmann, Guilherme Rito
Ueli Maurer, Christopher Portmann, Guilherme Rito
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups
Aron van Baarsen, Marc Stevens
Aron van Baarsen, Marc Stevens
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys
Armando Faz-Hernández, Watson Ladd, Deepak Maram
Armando Faz-Hernández, Watson Ladd, Deepak Maram
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code
Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?
István András Seres, Balázs Pejó, Péter Burcsi
István András Seres, Balázs Pejó, Péter Burcsi
Improved Attacks on GIFT-64
Ling Sun, Wei Wang, Meiqin Wang
Ling Sun, Wei Wang, Meiqin Wang
Onion Routing with Replies
Christiane Kuhn, Dennis Hofheinz, Andy Rupp, and Thorsten Strufe
Christiane Kuhn, Dennis Hofheinz, Andy Rupp, and Thorsten Strufe
Algebraic Restriction Codes and their Applications
Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski
Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski
Amortized Threshold Symmetric-key Encryption
Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha
Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha
Adaptive Security of Multi-Party Protocols, Revisited
Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer
Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer
On Communication-Efficient Asynchronous MPC with Adaptive Security
Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang
Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang
Lelantus Spark: Secure and Flexible Private Transactions
Aram Jivanyan and Aaron Feickert
Aram Jivanyan and Aaron Feickert
Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice
Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
FAST: Secure and High Performance Format-Preserving Encryption and Tokenization
F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay
F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs
Masahito Ishizaka, Shinsaku Kiyomoto
Masahito Ishizaka, Shinsaku Kiyomoto
As easy as ABC: Optimal (A)ccountable (B)yzantine (C)onsensus is easy!
Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic
Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version)
Wonseok Choi, Byeonghak Lee, Jooyoung Lee, Yeongmin Lee
Wonseok Choi, Byeonghak Lee, Jooyoung Lee, Yeongmin Lee
fflonk: a Fast-Fourier inspired verifier efficient version of PlonK
Ariel Gabizon, Zachary J. Williamson
Ariel Gabizon, Zachary J. Williamson
Fine-tuning the ISO/IEC Standard LightMAC
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery
Mario Larangeira
Mario Larangeira
Cube Attacks on Round-Reduced TinyJAMBU
Wil Liam Teng, Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C. -W. Phan
Wil Liam Teng, Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C. -W. Phan
Information-Theoretically Secure MPC against Mixed Dynamic Adversaries
Ivan Damgård, Daniel Escudero, Divya Ravi
Ivan Damgård, Daniel Escudero, Divya Ravi
Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees
Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao
Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao
Balanced Non-Adjacent Forms
Marc Joye
Marc Joye
Classical Attacks on a Variant of the RSA Cryptosystem
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu
Compact and Malicious Private Set Intersection for Small Sets
Mike Rosulek, Ni Trieu
Mike Rosulek, Ni Trieu
Grafting Key Trees: Efficient Key Management for Overlapping Groups
Joël Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
Joël Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
Private Approximate Nearest Neighbor Search with Sublinear Communication
Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas
Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas
Evolving Secret Sharing in Almost Semi-honest Model
Jyotirmoy Pramanik, Avishek Adhikari
Jyotirmoy Pramanik, Avishek Adhikari
GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data
Jonathan Takeshita, Colin McKechney, Justin Pajak, Antonis Papadimitriou, Ryan Karl, Taeho Jung
Jonathan Takeshita, Colin McKechney, Justin Pajak, Antonis Papadimitriou, Ryan Karl, Taeho Jung
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizar
Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizar
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
Simon Masson, Antonio Sanso, and Zhenfei Zhang
Simon Masson, Antonio Sanso, and Zhenfei Zhang
Efficient Modular Multiplication
Joppe W. Bos, Thorsten Kleinjung, Dan Page
Joppe W. Bos, Thorsten Kleinjung, Dan Page
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
COUTEAU Geoffroy, Peter Rindal, Srinivasan Raghuraman
COUTEAU Geoffroy, Peter Rindal, Srinivasan Raghuraman
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head
José Bacelar Almeida, Manuel Barbosa, Manuel L Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
José Bacelar Almeida, Manuel Barbosa, Manuel L Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)
Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts
Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness
Shuai Han, Shengli Liu, Dawu Gu
Shuai Han, Shengli Liu, Dawu Gu
Recurring Contingent Payment for Proofs of Retrievability
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps
Ward Beullens
Ward Beullens
Facial Recognition for Remote Electronic Voting – Missing Piece of the Puzzle or Yet Another Liability?
Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
The Elliptic Net Algorithm Revisited
Shiping Cai, Zhi Hu, Zheng-An Yao, Chang-An Zhao
Shiping Cai, Zhi Hu, Zheng-An Yao, Chang-An Zhao
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback
Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
Computing Discrete Logarithms
Robert Granger, Antoine Joux
Robert Granger, Antoine Joux
HyperLogLog: Exponentially Bad in Adversarial Settings
Kenneth G. Paterson, Mathilde Raynal
Kenneth G. Paterson, Mathilde Raynal
Optimal Good-case Latency for Rotating Leader Synchronous BFT
Ittai Abraham, Kartik Nayak, Nibesh Shrestha
Ittai Abraham, Kartik Nayak, Nibesh Shrestha
qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme
Michael Burger, Juliane Krämer, Christian Bischof
Michael Burger, Juliane Krämer, Christian Bischof
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions
Michael Burger, Christian Bischof, Juliane Krämer
Michael Burger, Christian Bischof, Juliane Krämer
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
Kamil Kluczniak, Leonard Schild
Kamil Kluczniak, Leonard Schild
Some observations on ZUC-256
Alexander Maximov
Alexander Maximov
Multiradical isogenies
Wouter Castryck, Thomas Decru
Wouter Castryck, Thomas Decru
Safe-Error Attacks on SIKE and CSIDH
Fabio Campos, Juliane Krämer, Marcel Müller
Fabio Campos, Juliane Krämer, Marcel Müller
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts
Tanping Zhou, Long Chen, Xiaoliang Che, Wenchao Liu, Zhenfeng Zhang, Xiaoyuan Yang
Tanping Zhou, Long Chen, Xiaoliang Che, Wenchao Liu, Zhenfeng Zhang, Xiaoyuan Yang
A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves
Michael Scott
Michael Scott
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio
Shenghui Su, Jianhua Zheng, Shuwang Lv
Shenghui Su, Jianhua Zheng, Shuwang Lv
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity
Gianluca Brian, Antonio Faonio, Daniele Venturi
Gianluca Brian, Antonio Faonio, Daniele Venturi
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT
Bowen Liu, Qiang Tang, Jianying Zhou
Bowen Liu, Qiang Tang, Jianying Zhou
Turn-Based Communication Channels
Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka
Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka
Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks
Luise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch
Luise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch
A Semi-Permanent Stuck-At Fault Analysis on AES Rijndael SBox
Priyanka Joshi, Bodhisatwa Mazumdar
Priyanka Joshi, Bodhisatwa Mazumdar
Oblivious RAM with Worst-Case Logarithmic Overhead
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi
And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes
Marc Nemes, Rebecca Schwerdt, Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade
Marc Nemes, Rebecca Schwerdt, Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade
Constant-Time Arithmetic for Safer Cryptography
Lúcás Críostóir Meier, Simone Colombo, Marin Thiercelin, Bryan Ford
Lúcás Críostóir Meier, Simone Colombo, Marin Thiercelin, Bryan Ford
Simpira Gets Simpler: Optimized Simpira on Microcontrollers
Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Gyeongju Song, Wai-Kong Lee, Hwajeong Seo
Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Gyeongju Song, Wai-Kong Lee, Hwajeong Seo
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials
Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu
Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu
THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy, Ali Nehme
Pablo Rauzy, Ali Nehme
All the Polynomial Multiplication You Need on RISC-V
Hwajeong Seo, Hyeokdong Kwon, Siwoo Eum, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Gyeongju Song, Wai-Kong Lee
Hwajeong Seo, Hyeokdong Kwon, Siwoo Eum, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Gyeongju Song, Wai-Kong Lee
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication
Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg
Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg
Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes
Chaoping Xing, Chen Yuan
Chaoping Xing, Chen Yuan
Remarks on MOBS and cryptosystems using semidirect products
Chris Monico
Chris Monico
On the Security of Doubly Efficient PIR
Elette Boyle, Justin Holmgren, Fermi Ma, Mor Weiss
Elette Boyle, Justin Holmgren, Fermi Ma, Mor Weiss
Key agreement: security / division
Daniel R. L. Brown
Daniel R. L. Brown
A Low-Randomness Second-Order Masked AES
Tim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Šijačić
Tim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Šijačić
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Barbara Gigerl, Robert Primas, Stefan Mangard
Barbara Gigerl, Robert Primas, Stefan Mangard
On Actively Secure Fine-grained Access Structures from Isogeny Assumptions
Philipp Muth, Fabio Campos
Philipp Muth, Fabio Campos
Preservation of DNA Privacy During the Large Scale Detection of COVID
Marcel Hollenstein, David Naccache, Peter B. Roenne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav
Marcel Hollenstein, David Naccache, Peter B. Roenne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav
Multi-Leak Deep-Learning Side-Channel Analysis
Fanliang Hu, Huanyu Wang, Junnian Wang
Fanliang Hu, Huanyu Wang, Junnian Wang
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More
Eric Brier, Rémi Géraud-Stewart, Marc Joye, David Naccache
Eric Brier, Rémi Géraud-Stewart, Marc Joye, David Naccache
Improved Linear Approximations of SNOW-V and SNOW-Vi
Zhen Shi, Chenhui Jin, Yu Jin
Zhen Shi, Chenhui Jin, Yu Jin
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences
Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe
Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe
Exploring Differential-Based Distinguishers and Forgeries for ASCON
David Gerault, Thomas Peyrin, Quan Quan Tan
David Gerault, Thomas Peyrin, Quan Quan Tan
Construction and Implementation of Practical Reusable and Robust Fuzzy Extractors for Fingerprint
Lin You, Wang Cheng, Gengran Hu
Lin You, Wang Cheng, Gengran Hu
Differential Privacy in Constant Function Market Makers
Tarun Chitra, Guillermo Angeris, Alex Evans
Tarun Chitra, Guillermo Angeris, Alex Evans
REDsec: Running Encrypted Discretized Neural Networks in Seconds
Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
MILP modeling of Boolean functions by minimum number of inequalities
Aleksei Udovenko
Aleksei Udovenko
Individual Verifiability and Revoting in the Estonian Internet Voting System
Olivier Pereira
Olivier Pereira
The Hadamard square of concatenated linear codes
Ivan Chizhov, Alexandra Davletshina
Ivan Chizhov, Alexandra Davletshina
Mt. Random: Multi-Tiered Randomness Beacons
Ignacio Cascudo, Bernardo David, Omer Shlomovits, and Denis Varlakov
Ignacio Cascudo, Bernardo David, Omer Shlomovits, and Denis Varlakov
Analyzing Masked Ciphers Against Transition and Coupling Effects
Siemen Dhooghe
Siemen Dhooghe
Resilient Uniformity: Applying Resiliency in Masking
Siemen Dhooghe, Svetla Nikova
Siemen Dhooghe, Svetla Nikova
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
Yilei Chen, Qipeng Liu, Mark Zhandry
Yilei Chen, Qipeng Liu, Mark Zhandry
SoK: Deep Learning-based Physical Side-channel Analysis
Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis
Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
Towards Accountability in CRS Generation
Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal
Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal
Threshold scheme to share a secret by means of sound ranging
Sergij V. Goncharov
Sergij V. Goncharov
Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Methods for Decentralized Identities: Evaluation and Insights
Walid Fdhila, Nicholas Stifter, Kristian Kostal, Cihan Saglam, Markus Sabadello
Walid Fdhila, Nicholas Stifter, Kristian Kostal, Cihan Saglam, Markus Sabadello
How do the Arbiter PUFs Sample the Boolean Function Class?
Animesh Roy, Dibyendu Roy, Subhamoy Maitra
Animesh Roy, Dibyendu Roy, Subhamoy Maitra
Homomorphic Encryption for Multiple Users with Less Communications
Jeongeun Park
Jeongeun Park
Towards the Least Inequalities for Describing a Subset in $Z_2^n$
Yao Sun
Yao Sun
Modular Design of Secure Group Messaging Protocols and the Security of MLS
Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
Some remarks on how to hash faster onto elliptic curves
Dmitrii Koshelev
Dmitrii Koshelev
OnionPIR: Response Efficient Single-Server PIR
Muhammad Haris Mughees, Hao Chen, Ling Ren
Muhammad Haris Mughees, Hao Chen, Ling Ren
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
The Exact Complexity of Pseudorandom Functions and Tight Barriers to Lower Bound Proofs
Zhiyuan Fan, Jiatu Li, Tianqi Yang
Zhiyuan Fan, Jiatu Li, Tianqi Yang
Reflection, Rewinding, and Coin-Toss in EasyCrypt
Denis Firsov, Dominique Unruh
Denis Firsov, Dominique Unruh
MProve+ : Privacy Enhancing Proof of Reserves Protocol for Monero
Arijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
Arijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
Hardness of KT Characterizes Parallel Cryptography
Hanlin Ren, Rahul Santhanam
Hanlin Ren, Rahul Santhanam
The security of the code-based signature scheme based on the Stern identification protocol
Victoria Vysotskaya, Ivan Chizhov
Victoria Vysotskaya, Ivan Chizhov
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
"Act natural!": Having a Private Chat on a Public Blockchain
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz
Streaming SPHINCS+ for Embedded Devices using the Example of TPMs
Ruben Niederhagen, Johannes Roth, Julian Wälde
Ruben Niederhagen, Johannes Roth, Julian Wälde
Improved Verifiability for BeleniosVS
Thomas Haines, Rajeev Gore
Thomas Haines, Rajeev Gore
Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3
Gilles Macario-Rat, Jacques Patarin
Gilles Macario-Rat, Jacques Patarin
Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin
Joachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, and Javier Díaz
Joachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, and Javier Díaz
A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits
Hongrui Cui, Kaiyi Zhang
Hongrui Cui, Kaiyi Zhang
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs
Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Taphonomical Security: (DNA) Information with Foreseeable Lifespan
Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y. A. Ryan, Julien Weibel, Robert Weil
Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y. A. Ryan, Julien Weibel, Robert Weil
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol
Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y. A. Ryan, Hugo Waltsburger
Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y. A. Ryan, Hugo Waltsburger
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
Cairo – a Turing-complete STARK-friendly CPU architecture
Lior Goldberg, Shahar Papini, Michael Riabzev
Lior Goldberg, Shahar Papini, Michael Riabzev
On the Nonsingularity and Equivalence of NFSRs
Yingyin Pan, Jianghua Zhong, Dongdai Lin
Yingyin Pan, Jianghua Zhong, Dongdai Lin
Edwards curves and FFT-based multiplication
Pavel Atnashev, George Woltman
Pavel Atnashev, George Woltman
Discovering New $L$-Function Relations Using Algebraic Sieving
Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien
Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien
Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021
Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier
Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier
Cryptanalysis of Caesar using Quantum Support Vector Machine
Hyunji Kim, Gyeongju Song, Kyoungbae Jang, Hwajeong Seo
Hyunji Kim, Gyeongju Song, Kyoungbae Jang, Hwajeong Seo
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport
Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang
Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang
Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds
Chun-I Fan, Si-Jing Wu, Yi-Fan Tseng
Chun-I Fan, Si-Jing Wu, Yi-Fan Tseng
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions
François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
One-time Traceable Ring Signatures
Alessandra Scafuro, Bihan Zhang
Alessandra Scafuro, Bihan Zhang
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage
Thinh H. Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page
Thinh H. Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page
Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound.
Oleksandra Lapiha
Oleksandra Lapiha
Collisions in Supersingular Isogeny Graphs and the SIDH-based Identification Protocol
Wissam Ghantous, Shuichi Katsumata, Federico Pintore, Mattia Veroni
Wissam Ghantous, Shuichi Katsumata, Federico Pintore, Mattia Veroni
Privacy-Enhancing Group Signcryption Scheme
Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina
Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina
Binary Search in Secure Computation
Marina Blanton, Chen Yuan
Marina Blanton, Chen Yuan
Aggregating and thresholdizing hash-based signatures using STARKs
Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai
Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai
A Correlation Attack on Full SNOW-V and SNOW-Vi
Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding, Yu Jin
Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding, Yu Jin
On the modifier Q for multivariate signature schemes
Yasufumi Hashimoto
Yasufumi Hashimoto
An improvement of algorithms to solve under-defined systems of multivariate quadratic equations
Yasufumi Hashimoto
Yasufumi Hashimoto
On the security of Hufu-UOV
Yasufumi Hashimoto
Yasufumi Hashimoto
Brakedown: Linear-time and field-agnostic SNARKs for R1CS
Alexander Golovnev, Jonathan Lee, Srinath Setty, Justin Thaler, and Riad S. Wahby
Alexander Golovnev, Jonathan Lee, Srinath Setty, Justin Thaler, and Riad S. Wahby
Rate One-Third Non-malleable Codes
Divesh Aggarwal, Sruthi Sekar, Bhavana Kanukurthi, Maciej Obremski, Sai Lakshmi Bhavana Obbattu
Divesh Aggarwal, Sruthi Sekar, Bhavana Kanukurthi, Maciej Obremski, Sai Lakshmi Bhavana Obbattu
On the Multiplicative Complexity of Cubic Boolean Functions
Meltem Sonmez Turan, Rene Peralta
Meltem Sonmez Turan, Rene Peralta
MUSE: Secure Inference Resilient to Malicious Clients
Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
Neyman’s Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections
Si Gao, Elisabeth Oswald, Yan Yan
Si Gao, Elisabeth Oswald, Yan Yan
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets
Akinori Kawachi, Maki Yoshida
Akinori Kawachi, Maki Yoshida
Lelantus-CLA
Pyrros Chaidos, Vladislav Gelfer
Pyrros Chaidos, Vladislav Gelfer
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
Optimal encodings to elliptic curves of $j$-invariants $0$, $1728$
Dmitrii Koshelev
Dmitrii Koshelev
Limits of Polynomial Packings for $\mathbb{Z}_{p^k}$ and $\mathbb{F}_{p^k}$
Jung Hee Cheon, Keewoo Lee
Jung Hee Cheon, Keewoo Lee
AdVeil: A Private Targeted Advertising Ecosystem
Sacha Servan-Schreiber, Kyle Hogan, Srinivas Devadas
Sacha Servan-Schreiber, Kyle Hogan, Srinivas Devadas
Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs
Bruno Sterner
Bruno Sterner
A lightweight ISE for ChaCha on RISC-V
Ben Marshall, Daniel Page, Thinh Hung Pham
Ben Marshall, Daniel Page, Thinh Hung Pham
LOVE a pairing
Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Claude Carlet, Sylvain Guilley, Sihem Mesnager
Claude Carlet, Sylvain Guilley, Sihem Mesnager
On Fingerprinting Attacks and Length-Hiding Encryption
Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
On the Hardness of Ring/Module/Polynomial LWR Problems
Yang Wang, Yanmin Zhao, Mingqiang Wang
Yang Wang, Yanmin Zhao, Mingqiang Wang
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings
Daniel Escudero, Eduardo Soria-Vazquez
Daniel Escudero, Eduardo Soria-Vazquez
Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
Wai-Kong Lee, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Seong Oun Hwang, Hwajeong Seo
Wai-Kong Lee, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Seong Oun Hwang, Hwajeong Seo
SIDH Proof of Knowledge
Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig
Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig
Zero-Knowledge Middleboxes
Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
Power-based Side Channel Attack Analysis on PQC Algorithms
Tendayi Kamucheka, Michael Fahr, Tristen Teague, Alexander Nelson, David Andrews, Miaoqing Huang
Tendayi Kamucheka, Michael Fahr, Tristen Teague, Alexander Nelson, David Andrews, Miaoqing Huang
Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Shay Gueron, Edoardo Persichetti, Paolo Santini
Shay Gueron, Edoardo Persichetti, Paolo Santini
Implementing and Measuring KEMTLS
Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
Obfustopia Built on Secret-Key Functional Encryption
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Improve Neural Distinguisher for Cryptanalysis
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
Quantum collision finding for homomorphic hash functions
Juan Carlos Garcia-Escartin, Vicent Gimeno, Julio José Moyano-Fernández
Juan Carlos Garcia-Escartin, Vicent Gimeno, Julio José Moyano-Fernández
Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors
Hyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Wai-Kong Lee, Hwajeong Seo
Hyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Wai-Kong Lee, Hwajeong Seo
SoC Security Properties and Rules
Nusrat Farzana Dipu, Farimah Farahmandi, Mark Tehranipoor
Nusrat Farzana Dipu, Farimah Farahmandi, Mark Tehranipoor
Iterative Oblivious Pseudo-Random Functions and Applications
Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry
Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Nils Wenzler, Tim Wuertele
Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Nils Wenzler, Tim Wuertele
A Fast and Flexible Multi-Client Functional Encryption for Set Intersection
Mojtaba Rafiee
Mojtaba Rafiee
Circuit friendly, post-quantum dynamic accumulators from RingSIS with logarithmic prover time
Endre (Silur) Abraham
Endre (Silur) Abraham
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
Provably Solving the Hidden Subset Sum Problem via Statistical Learning
Jean-Sebastien Coron, Agnese Gini
Jean-Sebastien Coron, Agnese Gini
UOV-Pepper: New Public Key Short Signature in Degree 3
Gilles Macario-Rat, Jacques Patarin
Gilles Macario-Rat, Jacques Patarin
On the Construction and Cryptanalysis of Multi-Ciphers
Arush Chhatrapati
Arush Chhatrapati
Towards Attack Resilient Arbiter PUF-Based Strong PUFs
Nils Wisiol
Nils Wisiol
SCA-secure ECC in software – mission impossible?
Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
Online Linear Extractors for Independent Sources
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
Classical Binding for Quantum Commitments
Nir Bitansky, Zvika Brakerski
Nir Bitansky, Zvika Brakerski
A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model
Masayuki Fukumitsu, Shingo Hasegawa
Masayuki Fukumitsu, Shingo Hasegawa
NTRU Fatigue: How Stretched is Overstretched?
Léo Ducas, Wessel van Woerden
Léo Ducas, Wessel van Woerden
Polynomial multiplication on embedded vector architectures
Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede
Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede
Higher-Order Lookup Table Masking in Essentially Constant Memory
Annapurna Valiveti, Srinivas Vivek
Annapurna Valiveti, Srinivas Vivek
Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks
Elias Rohrer, Florian Tschorsch
Elias Rohrer, Florian Tschorsch
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4
Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang
Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang
BKW Meets Fourier: New Algorithms for LPN with Sparse Parities
Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi
Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng
Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng
Faster Public-key Compression of SIDH with Less Memory
Kaizhan Lin, Jianming Lin, Weize Wang, Chang-An Zhao
Kaizhan Lin, Jianming Lin, Weize Wang, Chang-An Zhao
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices
Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong
Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong
Secret Keys in Genus-2 SIDH
Sabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper
Sabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism
Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang
Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang
Concurrent Signatures from a Variety of Keys
George Teseleanu
George Teseleanu
A Formal Security Analysis of Session Resumption Across Hostnames
Kai Gellert, Tobias Handirk
Kai Gellert, Tobias Handirk
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang
PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart
Karim Lounis
Karim Lounis
On the Use of the Legendre Symbol in Symmetric Cipher Design
Alan Szepieniec
Alan Szepieniec
A Cryptographic Hash Function from Markoff Triples
Elena Fuchs, Kristin Lauter, Matthew Litman, Austin Tran
Elena Fuchs, Kristin Lauter, Matthew Litman, Austin Tran
Quantum Implementation and Resource Estimates for RECTANGLE and KNOT
Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang
Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang
Deep Learning-based Side-channel Analysis against AES Inner Rounds
Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek
Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek
Binary Field Montgomery Multiplication on Quantum Computers
Kyoungbae Jang, Gyeong Ju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
Kyoungbae Jang, Gyeong Ju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
Constant-Overhead Zero-Knowledge for RAM Programs
Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng
Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
Donghang Lu, Albert Yu, Aniket Kate, Hemanta Maji
Donghang Lu, Albert Yu, Aniket Kate, Hemanta Maji
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
Yuval Ishai, Hang Su, David J. Wu
Yuval Ishai, Hang Su, David J. Wu
Reinventing BrED: A Practical Construction Formal Treatment of Broadcast Encryption with Dealership
Avishek Majumder and Sayantan Mukherjee
Avishek Majumder and Sayantan Mukherjee
Bridges connecting Encryption Schemes
Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas
Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds
Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu
Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu
A Multiplatform Parallel Approach for Lattice Sieving Algorithms
Michał Andrzejczak, Kris Gaj
Michał Andrzejczak, Kris Gaj
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA
Alexander May, Julian Nowakowski, Santanu Sarkar
Alexander May, Julian Nowakowski, Santanu Sarkar
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols
Lior Rotem, Gil Segev
Lior Rotem, Gil Segev
Short Identity-Based Signatures with Tight Security from Lattices
Jiaxin Pan, Benedikt Wagner
Jiaxin Pan, Benedikt Wagner
Influence of a Set of Variables on a Boolean Function
Aniruddha Biswas, Palash Sarkar
Aniruddha Biswas, Palash Sarkar
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?
Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan
Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan
Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies
Stephen Holmes, Liqun Chen
Stephen Holmes, Liqun Chen
Soteria: Preserving Privacy in Distributed Machine Learning
Cláudia Brito, Pedro Ferreira, Bernardo Portela, Rui Oliveira, João Paulo
Cláudia Brito, Pedro Ferreira, Bernardo Portela, Rui Oliveira, João Paulo
Automatic Search for Bit-based Division Property
Shibam Ghosh, Orr Dunkelman
Shibam Ghosh, Orr Dunkelman
Secure Quantum Computation with Classical Communication
James Bartusek
James Bartusek
Post-Quantum Key-Blinding for Authentication in Anonymity Networks
Edward Eaton, Douglas Stebila, Roy Stracovsky
Edward Eaton, Douglas Stebila, Roy Stracovsky
Practically Solving LPN
Thom Wiggers, Simona Samardjiska
Thom Wiggers, Simona Samardjiska
Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes
Jan Bobolz, Fabian Eidens, Raphael Heitjohann, Jeremy Fell
Jan Bobolz, Fabian Eidens, Raphael Heitjohann, Jeremy Fell
The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
The Best of Two Worlds: Deep Learning-assisted Template Attack
Lichao Wu, Guilherme Perin, Stjepan Picek
Lichao Wu, Guilherme Perin, Stjepan Picek
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
Jonas Ruchti, Michael Gruber, Michael Pehl
Jonas Ruchti, Michael Gruber, Michael Pehl
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra, Akshayaram Srinivasan
Arpita Patra, Akshayaram Srinivasan
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal
Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal
Higher-degree supersingular group actions
Mathilde Chenu, Benjamin Smith
Mathilde Chenu, Benjamin Smith
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede
Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption
Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe
Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe
On the Evaluation of Deep Learning-based Side-channel Analysis
Lichao Wu, Guilherme Perin, Stjepan Picek
Lichao Wu, Guilherme Perin, Stjepan Picek
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert
Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying
Sébastien Duval, Pierrick Méaux, Charles Momin, François-Xavier Standaert
Sébastien Duval, Pierrick Méaux, Charles Momin, François-Xavier Standaert
A High-Speed Architecture for the Reduction in VDF Based on a Class Group
Yifeng Song, Danyang Zhu, Jing Tian, Zhongfeng Wang
Yifeng Song, Danyang Zhu, Jing Tian, Zhongfeng Wang
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta
Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta
Autocorrelations of vectorial Boolean functions
Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer
Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer
Hidden Cosets and Applications to Unclonable Cryptography
Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
Limits on the Adaptive Security of Yao's Garbling
Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs
Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs
Systematic Side-channel Analysis of Curve25519 with Machine Learning
Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN
Geoffroy Couteau, Pierre Meyer
Geoffroy Couteau, Pierre Meyer
Compact Ring Signatures from Learning With Errors
Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian
Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme
Maamar Ouladj, Sylvain Guilley, Philippe Guillot, and Farid Mokrane
Maamar Ouladj, Sylvain Guilley, Philippe Guillot, and Farid Mokrane
SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data
Ripon Patgiri, Malaya Dutta Borah, Laiphrakpam Dolendro Singh
Ripon Patgiri, Malaya Dutta Borah, Laiphrakpam Dolendro Singh
OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning
Jiacheng Liang, Songze Li, Wensi Jiang, Bochuan Cao, Chaoyang He
Jiacheng Liang, Songze Li, Wensi Jiang, Bochuan Cao, Chaoyang He
Plactic signatures (insecure?)
Daniel R. L. Brown
Daniel R. L. Brown
Storing data that is updated regularly on a client machine securely
Artem Los
Artem Los
FIVER -- Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
ROTed: Random Oblivious Transfer for embedded devices
Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa
Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines
Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi
Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi
Fast Factoring Integers by SVP Algorithms, corrected
Claus Peter Schnorr
Claus Peter Schnorr
Succinct Functional Commitment for a Large Class of Arithmetic Circuits
Helger Lipmaa, Kateryna Pavlyk
Helger Lipmaa, Kateryna Pavlyk
Practical Key Recovery Attacks on FlexAEAD
Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, and Markus Schofnegger
Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, and Markus Schofnegger
Darlin: Recursive Proofs using Marlin
Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
A polynomial time key-recovery attack on the Sidon cryptosystem
Pierre Briaud, Jean-Pierre Tillich, Javier Verbel
Pierre Briaud, Jean-Pierre Tillich, Javier Verbel
Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium
Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin
Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
Shuichi Katsumata
Shuichi Katsumata
On Treewidth, Separators and Yao's Garbling
Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure
Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
On Removing Rejection Conditions in Practical Lattice-Based Signatures
Rouzbeh Behnia, Yilei Chen, Daniel Masny
Rouzbeh Behnia, Yilei Chen, Daniel Masny
On the (in)security of ElGamal in OpenPGP
Luca De Feo, Bertram Poettering, Alessandro Sorniotti
Luca De Feo, Bertram Poettering, Alessandro Sorniotti
Provably Secure Short Signature Scheme from Isogeny between Elliptic Curves
Kunal Dey, Sumit Kumar Debnath
Kunal Dey, Sumit Kumar Debnath
Semilinear Transformations in Coding Theory: A New Technique in Code-Based Cryptography
Wenshuo Guo, Fang-Wei Fu
Wenshuo Guo, Fang-Wei Fu
Non-malleable Commitments against Quantum Attacks
Nir Bitansky, Huijia Lin, Omri Shmueli
Nir Bitansky, Huijia Lin, Omri Shmueli
The supersingular isogeny path and endomorphism ring problems are equivalent
Benjamin Wesolowski
Benjamin Wesolowski
The Round Complexity of Quantum Zero-Knowledge
Orestis Chardouvelis, Giulio Malavolta
Orestis Chardouvelis, Giulio Malavolta
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes
Rogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça
Rogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça
Mithril: Stake-based Threshold Multisignatures
Pyrros Chaidos and Aggelos Kiayias
Pyrros Chaidos and Aggelos Kiayias
A PCP Theorem for Interactive Proofs and Applications
Gal Arnon, Alessandro Chiesa, Eylon Yogev
Gal Arnon, Alessandro Chiesa, Eylon Yogev
Principal Component Analysis using CKKS Homomorphic Encryption Scheme
Samanvaya Panda
Samanvaya Panda
Practical complexities of probabilistic algorithms for solving Boolean polynomial systems
Stefano Barbero, Emanuele Bellini, Carlo Sanna, Javier Verbel
Stefano Barbero, Emanuele Bellini, Carlo Sanna, Javier Verbel
On the looseness of FO derandomization
Daniel J. Bernstein
Daniel J. Bernstein
SoK: Understanding BFT Consensus in the Age of Blockchains
Gang Wang
Gang Wang
SECDSA: Mobile signing and authentication under classical ``sole control''
Eric Verheul
Eric Verheul
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms –
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
Selection of sampling keys for cryptographic tests
George Marinakis
George Marinakis
zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs
Pieter Pauwels
Pieter Pauwels
Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes
Wenshuo Guo, Fang-Wei Fu
Wenshuo Guo, Fang-Wei Fu
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage
Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek
Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek
Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures
Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version)
Alexandros Bakas, Antonis Michalas
Alexandros Bakas, Antonis Michalas
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
Kalle Ngo, Elena Dubrova, Thomas Johansson
Kalle Ngo, Elena Dubrova, Thomas Johansson
Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse
Ajeet Kumar, Subhamoy Maitra
Ajeet Kumar, Subhamoy Maitra
ANS-based Compression and Encryption with 128-bit Security
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
Homomorphic decryption in blockchains via compressed discrete-log lookup tables
Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko
Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko
On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures.
Vasyl Ustimenko
Vasyl Ustimenko
A Rational Protocol Treatment of 51% Attacks
Christian Badertscher, Yun Lu, Vassilis Zikas
Christian Badertscher, Yun Lu, Vassilis Zikas
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise"
Danilo Gligoroski
Danilo Gligoroski
Targeted Lossy Functions and Applications
Willy Quach, Brent Waters, Daniel Wichs
Willy Quach, Brent Waters, Daniel Wichs
History of Cryptographic Key Sizes
Nigel P. Smart, Emmanuel Thome
Nigel P. Smart, Emmanuel Thome
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Low-Latency Keccak at any Arbitrary Order
Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi
Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi
White Box Traitor Tracing
Mark Zhandry
Mark Zhandry
On One-way Functions and Sparse Languages
Yanyi Liu, Rafael Pass
Yanyi Liu, Rafael Pass
Counterexamples to New Circular Security Assumptions Underlying iO
Sam Hopkins, Aayush Jain, Huijia Lin
Sam Hopkins, Aayush Jain, Huijia Lin
Lifting Standard Model Reductions to Common Setup Assumptions
Ngoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi
Ngoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
Janaka Alawatugoda, Taechan Kim
Janaka Alawatugoda, Taechan Kim
Computational Records with Aging Hardware: Controlling Half the Output of SHA-256
Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs
Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations
Elias Rohrer, Florian Tschorsch
Elias Rohrer, Florian Tschorsch
Oblivious Key-Value Stores and Amplification for Private Set Intersection
Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
Computational Hardness of Optimal FairComputation: Beyond Minicrypt
Hemanta K. Maji, Mingyuan Wang
Hemanta K. Maji, Mingyuan Wang
Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key
Jayashree Dey, Ratna Dutta
Jayashree Dey, Ratna Dutta
Towards Tight Random Probing Security
Gaëtan Cassiers, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert
Gaëtan Cassiers, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert
Rethinking Searchable Symmetric Encryption
Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks
Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont
Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont
A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts
Aritra Banerjee
Aritra Banerjee
Code Constructions and Bounds for Identification via Channels
Onur Gunlu, Joerg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko
Onur Gunlu, Joerg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko
Hybrid Signal protocol for post-quantum email encryption
Sara Stadler, Vitor Sakaguti, Harjot Kaur, Anna Lena Fehlhaber
Sara Stadler, Vitor Sakaguti, Harjot Kaur, Anna Lena Fehlhaber
Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction
Bo-Yeon Sim, Aesun Park, Dong-Guk Han
Bo-Yeon Sim, Aesun Park, Dong-Guk Han
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange
Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk
Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk
W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
David Chaum, Mario Larangeira, Mario Yaksetig, William Carter
David Chaum, Mario Larangeira, Mario Yaksetig, William Carter
Traceable Secret Sharing and Applications
Vipul Goyal, Yifan Song, Akshayaram Srinivasan
Vipul Goyal, Yifan Song, Akshayaram Srinivasan
SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers
Jan Ferdinand Sauer, Alan Szepieniec
Jan Ferdinand Sauer, Alan Szepieniec
MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments
Panagiotis Chatzigiannis, Foteini Baldimtsi
Panagiotis Chatzigiannis, Foteini Baldimtsi
Low-Latency Hardware Masking of PRINCE
Nicolai Müller, Thorben Moos, Amir Moradi
Nicolai Müller, Thorben Moos, Amir Moradi
Key-Policy ABE with Switchable Attributes
Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
The One-More Discrete Logarithm Assumption in the Generic Group Model
Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez
Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez
Quantum Key Search for Ternary LWE
Iggy van Hoof, Elena Kirshanova, Alexander May
Iggy van Hoof, Elena Kirshanova, Alexander May
A Fast and Simple Partially Oblivious PRF, with Applications
Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood
Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung
Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung
Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors
Janaka Alawatugoda, Tatsuaki Okamoto
Janaka Alawatugoda, Tatsuaki Okamoto
Verification of the security in Boolean masked circuits
Vahid Jahandideh
Vahid Jahandideh
Concrete Evaluation of the Random Probing Security
Vahid Jahandideh
Vahid Jahandideh
Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4
Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluđerović
Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluđerović
Secure Computation for G-Module and its Applications
Qizhi Zhang, Bingsheng Zhang, Lichun Li, Shan Yin, Juanjuan Sun
Qizhi Zhang, Bingsheng Zhang, Lichun Li, Shan Yin, Juanjuan Sun
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang
Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang
Breaking and Fixing Virtual Channels: Domino Attack and Donner
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
PQC: R-Propping of a Simple Oblivious Transfer
Pedro Hecht
Pedro Hecht
Private Signaling
Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
Improved Structured Encryption for SQL Databases via Hybrid Indexing
David Cash, Ruth Ng, Adam Rivkin
David Cash, Ruth Ng, Adam Rivkin
Amun: Securing E-Voting Against Over-the-Shoulder Coercion
Riccardo Longo and Chiara Spadafora
Riccardo Longo and Chiara Spadafora
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack
Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié
Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma
Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE
Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada
Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
Rachit Garg, Rishab Goyal, George Lu, Brent Waters
Rachit Garg, Rishab Goyal, George Lu, Brent Waters
Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization
Bronson Brooks Richard, Gary Waugh
Bronson Brooks Richard, Gary Waugh
An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
A note on IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3
Loïs Huguenin-Dumittan, Serge Vaudenay
Loïs Huguenin-Dumittan, Serge Vaudenay
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions
Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade
Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade
PCPs and Instance Compression from a Cryptographic Lens
Liron Bronfman, Ron D. Rothblum
Liron Bronfman, Ron D. Rothblum
MPC for $Q_2$ Access Structures over Rings and Fields
Robin Jadoul, Nigel P. Smart, Barry Van Leeuwen
Robin Jadoul, Nigel P. Smart, Barry Van Leeuwen
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates
Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma
Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma
Prudent Practices in Security Standardization
Feng Hao
Feng Hao
Anonymous and Distributed Authentication for Peer-to-Peer Networks
Pasan Tennakoon, Supipi Karunathilaka, Rishikeshan Lavakumar, Janaka Alawatugoda
Pasan Tennakoon, Supipi Karunathilaka, Rishikeshan Lavakumar, Janaka Alawatugoda
On McEliece type cryptosystems using self-dual codes with large minimum weight
Luca Mariot, Stjepan Picek, Radinka Yorgova
Luca Mariot, Stjepan Picek, Radinka Yorgova
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs
Xiao Liang, Omkant Pandey
Xiao Liang, Omkant Pandey
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy
Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento
Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem
Vipul Goyal, Antigoni Polychroniadou, Yifan Song
Vipul Goyal, Antigoni Polychroniadou, Yifan Song
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song
Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song
Progressive And Efficient Verification For Digital Signatures
Cecilia Boschini, Dario Fiore, Elena Pagnin
Cecilia Boschini, Dario Fiore, Elena Pagnin
Private Remote Sources for Secure Multi-Function Computation
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
Analysis and Protection of the Two-metric Helper Data Scheme
Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl
Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers
Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander
Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom
Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom
TransNet: Shift Invariant Transformer Network for Side Channel Analysis
Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay
Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay
OpenSSLNTRU: Faster post-quantum TLS key exchange
Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
Security Characterization of J-PAKE and its Variants
Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Šala
Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Šala
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications
Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
One-out-of-$q$ OT Combiners
Oriol Farràs and Jordi Ribes-González
Oriol Farràs and Jordi Ribes-González
On the hardness of the NTRU problem
Alice Pellet-Mary, Damien Stehlé
Alice Pellet-Mary, Damien Stehlé
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent
Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo
Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes
Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes
CTng: Secure Certificate and Revocation Transparency
Hemi Leibowitz, Haitham Ghalwash, Ewa Syta, Amir Herzberg
Hemi Leibowitz, Haitham Ghalwash, Ewa Syta, Amir Herzberg
Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace
Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert
Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns
Alexandra Boldyreva, Tianxin Tang
Alexandra Boldyreva, Tianxin Tang
Linear Cryptanalysis of FF3-1 and FEA
Tim Beyne
Tim Beyne
A New Way to Achieve Round-Efficient Byzantine Agreement
Matthias Fitzi, Chen-Da Liu-Zhang, Julian Loss
Matthias Fitzi, Chen-Da Liu-Zhang, Julian Loss
Intelligent Composed Algorithms
Frank Byszio, Dr. Klaus-Dieter Wirth, Dr. Kim Nguyen
Frank Byszio, Dr. Klaus-Dieter Wirth, Dr. Kim Nguyen
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing
Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi, Andrei Sabelfeld
Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi, Andrei Sabelfeld
A General Purpose Transpiler for Fully Homomorphic Encryption
Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P. Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, Phillipp Schoppmann, Sasha Kulankhina, Alain Forget, David Marn, Cameron Tew, Rafael Misoczki, Bernat Guillen, Xinyu Ye, Dennis Kraft, Damien Desfontaines, Aishe Krishnamurthy, Miguel Guevara, Irippuge Milinda Perera, Yurii Sushko, Bryant Gipson
Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P. Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, Phillipp Schoppmann, Sasha Kulankhina, Alain Forget, David Marn, Cameron Tew, Rafael Misoczki, Bernat Guillen, Xinyu Ye, Dennis Kraft, Damien Desfontaines, Aishe Krishnamurthy, Miguel Guevara, Irippuge Milinda Perera, Yurii Sushko, Bryant Gipson
Efficient Asynchronous Byzantine Agreement without Private Setups
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
SoK: Efficient Privacy-preserving Clustering
Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
SNARGs for $\mathcal{P}$ from LWE
Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
Non-Interactive Batch Arguments for NP from Standard Assumptions
Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
Boosting the Security of Blind Signature Schemes
Jonathan Katz, Julian Loss, Michael Rosenberg
Jonathan Katz, Julian Loss, Michael Rosenberg
Practical Settlement Bounds for Proof-of-Work Blockchains
Peter Gaži, Ling Ren, Alexander Russell
Peter Gaži, Ling Ren, Alexander Russell
A Note on ``Reduction Modulo $2^{448}-2^{224}-1$''
Timothy Shelton
Timothy Shelton
On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption
Adi Akavia, Margarita Vald
Adi Akavia, Margarita Vald
On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing
Divesh Aggarwal, Eldon Chung, Maciej Obremski, João Ribeiro
Divesh Aggarwal, Eldon Chung, Maciej Obremski, João Ribeiro
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes
Mohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki
Mohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki
i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
Leemon Baird, Pratyay Mukherjee, Rohit Sinha
Leemon Baird, Pratyay Mukherjee, Rohit Sinha
Lattice Attacks on NTRU and LWE: A History of Refinements
Martin Albrecht, Léo Ducas
Martin Albrecht, Léo Ducas
Probabilistic Dynamic Input Output Automata (Extended Version)
Pierre Civit, Maria Potop-Butucaru
Pierre Civit, Maria Potop-Butucaru
LLVM-based Circuit Compilation for Practical Secure Computation
Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
How Byzantine is a Send Corruption?
Karim Eldefrawy, Julian Loss, Ben Terner
Karim Eldefrawy, Julian Loss, Ben Terner
Transforming Secure Comparison Protocol from Passive to Active Adversary Model
Wei Jiang
Wei Jiang
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor
Si Gao, Elisabeth Oswald, Dan Page
Si Gao, Elisabeth Oswald, Dan Page
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
Madhurima Mukhopadhyay, Palash Sarkar
Madhurima Mukhopadhyay, Palash Sarkar
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock
Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
A Side-Channel Assisted Attack on NTRU
Amund Askeland, Sondre Rønjom
Amund Askeland, Sondre Rønjom
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal
Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
Yael Tauman Kalai, Vinod Vaikuntanathan, Rachel Yun Zhang
Yael Tauman Kalai, Vinod Vaikuntanathan, Rachel Yun Zhang
Mobile Voting -- Still Too Risky?
Sven Heiberg, Kristjan Krips, Jan Willemson
Sven Heiberg, Kristjan Krips, Jan Willemson
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy
Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam
Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam
Lower bounds on lattice sieving and information set decoding
Elena Kirshanova, Thijs Laarhoven
Elena Kirshanova, Thijs Laarhoven
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols
Ignacio Fernández-Hernández, Tomer Ashur, Vincent Rijmen
Ignacio Fernández-Hernández, Tomer Ashur, Vincent Rijmen
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No
Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No
On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures
Tristan Nemoz, Alexei Zamyatin
Tristan Nemoz, Alexei Zamyatin
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli, Benjamin Smith
Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli, Benjamin Smith
Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance
Katie Liszewski, Tim McDonley, Josh Delozier, Andrew Elliott, Dylan Jones, Matt Sutter, Adam Kimura
Katie Liszewski, Tim McDonley, Josh Delozier, Andrew Elliott, Dylan Jones, Matt Sutter, Adam Kimura
More efficient post-quantum KEMTLS with pre-distributed public keys
Peter Schwabe, Douglas Stebila, and Thom Wiggers
Peter Schwabe, Douglas Stebila, and Thom Wiggers
Efficient secret key reusing attribute-based encryption from lattices
Xinyuan Qian, Wenyuan Wu
Xinyuan Qian, Wenyuan Wu
Asynchronous Data Dissemination and its Applications
Sourav Das, Zhuolun Xiang, Ling Ren
Sourav Das, Zhuolun Xiang, Ling Ren
SoK: Applying Blockchain Technology in Industrial Internet of Things
Gang Wang
Gang Wang
Completeness Theorems for Adaptively Secure Broadcast
Ran Cohen, Juan Garay, Vassilis Zikas
Ran Cohen, Juan Garay, Vassilis Zikas
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model
Akinori Hosoyamada, Tetsu Iwata
Akinori Hosoyamada, Tetsu Iwata
HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing
Ripon Patgiri, Malaya Dutta Borah
Ripon Patgiri, Malaya Dutta Borah
Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks
Emre Karabulut, Aydin Aysu
Emre Karabulut, Aydin Aysu
Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr
Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr
Multi-key Private Matching for Compute
Prasad Buddhavarapu, Benjamin M Case, Logan Gore, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Min Xue
Prasad Buddhavarapu, Benjamin M Case, Logan Gore, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Min Xue
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila
Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila
Privacy-Preserving Decision Trees Training and Prediction
Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation
Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven Watson
Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven Watson
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews, Michele Ciampi, Vassilis Zikas
John Andrews, Michele Ciampi, Vassilis Zikas
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
Covert Learning: How to Learn with an Untrusted Intermediary
Ran Canetti, Ari Karchmer
Ran Canetti, Ari Karchmer
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
Mathy Vanhoef
Mathy Vanhoef
A wide class of Boolean functions generalizing the hidden weight bit function
Claude Carlet
Claude Carlet
Parameterization of Boolean functions by vectorial functions and associated constructions
Claude Carlet
Claude Carlet
Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition
Saravanan Vijayakumaran
Saravanan Vijayakumaran
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica
Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica
Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function
Koji Nagata, Renata Wong, Do Ngoc Diep, Tadao Nakamura
Koji Nagata, Renata Wong, Do Ngoc Diep, Tadao Nakamura
On the Dual of Generalized Bent Functions
Jiaxin Wang, Fang-Wei Fu
Jiaxin Wang, Fang-Wei Fu
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators
Si Gao, Elisabeth Oswald
Si Gao, Elisabeth Oswald
Tetrad: Actively Secure 4PC for Secure Training and Inference
Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
Privacy-Preserving Training of Tree Ensembles over Continuous Data
Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen
Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen
Anonymous Device Authorization for Cellular Networks
Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro
Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro
Quantum Reduction of Finding Short Code Vectors to the Decoding Problem
Thomas Debris-Alazard, Maxime Remaud, Jean-Pierre Tillich
Thomas Debris-Alazard, Maxime Remaud, Jean-Pierre Tillich
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida
Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$
Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoit Razet, Peter Scholl
Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoit Razet, Peter Scholl
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
Mike Rosulek, Lawrence Roy
Mike Rosulek, Lawrence Roy
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss
Ke Wu, Gilad Asharov, Elaine Shi
Ke Wu, Gilad Asharov, Elaine Shi
Elmo: Recursive Virtual Payment Channels for Bitcoin
Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms
Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Generic-Group Identity-Based Encryption: A Tight Impossibility Result
Gili Schul-Ganz, Gil Segev
Gili Schul-Ganz, Gil Segev
Proofs of Isogeny Knowledge and Application to Post-quantum One-Time Verifiable Random Function
Antonin Leroux
Antonin Leroux
Manta: a Plug and Play Private DeFi Stack
Shumo Chu, Yu Xia, Zhenfei Zhang
Shumo Chu, Yu Xia, Zhenfei Zhang
Conclave: A Collective Stake Pool Protocol
Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
NTRU leads to Anonymous, Robust Public-Key Encryption
Keita Xagawa
Keita Xagawa
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
Keita Xagawa
Keita Xagawa
A New Approach to Garbled Circuits
Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
On the Impossibility of Purely Algebraic Signatures
Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu
Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu
GIFT-COFB is Tightly Birthday Secure with Encryption Queries
Akiko Inoue, Kazuhiko Minematsu
Akiko Inoue, Kazuhiko Minematsu
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation
Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt
Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt
Side-Channel Protections for Picnic Signatures
Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
Guarding the First Order: The Rise of AES Maskings
Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, and Zhenda Zhang
Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, and Zhenda Zhang
GenoPPML – a framework for genomic privacy-preserving machine learning
Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang
Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang
Pasta: A Case for Hybrid Homomorphic Encryption
Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang
Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang
Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE
Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
Laconic Private Set Intersection and Applications
Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Sihang Pu
Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Sihang Pu
SoK: Privacy-Preserving Computing in the Blockchain Era
Ghada Almashaqbeh, Ravital Solomon
Ghada Almashaqbeh, Ravital Solomon
Asymmetric All-or-nothing Transforms
Navid Nasr Esfahani, Douglas R. Stinson
Navid Nasr Esfahani, Douglas R. Stinson
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
Tri-op redactable blockchains with block modification, removal, and insertion
Mohammad Sadeq Dousti, Alptekin Küpçü
Mohammad Sadeq Dousti, Alptekin Küpçü
Cache attack on MISTY1
Haopeng Fan, Wenhao Wang, Yongjuan Wang, Wenyu Zhang, Qingjun Yuan
Haopeng Fan, Wenhao Wang, Yongjuan Wang, Wenyu Zhang, Qingjun Yuan
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda, Koji Nuida
Yusaku Maeda, Koji Nuida
Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms
Sulamithe Tsakou, Sorina Ionica
Sulamithe Tsakou, Sorina Ionica
On Reverse Engineering Neural Network Implementation on GPU
Łukasz Chmielewski, Léo Weissbart
Łukasz Chmielewski, Léo Weissbart
Enhancing Differential-Neural Cryptanalysis
Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu
Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu
Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy
Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy
Ablation Analysis for Multi-device Deep Learning-based Physical Side-channel Analysis
Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek
Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle
Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle
Hours of Horus: Keyless Cryptocurrency Wallets
Dionysis Zindros
Dionysis Zindros
CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography
Afifa Ishtiaq, Dr. Muhammad Shafique, Dr. Osman Hassan
Afifa Ishtiaq, Dr. Muhammad Shafique, Dr. Osman Hassan
Public Key Encryption with Flexible Pattern Matching
Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
DEFAULT: Cipher Level Resistance Against Differential Fault Attack
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal
Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal
VOProof: Efficient zkSNARKs from Vector Oracle Compilers
Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shi-Feng Sun, Geng Wang, and Dawu Gu
Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shi-Feng Sun, Geng Wang, and Dawu Gu
Bounded Collusion ABE for TMs from IBE
Rishab Goyal, Ridwan Syed, Brent Waters
Rishab Goyal, Ridwan Syed, Brent Waters
Anonymous, Robust Post-Quantum Public Key Encryption
Paul Grubbs, Varun Maram, Kenneth G. Paterson
Paul Grubbs, Varun Maram, Kenneth G. Paterson
Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation
Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
Cryptanalysis of an oblivious PRF from supersingular isogenies
Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso
Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso
Bridging Machine Learning and Cryptanalysis via EDLCT
Yi Chen, Hongbo Yu
Yi Chen, Hongbo Yu
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status
Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Stoecklin, Marko Vukolic, Marie Wallace
Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Stoecklin, Marko Vukolic, Marie Wallace
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm
Zhenzhen Bao, Jian Guo, Shun Li, and Phuong Pham
Zhenzhen Bao, Jian Guo, Shun Li, and Phuong Pham
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord
Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord
Multidimentional ModDiv public key exchange protocol
Samir Bouftass
Samir Bouftass
DeCSIDH: Delegating isogeny computations in the CSIDH setting
Robi Pedersen
Robi Pedersen
Radical Isogenies on Montgomery Curves
Hiroshi Onuki, Tomoki Moriya
Hiroshi Onuki, Tomoki Moriya
Multi-Dimensional Sub/Super-Range Signatures
Masahito Ishizaka, Shinsaku Kiyomoto
Masahito Ishizaka, Shinsaku Kiyomoto
GoAT: File Geolocation via Anchor Timestamping
Deepak Maram, Iddo Bentov, Mahimna Kelkar, and Ari Juels
Deepak Maram, Iddo Bentov, Mahimna Kelkar, and Ari Juels
The "quantum annoying" property of password-authenticated key exchange protocols
Edward Eaton, Douglas Stebila
Edward Eaton, Douglas Stebila
Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity
Atsushi Takayasu
Atsushi Takayasu
On Interactive Oracle Proofs for Boolean R1CS Statements
Ignacio Cascudo, Emanuele Giunta
Ignacio Cascudo, Emanuele Giunta
Hardware Penetration Testing Knocks Your SoCs Off
Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
General Bootstrapping Approach for RLWE-based Homomorphic Encryption
Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo
Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo
On Communication Models and Best-Achievable Security in Two-Round MPC
Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath
Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Ripon Patgiri
Ripon Patgiri
Statistical ZAPs from Group-Based Assumptions
Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu
Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu
Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup
Hanshen Xiao, Srinivas Devadas
Hanshen Xiao, Srinivas Devadas
Meteor: Cryptographically Secure Steganography for Realistic Distributions
Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel Rubin
Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel Rubin
Blind Side-Channel SIFA
Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner
Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner
Tight Setup Bounds for Identifiable Abort
Nicholas Brandt
Nicholas Brandt
S2Dedup: SGX-enabled Secure Deduplication
Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela
Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela
Batching Base Oblivious Transfers
Ian McQuoid, Mike Rosulek, Lawrence Roy
Ian McQuoid, Mike Rosulek, Lawrence Roy
Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
Efficient Attribute Based Encryption for Boolean Circuits
Alexandru Ionita
Alexandru Ionita
Permutation Based EDM: An Inverse Free BBB Secure PRF
Avijit Dutta, Mridul Nandi, Suprita Talnikar
Avijit Dutta, Mridul Nandi, Suprita Talnikar
Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves
Dmitrii Koshelev
Dmitrii Koshelev
Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes
Paul Cotan and George Teseleanu
Paul Cotan and George Teseleanu
Extending the GLS endomorphism to speed up GHS Weil descent using Magma
Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
3-round Feistel is Not Superpseudorandom Over Any Group
Hector B. Hougaard
Hector B. Hougaard
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers
Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li
Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy
Tianyi Liu, Xiang Xie, Yupeng Zhang
Tianyi Liu, Xiang Xie, Yupeng Zhang
PQC: R-Propping a Chaotic Cellular Automata
Pedro Hecht
Pedro Hecht
Multi-Threshold Byzantine Fault Tolerance
Atsuki Momose, Ling Ren
Atsuki Momose, Ling Ren
AOT: Anonymization by Oblivious Transfer
Farid Javani, Alan T. Sherman
Farid Javani, Alan T. Sherman
Pravuil: Global Consensus for a United World
David Cerezo Sánchez
David Cerezo Sánchez
Grover on SM3
Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors
Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
Secure cloud-of-clouds storage with space-efficient secret sharing
Ahad Niknia, Miguel Correia, Jaber Karimpour
Ahad Niknia, Miguel Correia, Jaber Karimpour
On the algebraic immunity of direct sum constructions
Pierrick Méaux
Pierrick Méaux
A Trustless GQ Multi-Signature Scheme with Identifiable Abort
Handong Cui and Tsz Hon Yuen
Handong Cui and Tsz Hon Yuen
On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note
Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
Verifying Post-Quantum Signatures in 8 kB of RAM
Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun, Wei Wang, Meiqin Wang
Ling Sun, Wei Wang, Meiqin Wang
Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design
Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, and Hong-Sheng Zhou
Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, and Hong-Sheng Zhou
Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution
Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios G. Tsoutsos, Michail Maniatakos
Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios G. Tsoutsos, Michail Maniatakos
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
Locally Reconstructable Non-malleable Secret Sharing
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny
Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
On the Effect of Projection on Rank Attacks in Multivariate Cryptography
Morten Øygarden, Daniel Smith-Tone, Javier Verbel
Morten Øygarden, Daniel Smith-Tone, Javier Verbel
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa
Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa
Smooth Zero-Knowledge Hash Functions
Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa
Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa
Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks
Arsalan Javeed, Cemal Yilmaz, Erkay Savas
Arsalan Javeed, Cemal Yilmaz, Erkay Savas
Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications
Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith
Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith
Structured Leakage and Applications to Cryptographic Constant-Time and Cost
Gilles Barthe, Benjamin Gregoire, Vincent Laporte, Swarn Priya
Gilles Barthe, Benjamin Gregoire, Vincent Laporte, Swarn Priya
On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator
Aurélien Dupin, Pierrick Méaux, Mélissa Rossi
Aurélien Dupin, Pierrick Méaux, Mélissa Rossi
Security of COFB against Chosen Ciphertext Attacks
Mustafa Khairallah
Mustafa Khairallah
privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm
Ripon Patgiri
Ripon Patgiri
Optimization of Advanced Encryption Standard on Graphics Processing Units
Cihangir Tezcan
Cihangir Tezcan
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Alexander May, Floyd Zweydinger
Alexander May, Floyd Zweydinger
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings
Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers
Muhammad ElSheikh, Amr M. Youssef
Muhammad ElSheikh, Amr M. Youssef
On the Cryptographic Deniability of the Signal Protocol
Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk
Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk
Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge
William Zhang, Yu Xia
William Zhang, Yu Xia
Security and Trust in Open Source Security Tokens
Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl
Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl
Indifferentiable Signatures: High Performance and Fallback Security
Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou
Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou
Efficient Constructions of Pairing Based Accumulators
Ioanna Karantaidou, Foteini Baldimtsi
Ioanna Karantaidou, Foteini Baldimtsi
Doubly-Affine Extractors, and their Applications
Yevgeniy Dodis, Kevin Yeo
Yevgeniy Dodis, Kevin Yeo
Communication Complexity of Private simultaneous Quantum Messages Protocols
Akinori Kawachi, Harumichi Nishimura
Akinori Kawachi, Harumichi Nishimura
symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography
Ripon Patgiri
Ripon Patgiri
Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions
Jakub Klemsa
Jakub Klemsa
CTIDH: faster constant-time CSIDH
Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková
Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková
Internet Computer Consensus
Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams
Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges
Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch
Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Mixing Techniques
Simin Ghesmati, Walid Fdhila, Edgar Weippl
Simin Ghesmati, Walid Fdhila, Edgar Weippl
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets
Joachim Neu, Ertem Nusret Tas, David Tse
Joachim Neu, Ertem Nusret Tas, David Tse
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries
Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro
Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro
Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device
Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
Plactic key agreement (insecure?)
Daniel R. L. Brown
Daniel R. L. Brown
Group Structure in Correlations and its Applications in Cryptography
Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas
Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas
Mining in Logarithmic Space
Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol
Ripon Patgiri, Naresh Babu Muppalaneni
Ripon Patgiri, Naresh Babu Muppalaneni
R-SWAP: Relay based atomic cross-chain swap protocol
Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru
Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru
Algebraic attacks on block ciphers using quantum annealing
Elżbieta Burek, Michał Misztal, Michał Wroński
Elżbieta Burek, Michał Misztal, Michał Wroński
Polar Coding for Ring-LWE-Based Public Key Encryption
Jiabo Wang, Cong Ling
Jiabo Wang, Cong Ling
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing
Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai
Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable
Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest
Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest
A Tutorial on Concurrent Zero Knowledge
Rafael Pass
Rafael Pass
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit
Rafael Pass
Rafael Pass
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE
Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu
Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu
Privacy-preserving Density-based Clustering
Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
Some Applications of Hamming Weight Correlations
Fatih Balli, Andrea Caforio, Subhadeep Banik
Fatih Balli, Andrea Caforio, Subhadeep Banik
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson
Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas
Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas
Layering diverse cryptography to lower risks of future and secret attacks: post-quantum estimates
Daniel R. L. Brown
Daniel R. L. Brown
Signed (Group) Diffie-Hellman Key Exchange with Tight Security
Jiaxin Pan, Chen Qian, Magnus Ringerud
Jiaxin Pan, Chen Qian, Magnus Ringerud
ZK-PCPs from Leakage-Resilient Secret Sharing
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
Benny Applebaum, Eyal Golombek
Benny Applebaum, Eyal Golombek
Masked Triples: Amortizing Multiplication Triples across Conditionals
David Heath, Vladimir Kolesnikov, Stanislav Peceny
David Heath, Vladimir Kolesnikov, Stanislav Peceny
Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults
Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha
Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak
Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data
Hanshen Xiao, Srinivas Devadas
Hanshen Xiao, Srinivas Devadas
Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group
Christian Porter, Andrew Mendelsohn, Cong Ling
Christian Porter, Andrew Mendelsohn, Cong Ling
Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
Proof of Assets in the Diem Blockchain
Panagiotis Chatzigiannis, Konstantinos Chalkias
Panagiotis Chatzigiannis, Konstantinos Chalkias
Accelerated RISC-V for Post-Quantum SIKE
Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico
Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico
Securing Parallel-chain Protocols under Variable Mining Power
Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
Zero Knowledge Contingent Payments for Trained Neural Networks
Zhelei Zhou, Xinlei Cao, Jian Liu, Bingsheng Zhang, Kui Ren
Zhelei Zhou, Xinlei Cao, Jian Liu, Bingsheng Zhang, Kui Ren
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
Shumo Chu, Danyang Zhuo, Elaine Shi, T-H. Hubert Chan
Shumo Chu, Danyang Zhuo, Elaine Shi, T-H. Hubert Chan
Side Channel Analysis against the ANSSI’s protected AES implementation on ARM
Loïc Masure, Rémi Strullu
Loïc Masure, Rémi Strullu
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky
Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky
An Algebraic Framework for Universal and Updatable SNARKs
Carla Ràfols, Arantxa Zapico
Carla Ràfols, Arantxa Zapico
White-Box Encryption Scheme Using a Quantum Memory
Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo
Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Thomas Haines, Johannes Mueller
Thomas Haines, Johannes Mueller
PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM
David Heath, Vladimir Kolesnikov
David Heath, Vladimir Kolesnikov
A New Approach for finding Low-Weight Polynomial Multiples
Laila El Aimani
Laila El Aimani
Exact Lattice Sampling from Non-Gaussian Distributions
Maxime Plançon, Thomas Prest
Maxime Plançon, Thomas Prest
Effects of Quantization on the Multiple-Round Secret-Key Capacity
Onur Gunlu, Ueli Maurer, Joao Ribeiro
Onur Gunlu, Ueli Maurer, Joao Ribeiro
Entropoids: Groups in Disguise
Lorenz Panny
Lorenz Panny
ethSTARK Documentation
StarkWare
StarkWare
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu
Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu
Lightweight, Maliciously Secure Verifiable Function Secret Sharing
Leo de Castro, Antigoni Polychroniadou
Leo de Castro, Antigoni Polychroniadou
Quantum Key-length Extension
Joseph Jaeger, Fang Song, Stefano Tessaro
Joseph Jaeger, Fang Song, Stefano Tessaro
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)
Itai Dinur
Itai Dinur
Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks
Dionysis Zindros
Dionysis Zindros
Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, and Antigoni Polychroniadou
Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, and Antigoni Polychroniadou
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu
Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu
Constructing More Quadratic APN Functions with the QAM Method
Yuyin Yu, Leo Perrin
Yuyin Yu, Leo Perrin
Compactness of Hashing Modes and Efficiency beyond Merkle Tree
Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy
Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE
Charanjit Singh Jutla, Nathan Manohar
Charanjit Singh Jutla, Nathan Manohar
Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond
Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini
Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini
Lattice sieving via quantum random walks
André Chailloux, Johanna Loyer
André Chailloux, Johanna Loyer
Automated Generation of Masked Hardware
David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich
David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems
Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
From Random Oracles to Ideal Signatures, and Back
Cong Zhang, Hong-Sheng Zhou
Cong Zhang, Hong-Sheng Zhou
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving
Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy
Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari-Kermani
A fusion algorithm for solving the hidden shift problem in finite abelian groups
Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens
Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors
Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari-Kermani
MOBS (Matrices Over Bit Strings) public key exchange
Nael Rahman, Vladimir Shpilrain
Nael Rahman, Vladimir Shpilrain
A Fresh Approach to Updatable Symmetric Encryption
Andrés Fabrega, Ueli Maurer, Marta Mularczyk
Andrés Fabrega, Ueli Maurer, Marta Mularczyk
Verifiable Decryption in the Head
Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
Dual lattice attacks for closest vector problems (with preprocessing)
Thijs Laarhoven, Michael Walter
Thijs Laarhoven, Michael Walter
Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori
Leo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuk
Leo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuk
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited
Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang
Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang
Grover on Caesar and Vigenère Ciphers
Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
André Chailloux, Thomas Debris-Alazard, Simona Etinski
André Chailloux, Thomas Debris-Alazard, Simona Etinski
Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network
Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon
Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon
Quadratic almost bent functions - their partial characterization and design in the spectral domain
Amar Bapić, Samir Hodžić, Enes Pasalic
Amar Bapić, Samir Hodžić, Enes Pasalic
High-assurance field inversion for curve-based cryptography
Benjamin Salling Hvass, Diego F. Aranha, and Bas Spitters
Benjamin Salling Hvass, Diego F. Aranha, and Bas Spitters
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper)
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Cube Attack against 843-Round Trivium
Yao Sun
Yao Sun
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi
Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto
Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
Improved guess-and-determine and distinguishing attacks on SNOW-V
Jing Yang, Thomas Johansson, Alexander Maximov
Jing Yang, Thomas Johansson, Alexander Maximov
The Case for SIKE: A Decade of the Supersingular Isogeny Problem
Craig Costello
Craig Costello
Symetric encryption algorithms based on the mathematical structure underlying the three body problem
Samir Bouftass.
Samir Bouftass.
Hardware Deployment of Hybrid PQC
Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg
Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle
Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions
Atsushi Takayasu
Atsushi Takayasu
A Composable Look at Updatable Encryption
Françoise Levy-dit-Vehel, Maxime Roméas
Françoise Levy-dit-Vehel, Maxime Roméas
SoK: Exploring Blockchains Interoperability
Gang Wang
Gang Wang
Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms
Latif AKÇAY, Berna ÖRS
Latif AKÇAY, Berna ÖRS
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$
Yanyi Liu, Rafael Pass
Yanyi Liu, Rafael Pass
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson, Douglas R. Stinson
Maura B. Paterson, Douglas R. Stinson
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
Rainbow on Cortex-M4
Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
LogStack: Stacked Garbling with $O(b \log b)$ Computation
David Heath, Vladimir Kolesnikov
David Heath, Vladimir Kolesnikov
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level
Yuan Yao, Tuna Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont
Yuan Yao, Tuna Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont
SnarkPack: Practical SNARK Aggregation
Nicolas Gailly, Mary Maller, Anca Nitulescu
Nicolas Gailly, Mary Maller, Anca Nitulescu
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
Denis Firsov, Henri Lakk, Ahto Truu
Denis Firsov, Henri Lakk, Ahto Truu
Practical solving of discrete logarithm problem over prime fields using quantum annealing
Michał Wroński
Michał Wroński
Reinforcement Learning-based Design of Side-channel Countermeasures
Jorai Rijsdijk, Lichao Wu, Guilherme Perin
Jorai Rijsdijk, Lichao Wu, Guilherme Perin
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis
Lichao Wu, Guilherme Perin
Lichao Wu, Guilherme Perin
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
Kwangsu Lee
Kwangsu Lee
No Time to Hash: On Super Efficient Entropy Accumulation
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
Public-key Cryptosystems and Signature Schemes from p-adic Lattices
Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao
Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
Optimal Randomized Partial Checking for Decryption Mix Nets
Thomas Haines, Johannes Mueller
Thomas Haines, Johannes Mueller
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment
Atakan Arslan, Muhammed Ali Bingöl
Atakan Arslan, Muhammed Ali Bingöl
How to Share and Own a Secret
Victor Ermolaev, Gamze Tillem
Victor Ermolaev, Gamze Tillem
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu, Rafael Pass
Yanyi Liu, Rafael Pass
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Xi, Yuhang Wang
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Xi, Yuhang Wang
Generic Constructions of Revocable Hierarchical Identity-based Encryption
Keita Emura, Atsushi Takayasu, Yohei Watanabe
Keita Emura, Atsushi Takayasu, Yohei Watanabe
Non-Interactive Zero Knowledge from Sub-exponential DDH
Abhishek Jain, Zhengzhong Jin
Abhishek Jain, Zhengzhong Jin
On One-way Functions from NP-Complete Problems
Yanyi Liu, Rafael Pass
Yanyi Liu, Rafael Pass
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
Tapas Pal, Ratna Dutta
Tapas Pal, Ratna Dutta
What Makes Fiat--Shamir zkSNARKs (Updatable SRS) Simulation Extractable?
Chaya Ganesh, Hamidreza Khoshakhlagh, Markulf Kohlweiss, Anca Nitulescu, Michal Zajac
Chaya Ganesh, Hamidreza Khoshakhlagh, Markulf Kohlweiss, Anca Nitulescu, Michal Zajac
Signer and Message Ambiguity from a Variety of Keys
George Teseleanu
George Teseleanu
On using the same key pair for Ed25519 and an X25519 based KEM
Erik Thormarker
Erik Thormarker
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee
Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee
The t-wise Independence of Substitution-Permutation Networks
Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan
Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan
Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
Robi Pedersen and Osmanbey Uzunkol
Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013
Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada
Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada
A Generic Method for Investigating Nonsingular Galois NFSRs
Xiao-Juan Wang, Tian Tian, Wen-Feng Qi
Xiao-Juan Wang, Tian Tian, Wen-Feng Qi
Almost-Asynchronous MPC under Honest Majority, Revisited
Matthieu Rambaud, Antoine Urban
Matthieu Rambaud, Antoine Urban
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
Kwangsu Lee, Joon Sik Kim
Kwangsu Lee, Joon Sik Kim
zkHawk: Practical Private Smart Contracts from MPC-based Hawk
Aritra Banerjee, Michael Clear, Hitesh Tewari
Aritra Banerjee, Michael Clear, Hitesh Tewari
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk
Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk
Optimizing Registration Based Encryption
Kelong Cong, Karim Eldefrawy, Nigel P. Smart
Kelong Cong, Karim Eldefrawy, Nigel P. Smart
SoK: Multi-Device Secure Instant Messaging
Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz
Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz
SoK: Design Tools for Side-Channel-Aware Implementations
IR Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
IR Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
Applications of SKREM-like symmetric key ciphers
Mircea Digulescu
Mircea Digulescu
Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions
Mircea Digulescu
Mircea Digulescu
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
Surbhi Shaw, Ratna Dutta
Surbhi Shaw, Ratna Dutta
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
Ming-Shing Chen, Tung Chou, Markus Krausz
Ming-Shing Chen, Tung Chou, Markus Krausz
Classic McEliece on the ARM Cortex-M4
Ming-Shing Chen, Tung Chou
Ming-Shing Chen, Tung Chou
A toolbox for verifiable tally-hiding e-voting systems
Véronique Cortier, Pierrick Gaudry, Quentin Yang
Véronique Cortier, Pierrick Gaudry, Quentin Yang
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE
Chao Liu, Anyu Wang, Zhongxiang Zheng
Chao Liu, Anyu Wang, Zhongxiang Zheng
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance
Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Hai Jin
Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Hai Jin
Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle
Javier Herranz, Ramiro Martínez, Manuel Sánchez
Javier Herranz, Ramiro Martínez, Manuel Sánchez
Xifrat Cryptanalysis - Compute the Mixing Function Without the Key
"Danny" Niu Jianfang
"Danny" Niu Jianfang
Security Analysis of End-to-End Encryption for Zoom Meetings
Takanori Isobe, Ryoma Ito
Takanori Isobe, Ryoma Ito
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme
Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF
Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh
Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh
Masking Kyber: First- and Higher-Order Implementations
Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal
Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie, Amir Moradi
Anita Aghaie, Amir Moradi
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform
Jakub Klemsa
Jakub Klemsa
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures
Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang
Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang
Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis
Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet
Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
Private Liquidity Matching using MPC
Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui
Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs
Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
Size, Speed, and Security: An Ed25519 Case Study
Cesar Pereida García, Sampo Sovio
Cesar Pereida García, Sampo Sovio
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$
Benny Applebaum, Oded Nir
Benny Applebaum, Oded Nir
Entropoid Based Cryptography
Danilo Gligoroski
Danilo Gligoroski
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report)
Coşku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi
Coşku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi
Key-schedule Security for the TLS 1.3 Standard
Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
A New Key Agreement Scheme Based On A Well-Known Property Of Powers
Michele Fabbrini
Michele Fabbrini
Cryptanalysis of `MAKE'
Daniel Brown, Neal Koblitz, Jason LeGrow
Daniel Brown, Neal Koblitz, Jason LeGrow
iTimed: Cache Attacks on the Apple A10 Fusion SoC
Gregor Haas, Seetal Potluri, Aydin Aysu
Gregor Haas, Seetal Potluri, Aydin Aysu
Improving Recent Side-Channel Attacks Against the DES Key Schedule
Andreas Wiemers, Johannes Mittmann
Andreas Wiemers, Johannes Mittmann
SoK: How (not) to Design and Implement Post-Quantum Cryptography
James Howe, Thomas Prest, Daniel Apon
James Howe, Thomas Prest, Daniel Apon
Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi
Aein Rezaei Shahmirzadi, Amir Moradi
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
SIRNN: A Math Library for Secure RNN Inference
Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi
Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm
Gideon Samid
Gideon Samid
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash
Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
Animesh Chhotaray, Thomas Shrimpton
Animesh Chhotaray, Thomas Shrimpton
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage
Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security
Veronika Kuchta, Amin Sakzad, Damien Stehle, Ron Steinfeld, Shi-Feng Sun
Veronika Kuchta, Amin Sakzad, Damien Stehle, Ron Steinfeld, Shi-Feng Sun
Merkle^2: A Low-Latency Transparency Log System
Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa
Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa
SAT-based Method to Improve Neural Distinguisher and Applications to SIMON
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously
Gang Wang
Gang Wang
RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain
Gang Wang, Mark Nixon
Gang Wang, Mark Nixon
Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring
Gang Wang, Mark Nixon, Mike Boudreaux
Gang Wang, Mark Nixon, Mike Boudreaux
On the Memory-Tightness of Hashed ElGamal
Ashrujit Ghoshal, Stefano Tessaro
Ashrujit Ghoshal, Stefano Tessaro
Explicit, Closed-form, General bounds for Cuckoo Hashing with a Stash
Daniel Noble
Daniel Noble
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding
Chitchanok Chuengsatiansup, Damien Stehle
Chitchanok Chuengsatiansup, Damien Stehle
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh Chandramouli, Ashish Choudhury, Arpita Patra
Anirudh Chandramouli, Ashish Choudhury, Arpita Patra
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups
Daniel Nager, "Danny" Niu Jianfang
Daniel Nager, "Danny" Niu Jianfang
Constructing a pairing-free certificateless proxy signature scheme from ECDSA
Cholun Kim
Cholun Kim
How to Backdoor a Cipher
Raluca Posteuca, Tomer Ashur
Raluca Posteuca, Tomer Ashur
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant
Yukun Wang, Mingqiang Wang
Yukun Wang, Mingqiang Wang
Two modifications for Loidreau's code-based cryptosystem
Wenshuo Guo, Fangwei Fu
Wenshuo Guo, Fangwei Fu
Recovering the Key from the Internal State of Grain-128AEAD
Donghoon Chang, Meltem Sonmez Turan
Donghoon Chang, Meltem Sonmez Turan
More Efficient Shuffle Argument from Unique Factorization
Toomas Krips, Helger Lipmaa
Toomas Krips, Helger Lipmaa
Formal security analysis of MPC-in-the-head zero-knowledge protocols
Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters
Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters
Algebraic Differential Fault Analysis on SIMON block cipher
Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo
Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo
Non-Interactive Anonymous Router
Elaine Shi, Ke Wu
Elaine Shi, Ke Wu
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb
Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb
Formations for the Quantum Random Oracle
Aaram Yun
Aaram Yun
XORBoost: Tree Boosting in the Multiparty Computation Setting
Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille
Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille
Unbounded Multi-Party Computation from Learning with Errors
Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
Lattice Enumeration on GPUs for fplll
Simon Pohmann, Marc Stevens, Jens Zumbrägel
Simon Pohmann, Marc Stevens, Jens Zumbrägel
New Practical Multivariate Signatures from a Nonlinear Modifier
Daniel Smith-Tone
Daniel Smith-Tone
A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk
Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
Generic Plaintext Equality and Inequality Proofs (Extended Version)
Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez Kempner
Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez Kempner
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
Yuqing Zhao, Wenqi Yu, Chun Guo
Yuqing Zhao, Wenqi Yu, Chun Guo
Security Analysis of SFrame
Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu
Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu
On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems
Vasyl Ustimenko
Vasyl Ustimenko
Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions
Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
Indistinguishability Obfuscation of Null Quantum Circuits and Applications
James Bartusek, Giulio Malavolta
James Bartusek, Giulio Malavolta
Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52
Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal
Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal
On The Dihedral Coset Problem
Javad Doliskani
Javad Doliskani
Ring-LWE over two-to-power cyclotomics is not hard
Hao Chen
Hao Chen
History Binding Signature
Shlomi Dolev, Matan Liber
Shlomi Dolev, Matan Liber
Cryptocurrencies with Security Policies and Two-Factor Authentication
Florian Breuer, Vipul Goyal, Giulio Malavolta
Florian Breuer, Vipul Goyal, Giulio Malavolta
Efficient Verification of Optimized Code: Correct High-speed X25519
Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko van Eekelen
Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko van Eekelen
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings
Sook Yan Hue, Jason Chia, Ji-Jian Chin
Sook Yan Hue, Jason Chia, Ji-Jian Chin
Blind Polynomial Evaluation and Data Trading
Yi Liu, Qi Wang, Siu-Ming Yiu
Yi Liu, Qi Wang, Siu-Ming Yiu
Unclonable Encryption, Revisited
Prabhanjan Ananth, Fatih Kaleoglu
Prabhanjan Ananth, Fatih Kaleoglu
Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions
Onur Gunlu, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko
Onur Gunlu, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM
Shlomi Dolev, Stav Doolman
Shlomi Dolev, Stav Doolman
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro
Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding
Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi
Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi
Improved Quantum Algorithms for the k-XOR Problem
André Schrottenloher
André Schrottenloher
Disappearing Cryptography in the Bounded Storage Model
Jiaxin Guan, Mark Zhandry
Jiaxin Guan, Mark Zhandry
Revisiting some results on APN and algebraic immune functions
Claude Carlet
Claude Carlet
Chain Reductions for Multi-Signatures and the HBMS Scheme
Mihir Bellare, Wei Dai
Mihir Bellare, Wei Dai
Atom: A Stream Cipher with Double Key Filter
Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
Leakage Resilient Value Comparison With Application to Message Authentication
Christoph Dobraunig, Bart Mennink
Christoph Dobraunig, Bart Mennink
Output Prediction Attacks on Block Ciphers using Deep Learning
Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi
Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi
Size of IK00 Branching Program
Yupu Hu, Xingting Dong, Baocang Wang
Yupu Hu, Xingting Dong, Baocang Wang
Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs
Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
Cryptanalysis of the Binary Permuted Kernel Problem
Thales Bandiera Paiva, Routo Terada
Thales Bandiera Paiva, Routo Terada
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq
Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Carmine Abate, Nikolaj Sidorenco, Catalin Hritcu, Kenji Maillard, and Bas Spitters
Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Carmine Abate, Nikolaj Sidorenco, Catalin Hritcu, Kenji Maillard, and Bas Spitters
LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem
Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
On the Validity of Spoofing Attack Against Safe is the New Smart
Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay
Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay
Quantum Encryption with Certified Deletion: Public Key and Attribute-Based
Ryo Nishimaki, Takashi Yamakawa
Ryo Nishimaki, Takashi Yamakawa
Key Agreement with Correlated Noise and Multiple Entities or Enrollments
Onur Gunlu
Onur Gunlu
How Private Are Commonly-Used Voting Rules?
Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas
Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas
New Standards for E-Voting Systems: Reflections on Source Code Examinations
Thomas Haines, Peter Roenne
Thomas Haines, Peter Roenne
Orthros: A Low-Latency PRF
Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto
Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange
Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran
Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran
Quantum-access security of the Winternitz one-time signature scheme
Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols
Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols
SAFELearn: Secure Aggregation for private FEderated Learning
Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
Yasufumi Hashimoto
Yasufumi Hashimoto
Analysis and Probing of Parallel Channels in the Lightning Network
Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov
Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov
GLV+HWCD for 2y^2=x^3+x/GF(8^91+5)
Daniel R. L. Brown
Daniel R. L. Brown
Signatures with Tight Multi-User Security from Search Assumptions
Jiaxin Pan, Magnus Ringerud
Jiaxin Pan, Magnus Ringerud
Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures
Shweta Agrawal, Damien Stehle, Anshu Yadav
Shweta Agrawal, Damien Stehle, Anshu Yadav
Certificateless Designated Verifier Proxy Signature
Cholun Kim
Cholun Kim
A Note on the Bias of Rotational Differential-Linear Distinguishers
Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu
Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu
Multiparty Reusable Non-Interactive Secure Computation from LWE
Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin
Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin
Attacks and weaknesses of BLS aggregate signatures
Nguyen Thoi Minh Quan
Nguyen Thoi Minh Quan
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds
Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa
Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines
Rafael Dowsley, Caleb Horst, Anderson C A Nascimento
Rafael Dowsley, Caleb Horst, Anderson C A Nascimento
ZXAD: High-volume Attack Mitigation for Tor
Akshaya Mani, Ian Goldberg
Akshaya Mani, Ian Goldberg
T5: Hashing Five Inputs with Three Compression Calls
Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi
Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi
Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees
Laia Amorós, Annamaria Iezzi, Kristin Lauter, Chloe Martindale, Jana Sotáková
Laia Amorós, Annamaria Iezzi, Kristin Lauter, Chloe Martindale, Jana Sotáková
Construction of minimal linear codes with few weights from weakly regular plateaued functions
Ahmet Sinak
Ahmet Sinak
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes
Abhiram Kothapalli, Srinath Setty, and Ioanna Tzialla
Abhiram Kothapalli, Srinath Setty, and Ioanna Tzialla
A Note on Algebraic Decomposition Method for Masked Implementation
Shoichi Hirose
Shoichi Hirose
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE
Aaron Hutchinson, Koray Karabina, Geovandro Pereira
Aaron Hutchinson, Koray Karabina, Geovandro Pereira
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer
Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer
Multiparty Computation with Covert Security and Public Verifiability
Peter Scholl, Mark Simkin, Luisa Siniscalchi
Peter Scholl, Mark Simkin, Luisa Siniscalchi
Updatable Signatures and Message Authentication Codes
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
RAGHAV: A new low power S-P network encryption design for resource constrained environment
GAURAV BANSOD
GAURAV BANSOD
Information Leakages in Code-based Masking: A Unified Quantification Approach
Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager
Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
Some New Constructions of Generalized Plateaued Functions
Jiaxin Wang, Fang-Wei Fu
Jiaxin Wang, Fang-Wei Fu
An Architecture for Blockchain-based Cloud Banking
Thuat Do
Thuat Do
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
Time- and Space-Efficient Arguments from Groups of Unknown Order
Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
AISY - Deep Learning-based Framework for Side-channel Analysis
Guilherme Perin, Lichao Wu, Stjepan Picek
Guilherme Perin, Lichao Wu, Stjepan Picek
Active Implementation of End-to-End Post-Quantum Encryption
Anton Tutoveanu
Anton Tutoveanu
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware
Georg Land, Pascal Sasdrich, Tim Güneysu
Georg Land, Pascal Sasdrich, Tim Güneysu
Efficient permutation protocol for MPC in the head
Peeter Laud
Peeter Laud
Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions
Alonso González, Alexandros Zacharakis
Alonso González, Alexandros Zacharakis
A Configurable Hardware Implementation of XMSS
Jan Philipp Thoma, Tim Güneysu
Jan Philipp Thoma, Tim Güneysu
Practical Dynamic Group Signatures Without Knowledge Extractors
Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park
Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
Konstantinos Chalkias, Francois Garillot, Yashvanth Kondi, Valeria Nikolaenko
Konstantinos Chalkias, Francois Garillot, Yashvanth Kondi, Valeria Nikolaenko
Post-quantum Resettably-Sound Zero Knowledge
Nir Bitansky, Michael Kellner, Omri Shmueli
Nir Bitansky, Michael Kellner, Omri Shmueli
Decoding supercodes of Gabidulin codes and applications to cryptanalysis
Maxime Bombar, Alain Couvreur
Maxime Bombar, Alain Couvreur
Attacking (EC)DSA With Partially Known Multiples of Nonces
Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis
Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum, Eliran Kachlon, Arpita Patra
Benny Applebaum, Eliran Kachlon, Arpita Patra
Private Blocklist Lookups with Checklist
Dmitry Kogan, Henry Corrigan-Gibbs
Dmitry Kogan, Henry Corrigan-Gibbs
Efficient and Universally Composable Single Secret Leader Election from Pairings
Dario Catalano, Dario Fiore, Emanuele Giunta
Dario Catalano, Dario Fiore, Emanuele Giunta
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Rishab Goyal, Jiahui Liu, Brent Waters
Rishab Goyal, Jiahui Liu, Brent Waters
MPCAuth: Multi-factor Authentication for Distributed-trust Systems
Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa
Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa
Clonable PUF: On the Design of PUFs That Share Equivalent Responses
Takashi Sato, Yuki Tanaka, Song Bian
Takashi Sato, Yuki Tanaka, Song Bian
Merkle Trees Optimized for Stateless Clients in Bitcoin
Bolton Bailey, Suryanarayana Sankagiri
Bolton Bailey, Suryanarayana Sankagiri
Non-interactive distributed key generation and key resharing
Jens Groth
Jens Groth
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge
Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES
Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier
Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry
Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry
Sumcheck Arguments and their Applications
Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
An $\tilde{O}(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$
Yuri Borissov and Miroslav Markov
Yuri Borissov and Miroslav Markov
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications
Radhakrishna Bhat, N R Sunitha, S S Iyengar
Radhakrishna Bhat, N R Sunitha, S S Iyengar
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud
Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud
Two Efficient and Regulatory Confidential Transaction Schemes
Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng
Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng
Mixup Data Augmentation for Deep Learning Side-Channel Attacks
Karim M. Abdellatif
Karim M. Abdellatif
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
Matteo Campanelli, Mathias Hall-Andersen
Matteo Campanelli, Mathias Hall-Andersen
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox
François Dupressoir, Konrad Kohbrok, and Sabine Oechsner
François Dupressoir, Konrad Kohbrok, and Sabine Oechsner
Spectrum: High-Bandwidth Anonymous Broadcast
Zachary Newman, Sacha Servan-Schreiber, Srinivas Devadas
Zachary Newman, Sacha Servan-Schreiber, Srinivas Devadas
Private AI: Machine Learning on Encrypted Data
Kristin E. Lauter
Kristin E. Lauter
0
Nguyen Thoi Minh Quan
Nguyen Thoi Minh Quan
Rinocchio: SNARKs for Ring Arithmetic
Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez
Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez
Abuse Resistant Law Enforcement Access Systems
Matthew Green, Gabriel Kaptchuk, Gijs Van Laer
Matthew Green, Gabriel Kaptchuk, Gijs Van Laer
Binding BIKE errors to a key pair
Nir Drucker, Shay Gueron, Dusan Kostic
Nir Drucker, Shay Gueron, Dusan Kostic
Tradeoff attacks on symmetric ciphers
Orhun Kara
Orhun Kara
Oblivious TLS via Multi-Party Computation
Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger
Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
Duong Tung Nguyen, Ni Trieu
Duong Tung Nguyen, Ni Trieu
Reusable Two-Round MPC from LPN
James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang
James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang
Faster homomorphic comparison operations for BGV and BFV
Ilia Iliashenko, Vincent Zucca
Ilia Iliashenko, Vincent Zucca
On Security Properties of All-or-nothing Transforms
Navid Nasr Esfahani, Douglas R. Stinson
Navid Nasr Esfahani, Douglas R. Stinson
Rank Estimation with Bounded Error via Exponential Sampling
Liron David, Avishai Wool
Liron David, Avishai Wool
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup
Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu
Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu
Improved Neural Aided Statistical Attack for Cryptanalysis
Yi Chen, Hongbo Yu
Yi Chen, Hongbo Yu
A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs
Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets
Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray
Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray
Threshold Garbled Circuits and Ad Hoc Secure Computation
Michele Ciampi, Vipul Goyal, Rafail Ostrovsky
Michele Ciampi, Vipul Goyal, Rafail Ostrovsky
A Compressed $\Sigma$-Protocol Theory for Lattices
Thomas Attema, Ronald Cramer, Lisa Kohl
Thomas Attema, Ronald Cramer, Lisa Kohl
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
SoK: Game-based Security Models for Group Key Exchange
Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila
Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Xavier Boyen, Thomas Haines, Johannes Mueller
Xavier Boyen, Thomas Haines, Johannes Mueller
The More The Merrier: Reducing the Cost of Large Scale MPC
S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich
S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael Phan, Zhenfei Zhang
Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael Phan, Zhenfei Zhang
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
Dmitrii Koshelev
Invariants for EA- and CCZ-equivalence of APN and AB functions
Nikolay Kaleyski
Nikolay Kaleyski
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen
Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen
On extensions of the one-time-pad
Bhupendra Singh, G. Athithan, Rajesh Pillai
Bhupendra Singh, G. Athithan, Rajesh Pillai
HashWires: Hyperefficient Credential-Based Range Proofs
Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler
Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice
Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design
Michael Zuzak, Ankur Srivastava
Michael Zuzak, Ankur Srivastava
Code-based signatures without trapdoors through restricted vectors
Marco Baldi, Franco Chiaraluce, Paolo Santini
Marco Baldi, Franco Chiaraluce, Paolo Santini
Thinking Outside the Superbox
Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche
Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Akinori Hosoyamada, Yu Sasaki
Akinori Hosoyamada, Yu Sasaki
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
Dummy Shuffling against Algebraic Attacks in White-box Implementations
Alex Biryukov, Aleksei Udovenko
Alex Biryukov, Aleksei Udovenko
Reactive Key-Loss Protection in Blockchains
Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris Kogias, Joshua Lind, David Wong, Tim Zakian
Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris Kogias, Joshua Lind, David Wong, Tim Zakian
Redeeming Reset Indifferentiability and Post-Quantum Groups
Mark Zhandry
Mark Zhandry
A Deeper Look at Machine Learning-Based Cryptanalysis
Adrien Benamira, David Gerault, Thomas Peyrin, Quan Quan Tan
Adrien Benamira, David Gerault, Thomas Peyrin, Quan Quan Tan
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge)
Justin Holmgren, Alex Lombardi, Ron D. Rothblum
Justin Holmgren, Alex Lombardi, Ron D. Rothblum
Quadratic Secret Sharing and Conditional Disclosure of Secrets
Amos Beimel, Hussien Othman, Naty Peter
Amos Beimel, Hussien Othman, Naty Peter
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State
Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum, Bernardo David, Tore Frederiksen
Carsten Baum, Bernardo David, Tore Frederiksen
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols
Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
Subquadratic SNARGs in the Random Oracle Model
Alessandro Chiesa, Eylon Yogev
Alessandro Chiesa, Eylon Yogev
Online-Extractability in the Quantum Random-Oracle Model
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Information-Set Decoding with Hints
Anna-Lena Horlemann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh
Anna-Lena Horlemann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh
More Communication Lower Bounds for Information-Theoretic MPC
Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach
Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach
On the Integer Polynomial Learning with Errors Problem
Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
Amril Syalim, Takashi Nishide, Kouichi Sakurai
Amril Syalim, Takashi Nishide, Kouichi Sakurai
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher
Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu
Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu
Large Message Homomorphic Secret Sharing from DCR and Applications
Lawrence Roy, Jaspal Singh
Lawrence Roy, Jaspal Singh
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding
Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
Isogeny-based key compression without pairings
Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
On the CCA Compatibility of Public-Key Infrastructure
Dakshita Khurana, Brent Waters
Dakshita Khurana, Brent Waters
PQC: R-Propping of a New Group-Based Digital Signature
Pedro Hecht
Pedro Hecht
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption
Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis
Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis
Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective
Daniel Slamanig and Christoph Striecks
Daniel Slamanig and Christoph Striecks
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters
Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Peter Rindal and Phillipp Schoppmann
Peter Rindal and Phillipp Schoppmann
On the Hardness of Module-LWE with Binary Secret
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
FAST: Fair Auctions via Secret Transactions
Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh
Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh
Non-Interactive Half-Aggregate Signatures Based on Module Lattices - A First Attempt
Katharina Boudgoust, Adeline Roux-Langlois
Katharina Boudgoust, Adeline Roux-Langlois
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
Claudio Orlandi, Peter Scholl, Sophia Yakoubov
Claudio Orlandi, Peter Scholl, Sophia Yakoubov
MIRACLE: MIcRo-ArChitectural Leakage Evaluation
Ben Marshall, Dan Page, James Webb
Ben Marshall, Dan Page, James Webb
A Geometric Approach to Homomorphic Secret Sharing
Yuval Ishai, Russell W. F. Lai, Giulio Malavolta
Yuval Ishai, Russell W. F. Lai, Giulio Malavolta
Fully projective radical isogenies in constant-time
Jesús-Javier Chi-Domínguez, Krijn Reijnders
Jesús-Javier Chi-Domínguez, Krijn Reijnders
Secure Wire Shuffling in the Probing Model
Jean-Sebastien Coron, Lorenzo Spignoli
Jean-Sebastien Coron, Lorenzo Spignoli
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from combinatorial statements
Shoichi Kamada
Shoichi Kamada
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
Low-Memory Algebraic Attacks on Round-Reduced LowMC
Fukang Liu, Takanori Isobe, Willi Meier
Fukang Liu, Takanori Isobe, Willi Meier
Multivariate Public Key Cryptosystem from Sidon Spaces
Netanel Raviv, Ben Langton, Itzhak Tamo
Netanel Raviv, Ben Langton, Itzhak Tamo
Improved single-round secure multiplication using regenerating codes
Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing
Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing
A Resource Binding Approach to Logic Obfuscation
Michael Zuzak, Yuntao Liu, Ankur Srivastava
Michael Zuzak, Yuntao Liu, Ankur Srivastava
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
Key Agreement with Physical Unclonable Functions and Biometric Identifiers
Onur Gunlu
Onur Gunlu
NeuroSCA: Evolving Activation Functions for Side-channel Analysis
Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek
Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek
Everlasting UC Commitments from Fully Malicious PUFs
Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh
Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh
Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets
David Knichel, Pascal Sasdrich, Amir Moradi
David Knichel, Pascal Sasdrich, Amir Moradi
Master-Key KDM-Secure ABE via Predicate Encoding
Shengyuan Feng, Junqing Gong, Jie Chen
Shengyuan Feng, Junqing Gong, Jie Chen
On the Ideal Shortest Vector Problem over Random Rational Primes
Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng
Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng
Forward Secret Encrypted RAM: Lower Bounds and Applications
Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo
Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo
Private Set Operations from Oblivious Switching
Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh
Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh
GAP: Born to Break Hiding
Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han
Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority
Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi
Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
Mark Zhandry, Cong Zhang
Mark Zhandry, Cong Zhang
SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
Weak Tweak-Keys for the CRAFT Block Cipher
Gregor Leander, Shahram Rasoolzadeh
Gregor Leander, Shahram Rasoolzadeh
Post-quantum Security of OAEP Transform
Ehsan Ebrahimi
Ehsan Ebrahimi
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
More Efficient Digital Signatures with Tight Multi-User Security
Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
New Public-Key Crypto-System EHT
Alessandro Budroni, Igor Semaev
Alessandro Budroni, Igor Semaev
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan
Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan
Fast Factoring Integers by SVP Algorithms
Claus Peter Schnorr
Claus Peter Schnorr
LL-ORAM: A Forward and Backward Private Oblivious RAM
Zhiqiang Wu, Xiaoyong Tang, Jin Wang, Tan Deng
Zhiqiang Wu, Xiaoyong Tang, Jin Wang, Tan Deng
Subversion-Resilient Public Key Encryption with Practical Watchdogs
Pascal Bemmann, Sebastian Berndt, Rongmao Chen, and Tibor Jager
Pascal Bemmann, Sebastian Berndt, Rongmao Chen, and Tibor Jager
Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing
Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang
Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
Nils Fleischhacker, Mark Simkin
Nils Fleischhacker, Mark Simkin
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng
Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng
Recovering or Testing Extended-Affine Equivalence
Anne Canteaut, Alain Couvreur, Léo Perrin
Anne Canteaut, Alain Couvreur, Léo Perrin
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
Murilo Coutinho, T. C. Souza Neto
Murilo Coutinho, T. C. Souza Neto
Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting
Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang
Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang
Quantum-safe HIBE: does it cost a Latte?
Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, and Máire O’Neill
Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, and Máire O’Neill
The Direction of Updatable Encryption Does Matter
Ryo Nishimaki
Ryo Nishimaki
A New Twofold Cornacchia-Type Algorithm
Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu
Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu
Snarky Ceremonies
Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov
Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov
SimS: a Simplification of SiGamal
Tako Boris Fouotsa, Christophe Petit
Tako Boris Fouotsa, Christophe Petit
Verifiable Random Functions with Optimal Tightness
David Niehues
David Niehues
How to Meet Ternary LWE Keys
Alexander May
Alexander May
Limbo: Efficient Zero-knowledge MPCitH-based Arguments
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy
Mesh Messaging in Large-scale Protests: Breaking Bridgefy
Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková
Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
Ling Sun, Wei Wang, Meiqin Wang
Ling Sun, Wei Wang, Meiqin Wang
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe
Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy
Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles
Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov
Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov
Sampling methods for cryptographic tests
George Marinakis
George Marinakis
Secure Poisson Regression
Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts
Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
Tsz Hon Yuen, Handong Cui, Xiang Xie
Tsz Hon Yuen, Handong Cui, Xiang Xie
Revisiting Homomorphic Encryption Schemes for Finite Fields
Andrey Kim, Yuriy Polyakov, Vincent Zucca
Andrey Kim, Yuriy Polyakov, Vincent Zucca
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
Tjerand Silde and Martin Strand
Tjerand Silde and Martin Strand
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices
Martin R. Albrecht, Russell W. F. Lai
Martin R. Albrecht, Russell W. F. Lai
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
Hanshen Xiao, Srinivas Devadas
Hanshen Xiao, Srinivas Devadas
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
Generic, Efficient and Isochronous Gaussian Sampling over the Integers
Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
Tatsuki Ono, Song Bian, Takashi Sato
Tatsuki Ono, Song Bian, Takashi Sato
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
Guilherme Perin, Lichao Wu, Stjepan Picek
Guilherme Perin, Lichao Wu, Stjepan Picek
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xu Liu, Mingqiang Wang
Xu Liu, Mingqiang Wang
Compilation of Function Representations for Secure Computing Paradigms
Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
Multitarget decryption failure attacks and their application to Saber and Kyber
Jan-Pieter D'Anvers, Senne Batsleer
Jan-Pieter D'Anvers, Senne Batsleer
Quantum Indifferentiability of SHA-3
Jan Czajkowski
Jan Czajkowski
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang
Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
Yunwen Liu, Siwei Sun, Chao Li
Yunwen Liu, Siwei Sun, Chao Li
Tight Security Bounds for Micali’s SNARGs
Alessandro Chiesa, Eylon Yogev
Alessandro Chiesa, Eylon Yogev
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh
Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter
Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter
Efficient State Management in Distributed Ledgers
Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias
Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
István András Seres, Máté Horváth, Péter Burcsi
István András Seres, Máté Horváth, Péter Burcsi
Group Signatures with User-Controlled and Sequential Linkability
Jesus Diaz, Anja Lehmann
Jesus Diaz, Anja Lehmann
Unique Chain Rule and its Applications
Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael Reiter
Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael Reiter
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang
An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
Tapas Pal, Ratna Dutta
Tapas Pal, Ratna Dutta
Generic Negation of Pair Encodings
Miguel Ambrona
Miguel Ambrona
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
On the Relationships between Different Methods for Degree Evaluation (Full Version)
Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang
Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang
Smart Contracts for Incentivized Outsourcing of Computation
Alptekin Küpçü, Reihaneh Safavi-Naini
Alptekin Küpçü, Reihaneh Safavi-Naini
TensorCrypto
Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang
Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah
Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah
Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
Wei Yu, Guangwu Xu
Wei Yu, Guangwu Xu
Fully Anonymous Group Signature with Verifier-Local Revocation
Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang, Chi Cheng, Ruoyu Ding
Xiaohan Zhang, Chi Cheng, Ruoyu Ding
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Seetal Potluri, Aydin Aysu
Seetal Potluri, Aydin Aysu
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab
Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab
Composition with Knowledge Assumptions
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Graph-Based Construction for Non-Malleable Codes
Shohei Satake, Yujie Gu, Kouichi Sakurai
Shohei Satake, Yujie Gu, Kouichi Sakurai
CNF-FSS and its Applications
Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity (Revisiting space-based security in the adaptive setting)
Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang
Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang
Generic Adaptor Signature
Xianrui Qin, Handong Cui, Tsz Hon Yuen
Xianrui Qin, Handong Cui, Tsz Hon Yuen
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
Tibor Jager, Rafael Kurek, David Niehues
Tibor Jager, Rafael Kurek, David Niehues
hbACSS: How to Robustly Share Many Secrets
Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller
Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
Nicolas Resch, Chen Yuan
Nicolas Resch, Chen Yuan
Sycon: A New Milestone in Designing ASCON-like Permutations
Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub
Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni
James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni
Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
Tamar Lichter Blanks, Stephen D. Miller
Tamar Lichter Blanks, Stephen D. Miller
On the Isogeny Problem with Torsion Point Information
Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti
Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti
Hybrid Dual Attack on LWE with Arbitrary Secrets
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang
On Sufficient Oracles for Secure Computation with Identifiable Abort
Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov
Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov
Two-Party Adaptor Signatures From Identification Schemes
Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
Quantum Security of the Legendre PRF
Paul Frixons, André Schrottenloher
Paul Frixons, André Schrottenloher
On methods of shortening ElGamal-type signatures
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher
Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher
Securely Computing Piecewise Constant Codes
Benjamin E. Diamond
Benjamin E. Diamond
A Security Framework for Distributed Ledgers
Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, and Dominique Schröder
Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, and Dominique Schröder
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
On Bitcoin Cash’s Target Recalculation Functions
Juan Garay, Yu Shen
Juan Garay, Yu Shen
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
Muah Kim, Onur Gunlu, Rafael F. Schaefer
Muah Kim, Onur Gunlu, Rafael F. Schaefer
Advanced Lattice Sieving on GPUs, with Tensor Cores
Léo Ducas, Marc Stevens, Wessel van Woerden
Léo Ducas, Marc Stevens, Wessel van Woerden
Practical and Scalable Access Control Mechanism for the Internet of Things using Time-bound Attribute-based Encryption
Clémentine Gritti, Emanuel Regnath, and Sebastian Steinhorst
Clémentine Gritti, Emanuel Regnath, and Sebastian Steinhorst
Order-Fair Consensus in the Permissionless Setting
Mahimna Kelkar, Soubhik Deb, Sreeram Kannan
Mahimna Kelkar, Soubhik Deb, Sreeram Kannan
Classic McEliece Implementation with Low Memory Footprint
Johannes Roth, Evangelos Karatsiolis, Juliane Krämer
Johannes Roth, Evangelos Karatsiolis, Juliane Krämer
Cryptographic Security of the MLS RFC, Draft 11
Chris Brzuska, Eric Cornelissen, Konrad Kohbrok
Chris Brzuska, Eric Cornelissen, Konrad Kohbrok
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
Dmitry Schelkunov
Acyclicity Programming for Sigma-Protocols
Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
Cryptanalysis of a code-based signature scheme without trapdoors
Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon, Rick Weber, Ghada Almashaqbeh
Ravital Solomon, Rick Weber, Ghada Almashaqbeh
Privacy-Preserving Feature Selection with Secure Multiparty Computation
Xiling Li, Rafael Dowsley, Martine De Cock
Xiling Li, Rafael Dowsley, Martine De Cock
Privacy-Preserving Video Classification with Convolutional Neural Networks
Sikha Pentyala, Rafael Dowsley, Martine De Cock
Sikha Pentyala, Rafael Dowsley, Martine De Cock
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu
Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu
Lattice-based weak curve fault attack on ECDSA
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei
Designing Tweakable Enciphering Schemes Using Public Permutations
Debrup Chakraborty, Avijit Dutta, Samir Kundu
Debrup Chakraborty, Avijit Dutta, Samir Kundu
Cuproof: A Novel Range Proof with Constant Size
Cong Deng, Xianghong Tang, Lin You, Gengran Hu, Shuhong Gao
Cong Deng, Xianghong Tang, Lin You, Gengran Hu, Shuhong Gao
Observer Attack on Stream Ciphers
Ramachandran Anantharaman, Virendra Sule
Ramachandran Anantharaman, Virendra Sule
Privacy Preserving and Resilient RPKI
Kris Shrishak, Haya Shulman
Kris Shrishak, Haya Shulman
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
Ozgun Ozerk, Can Elgezen, Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
Ozgun Ozerk, Can Elgezen, Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding
Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
Aner Ben Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky
Aner Ben Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
Yaron Gvili, Sarah Scheffler, Mayank Varia
Yaron Gvili, Sarah Scheffler, Mayank Varia
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez
Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez
Rabbit: Efficient Comparison for Secure Multi-Party Computation
Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh
Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh
High-Threshold AVSS with Optimal Communication Complexity
Nicolas Alhaddad, Mayank Varia, Haibin Zhang
Nicolas Alhaddad, Mayank Varia, Haibin Zhang
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
MAKE: a Matrix Action Key Exchange
Nael Rahman, Vladimir Shpilrain
Nael Rahman, Vladimir Shpilrain
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
Security Analysis of CPace
Michel Abdalla, Björn Haase, Julia Hesse
Michel Abdalla, Björn Haase, Julia Hesse
Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
Majid Salimi, Hamid Mala, Honorio Martin, Pedro Peris-Lopez
Majid Salimi, Hamid Mala, Honorio Martin, Pedro Peris-Lopez
A note on Post Quantum Onion Routing
Kelesidis Evgnosia-Alexandra
Kelesidis Evgnosia-Alexandra
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
Kenji Yasunaga
Sequential Logic Encryption Against Model Checking Attack
Amin Rezaei, Hai Zhou
Amin Rezaei, Hai Zhou
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Petr Cibik, Patrik Dobias
Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Petr Cibik, Patrik Dobias
A Decentralized and Encrypted National Gun Registry
Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi
Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi
A New Efficient Identity-Based Encryption Without Pairing
Majid Salimi
Majid Salimi
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck
Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck
OAE-RUP: A Strong Online AEAD Security Notion and its Application to SAEF
Amit Singh Bhati, Elena Andreeva, and Damian Vizar
Amit Singh Bhati, Elena Andreeva, and Damian Vizar
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion
Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion
Combined Fault and DPA Protection for Lattice-Based Cryptography
Daniel Heinz, Thomas Pöppelmann
Daniel Heinz, Thomas Pöppelmann
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
Sourav Das, Vinith Krishnan, Irene Miriam Isaac, and Ling Ren
Sourav Das, Vinith Krishnan, Irene Miriam Isaac, and Ling Ren
Property Inference from Poisoning
Melissa Chase, Esha Ghosh, Saeed Mahloujifar
Melissa Chase, Esha Ghosh, Saeed Mahloujifar
Image sets of perfectly nonlinear maps
Lukas Kölsch, Björn Kriepke, Gohar Kyureghyan
Lukas Kölsch, Björn Kriepke, Gohar Kyureghyan
A New and Improved Reduction Proof of Cascade PRF
Mridul Nandi
Mridul Nandi
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart
Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate
Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate
Reducing HSM Reliance in Payments through Proxy Re-Encryption
Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson
Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
New Public Key Cryptosystem (First Version)
Dieaa I. Nassr, M. Anwar, Hatem M. Bahig
Dieaa I. Nassr, M. Anwar, Hatem M. Bahig
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti, Marc Joye, Pascal Paillier
Ilaria Chillotti, Marc Joye, Pascal Paillier
A New Twofold Cornacchia-Type Algorithm and Its Applications
Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li
Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li
Fuzzy Message Detection
Gabrielle Beck, Julia Len, Ian Miers, Matthew Green
Gabrielle Beck, Julia Len, Ian Miers, Matthew Green
An Overview of the Hybrid Argument
Marc Fischlin, Arno Mittelbach
Marc Fischlin, Arno Mittelbach
ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences
Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu
Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu
On Elapsed Time Consensus Protocols
Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery
Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
Suhri Kim
Suhri Kim
Ariadne Thread and Pepper: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
Gilles Macario-Rat, Jacques Patarin
Gilles Macario-Rat, Jacques Patarin
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso, Britta Hale
Michael Troncoso, Britta Hale
Grades of Trust in Multiparty Computation
Jaskaran V. Singh, Nicholas Hopper
Jaskaran V. Singh, Nicholas Hopper
Private Stream Aggregation from Labeled Secret Sharing Schemes
Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla
Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren
Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
An Incentive-Compatible Smart Contract for Decentralized Commerce
Nikolaj I. Schwartzbach
Nikolaj I. Schwartzbach
Magnetic RSA
Rémi Géraud-Stewart, David Naccache
Rémi Géraud-Stewart, David Naccache
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
A Generalization of the Subfield Construction
Kamil Otal
Kamil Otal
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat, Bart Preneel
Mahdi Sedaghat, Bart Preneel
Application of Velusqrt algorithm to Huff's and general Huff's curves
Michał Wroński
Michał Wroński
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
Servio Paguada, Lejla Batina, Igor Armendariz
Servio Paguada, Lejla Batina, Igor Armendariz
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
Banquet: Short and Fast Signatures from AES
Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck, Jan-Pieter D’Anvers, Ingrid Verbauwhede
Michiel Van Beirendonck, Jan-Pieter D’Anvers, Ingrid Verbauwhede
A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers
Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh
Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
Dorin-Marian Ionita, Emil Simion
Dorin-Marian Ionita, Emil Simion
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl, Lukas Prokop
Peter Pessl, Lukas Prokop
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla
Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
Dominique Unruh
Dominique Unruh
A Note on IBE Performance of a Practical Application
Ştefan Maftei, Marius Supuran, Emil Simion
Ştefan Maftei, Marius Supuran, Emil Simion
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, and Udi Peled
Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, and Udi Peled
The Cost of Adaptivity in Security Games on Graphs
Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
A Performance Study of Crypto-Hardware in the Low-end IoT
Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch
Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch
Correlation Intractability vs. One-wayness
Tamer Mour
Tamer Mour
The Study of Modulo $2^n$
Zhongfeng Niu
Zhongfeng Niu
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte, Björn Scheuermann
Jan Sebastian Götte, Björn Scheuermann
The Cost of IEEE Arithmetic in Secure Computation
David W. Archer, Shahla Atapoor, Nigel P. Smart
David W. Archer, Shahla Atapoor, Nigel P. Smart
On Algebraic Embedding for Unstructured Lattices
Madalina Bolboceanu, Zvika Brakerski, and Devika Sharma
Madalina Bolboceanu, Zvika Brakerski, and Devika Sharma
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart, David Naccache
Rémi Géraud-Stewart, David Naccache
How Much can F5 Really Do
Jintai Ding, Zheng Zhang, Joshua Deaton
Jintai Ding, Zheng Zhang, Joshua Deaton
The Distinguishing Attack on HFE
Joshua Deaton, Jintai Ding
Joshua Deaton, Jintai Ding
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
Mark D. Aagaard, Nusa Zidaric
Mark D. Aagaard, Nusa Zidaric
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
Evolution of Bulletin Board & its application to E-Voting – A Survey
Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai
Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai
Efficient Lattice-Based Inner-Product Functional Encryption
Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian
Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo, Hervé Chabanne, Melek Önen
Alberto Ibarrondo, Hervé Chabanne, Melek Önen
Addra: Metadata-private voice communication over fully untrusted infrastructure
Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay, Palash Sarkar
Madhurima Mukhopadhyay, Palash Sarkar
Correcting Subverted Random Oracles
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md Mahbub Alam
Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md Mahbub Alam
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Any Muanalifah, Serge˘ı Sergeev
Any Muanalifah, Serge˘ı Sergeev
Practical FHE parameters against lattice attacks
Jung Hee Cheon, Yongha Son, Donggeon Yhee
Jung Hee Cheon, Yongha Son, Donggeon Yhee
Streaming Merkle Proofs within Binary Numeral Trees
Luke Champine
Luke Champine
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Niluka Amarasinghe, Xavier Boyen, Matthew McKague
Niluka Amarasinghe, Xavier Boyen, Matthew McKague
Sketches for Blockchains
Ori Rottenstreich
Ori Rottenstreich
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran, Divya Gupta, Akash Shah
Nishanth Chandran, Divya Gupta, Akash Shah
Quantum-resistant Anonymous IBE with Traceable Identities
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
Experimental relativistic zero-knowledge proofs
Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden
Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden
A Comparative Study of Cryptographic Key Distribution Protocols
Alexandru-Ștefan Gheorghieș, Darius-Marian Lăzăroi, Emil Simion
Alexandru-Ștefan Gheorghieș, Darius-Marian Lăzăroi, Emil Simion
Linear-time and post-quantum zero-knowledge SNARKs for R1CS
Jonathan Lee, Srinath Setty, Justin Thaler, Riad Wahby
Jonathan Lee, Srinath Setty, Justin Thaler, Riad Wahby
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Thomas Schneider, Oleksandr Tkachenko
Thomas Schneider, Oleksandr Tkachenko
A Side Journey to Titan
Victor LOMNE, Thomas ROCHE
Victor LOMNE, Thomas ROCHE
E-voting protocols in context of COVID19
Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Simion Emil
Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Simion Emil
A Gapless Code-Based Hash Proof System based on RQC and its Applications
Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit
Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit
FLAME: Taming Backdoors in Federated Learning
Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
Pedro Hecht
Pedro Hecht
What is Meant by Permissionless Blockchains?
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila
Increasing Precision of Division Property
Patrick Derbez, Pierre-Alain Fouque
Patrick Derbez, Pierre-Alain Fouque
Fake Near Collisions Attacks
Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard
Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard
Catching the Fastest Boomerangs - Application to SKINNY
Stéphanie Delaune, Patrick Derbez, Mathieu Vavrille
Stéphanie Delaune, Patrick Derbez, Mathieu Vavrille
Kummer versus Montgomery Face-off over Prime Order Fields
Kaushik Nath, Palash Sarkar
Kaushik Nath, Palash Sarkar
Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
Yuhao Yang, Xiujie Huang
Yuhao Yang, Xiujie Huang
Lightweight Techniques for Private Heavy Hitters
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody
Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody
SoK: Remote Power Analysis
Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley
Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley
Efficient Multilinear Map from Graded Encoding Scheme
Majid Salimi
Majid Salimi
An atlas of the Richelot isogeny graph
Enric Florit, Benjamin Smith
Enric Florit, Benjamin Smith
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Enric Florit, Benjamin Smith
Enric Florit, Benjamin Smith
Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager
Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager
Compcrypt -- Lightweight ANS-based Compression and Encryption
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
Demand-aware Channel Topologies for Off-chain Blockchain Payments
Julia Khamis, Ori Rottenstreich
Julia Khamis, Ori Rottenstreich
A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
M. R. Mirzaee Shamsabad, S. M. Dehnavi
M. R. Mirzaee Shamsabad, S. M. Dehnavi
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee
Privacy-Preserving Privacy Profile Proposal Protocol
Wyatt Howe, Andrei Lapets
Wyatt Howe, Andrei Lapets
Aggregatable Distributed Key Generation
Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu
Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
Ismail San
Ismail San
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
Mahdi Mahdavi Oliaee, Zahra Ahmadian
Mahdi Mahdavi Oliaee, Zahra Ahmadian
Can Lattice Signature be as Efficient as Lattice Encryption?
Dingfeng Ye
Dingfeng Ye
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
Michel Abdalla, David Pointcheval, Azam Soleimanian
Michel Abdalla, David Pointcheval, Azam Soleimanian
Neural Aided Statistical Attack for Cryptanalysis
Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
Getting Rid of Linear Algebra in Number Theory Problems
Paul Kirchner, Pierre-Alain Fouque
Paul Kirchner, Pierre-Alain Fouque
Proof-Carrying Data without Succinct Arguments
Benedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner
Benedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner
Arguments of Knowledge via hidden order groups
Steve Thakur
Steve Thakur
Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold
Fan Peng, Hao Chen, Chang-An Zhao
Fan Peng, Hao Chen, Chang-An Zhao
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
Jiangtao Yuan, Guoai Xu, Guosheng Xu
Jiangtao Yuan, Guoai Xu, Guosheng Xu
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn, Edgar Weippl
Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn, Edgar Weippl
Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures
Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta
Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta
A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-wei Fu, Chenyu Wang
Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-wei Fu, Chenyu Wang
SLAP: Simple Lattice-Based Private Stream Aggregation Protocol
Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung
Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung
New directions in the ransomware phenomenon
Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion
Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion
A new method for secondary constructions of vectorial bent functions
Amar Bapić, Enes Pasalic
Amar Bapić, Enes Pasalic
Cryptographic competitions
Daniel J. Bernstein
Daniel J. Bernstein
Manta: Privacy Preserving Decentralized Exchange
Shumo Chu, Qiudong Xia, Zhenfei Zhang
Shumo Chu, Qiudong Xia, Zhenfei Zhang
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
$P_4$-free Partition and Cover Numbers and Application
Alexander R. Block, Simina Branzei, Hemanta K. Maji, Himanshi Mehta, Tamalika Mukherjee, Hai H. Nguyen
Alexander R. Block, Simina Branzei, Hemanta K. Maji, Himanshi Mehta, Tamalika Mukherjee, Hai H. Nguyen
An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits
Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen
Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen
One-Time Delegation of Unlinkable Signing Rights and Its Application
Takashi Nishide
Takashi Nishide
Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor
Aurélien Greuet, Simon Montoya, Guénaël Renault
Aurélien Greuet, Simon Montoya, Guénaël Renault
Adaptive layer-two dispute periods in blockchains
Rami Khalil, Naranker Dulay
Rami Khalil, Naranker Dulay
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz
Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou
MILP Based Differential Attack on Round Reduced WARP
Manoj Kumar, Tarun Yadav
Manoj Kumar, Tarun Yadav
A New Improved AES S-box With Enhanced Properties
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Batched Differentially Private Information Retrieval
Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi
Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi
Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting
Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
Bootstrapping on SEAL
HyungChul Kang, Joon-Woo Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
HyungChul Kang, Joon-Woo Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies
Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani
Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time
Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs
Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs
Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election
Kai-Min Chung, T-H. Hubert Chan, Ting Wen, Elaine Shi
Kai-Min Chung, T-H. Hubert Chan, Ting Wen, Elaine Shi
RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication
Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
Unifying Presampling via Concentration Bounds
Siyao Guo, Qian Li, Qipeng Liu, Jiapeng Zhang
Siyao Guo, Qian Li, Qipeng Liu, Jiapeng Zhang
Deniable Fully Homomorphic Encryption from LWE
Shweta Agrawal, Shafi Goldwasser, Saleet Mossel
Shweta Agrawal, Shafi Goldwasser, Saleet Mossel
On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences
Claude Carlet
Claude Carlet
CirC: Compiler infrastructure for proof systems, software verification, and more
Alex Ozdemir, Fraser Brown, Riad S. Wahby
Alex Ozdemir, Fraser Brown, Riad S. Wahby
Semi-Regularity of Pairs of Boolean Polynomials
Timothy J. Hodges, Hari R. Iyer
Timothy J. Hodges, Hari R. Iyer
Post-Quantum Hash-Based Signatures for Secure Boot
Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff
Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application
Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
Remark on the Security of CKKS Scheme in Practice
Jung Hee Cheon, Seungwan Hong, Duhyeong Kim
Jung Hee Cheon, Seungwan Hong, Duhyeong Kim
Achieving State Machine Replication without Honest Players
Conor McMenamin, Vanesa Daza, Matteo Pontecorvi
Conor McMenamin, Vanesa Daza, Matteo Pontecorvi
Efficient Verifiable Image Redacting based on zk-SNARKs
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM
Tung Chou
Tung Chou
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning
Alessandro Baccarini, Marina Blanton, and Chen Yuan
Alessandro Baccarini, Marina Blanton, and Chen Yuan
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free
Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
(In)security of the Radio Interface in Sigfox
Loïc Ferreira
Loïc Ferreira
Analysing Mining Machine Shutdown Price
Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph Liu
Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph Liu
Halo 0.9: A Halo Protocol with Fully-Succinctness
Lira Wang
Lira Wang
Achieve Fully Decentralized End to End encryption meeting via Blockchain
Yang Tan
Yang Tan
Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server
Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud
Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud
Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary
Onur Gunlu, Rafael F. Schaefer
Onur Gunlu, Rafael F. Schaefer
Optimal Communication Complexity of Authenticated Byzantine Agreement
Atsuki Momose, Ling Ren
Atsuki Momose, Ling Ren
Compact Certificates of Collective Knowledge
Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid
Yadi Ye, Leyou Zhang, Yi Mu, Wenting You
Yadi Ye, Leyou Zhang, Yi Mu, Wenting You
An efficient and provably secure authenticated key agreement scheme for mobile edge computing
Mohammad Amin Rakeei, Farokhlagha Moazami
Mohammad Amin Rakeei, Farokhlagha Moazami
Achieving privacy and accountability in traceable digital currency
Amira Barki, Aline Gouget
Amira Barki, Aline Gouget
Prime Proof Protocol
Anna M. Johnston, Rathna Ramesh
Anna M. Johnston, Rathna Ramesh
Verifiable Timed Signatures Made Practical
Sri Aravinda KrishnanThyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
Sri Aravinda KrishnanThyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet, Pierrick Méaux
Claude Carlet, Pierrick Méaux
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance
Ryan Karl, Jonathan Takeshita, Nirajan Koirla, Taeho Jung
Ryan Karl, Jonathan Takeshita, Nirajan Koirla, Taeho Jung
Modified Cache Template Attack on AES
Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
Double-Odd Elliptic Curves
Thomas Pornin
Thomas Pornin
Efficient Quantum Public-Key Encryption From Learning With Errors
Javad Doliskani
Javad Doliskani
Honest Majority MPC with Abort with Minimal Online Communication
Daniel Escudero, Anders Dalskov
Daniel Escudero, Anders Dalskov
Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange
Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel
Xiaolu Hou, Jakub Breier, Shivam Bhasin
Xiaolu Hou, Jakub Breier, Shivam Bhasin
A Novel Asymmetric Searchable Encryption Scheme with Granting search capability
Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
Threshold Password-Hardened Encryption Services
Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt
Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt
Multi-Client Oblivious RAM with Poly-Logarithmic Communication
Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta
Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta
Foundations of Ring Sampling
Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin
Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin
High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization
Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, HyungChul Kang
Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, HyungChul Kang
CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
Valerio Cini, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
Two-server Distributed ORAM with Sublinear Computation and Constant Rounds
Ariel Hamlin, Mayank Varia
Ariel Hamlin, Mayank Varia
Privacy-Preserving Epidemiological Modeling on Mobile Graphs
Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, and Ajith Suresh
Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, and Ajith Suresh
A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications
Howard M. Heys
Howard M. Heys
PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update
Rachit Rawat, Mahabir Prasad Jhanwar
Rachit Rawat, Mahabir Prasad Jhanwar
CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing
Deepraj Pandey, Nandini Agrawal, Mahabir Prasad Jhanwar
Deepraj Pandey, Nandini Agrawal, Mahabir Prasad Jhanwar
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version)
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar
PsiBench: Pragmatic Benchmark of Two-party Private Set Intersection.
Ziyuan Liang, Weiran Liu, Hanwen Feng, Feng Han, Liqiang Peng, Li Peng, Chao Li, Guorui Xu, Lei Zhang, and Fan Zhang
Ziyuan Liang, Weiran Liu, Hanwen Feng, Feng Han, Liqiang Peng, Li Peng, Chao Li, Guorui Xu, Lei Zhang, and Fan Zhang
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem
Martin R. Albrecht, Nadia Heninger
Martin R. Albrecht, Nadia Heninger
Information-Theoretic Security of Cryptographic Channels
Marc Fischlin, Felix Günther, Philipp Muth
Marc Fischlin, Felix Günther, Philipp Muth
Homological Characterization of bounded $F_2$-regularity
Timothy J. Hodges, Sergio Molina
Timothy J. Hodges, Sergio Molina
Comments on “ Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve”
Nizamud Din, Abdul Waheed, Nasir Saeed
Nizamud Din, Abdul Waheed, Nasir Saeed
Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme
Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
Designer Primes
Anna M. Johnston
Anna M. Johnston
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
SeongHyuck Lim, JongHyeok Lee, Dong-Guk Han
SeongHyuck Lim, JongHyeok Lee, Dong-Guk Han
On the Security of Homomorphic Encryption on Approximate Numbers
Baiyu Li, Daniele Micciancio
Baiyu Li, Daniele Micciancio
Oblivious Pseudorandom Functions from Isogenies
Dan Boneh, Dmitry Kogan, Katharine Woo
Dan Boneh, Dmitry Kogan, Katharine Woo
Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions
Evangelia Anna Markatou, Francesca Falzon, William Schor, Roberto Tamassia
Evangelia Anna Markatou, Francesca Falzon, William Schor, Roberto Tamassia
Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks
Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions
Claude Carlet
Claude Carlet
On the Concurrent Composition of Quantum Zero-Knowledge
Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa
Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa
Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier
Jonathan Bootle, Alessandro Chiesa, Siqi Liu
Jonathan Bootle, Alessandro Chiesa, Siqi Liu
Flexible and Efficient Verifiable Computation on Encrypted Data
Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim
Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian Janson
Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian Janson
Nonce-Misuse Security of the SAEF Authenticated Encryption mode
Elena Andreeva, Amit Singh Bhati, Damian Vizar
Elena Andreeva, Amit Singh Bhati, Damian Vizar
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting
Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng
Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng
Reducing Participation Costs via Incremental Verification for Ledger Systems
Weikeng Chen, Alessandro Chiesa, Emma Dauterman, Nicholas P. Ward
Weikeng Chen, Alessandro Chiesa, Emma Dauterman, Nicholas P. Ward
Delegated RingCT: faster anonymous transactions
Rui Morais, Paul Crocker, Simao Melo de Sousa
Rui Morais, Paul Crocker, Simao Melo de Sousa
The SQALE of CSIDH: Sublinear Vélu Quantum-resistant isogeny Action with Low Exponents
Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez
Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2
Sven Schäge, Jörg Schwenk, Sebastian Lauer
Sven Schäge, Jörg Schwenk, Sebastian Lauer
Botnet IND: About Botnets of Botless IoT Devices
Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici
Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici
Constructing Locally Leakage-resilient Linear Secret-sharing Schemes
Hemanta Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
Hemanta Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
How to compute all Pointproofs
Alin Tomescu
Alin Tomescu
The classification of quadratic APN functions in 7 variables
Konstantin Kalgin, Valeriya Idrisova
Konstantin Kalgin, Valeriya Idrisova
Improved privacy-preserving training using fixed-Hessian minimisation
Tabitha Ogilvie, Rachel Player, Joe Rowell
Tabitha Ogilvie, Rachel Player, Joe Rowell
Indifferentiable hashing from Elligator 2
Mike Hamburg
Mike Hamburg
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze
Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze
Balancing Privacy and Accountability in Blockchain Identity Management
Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi
Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi
Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP
Jun Yan
Jun Yan
Single-Message Credential-Hiding Login
Kevin Lewi, Payman Mohassel, Arnab Roy
Kevin Lewi, Payman Mohassel, Arnab Roy
A Combinatorial Approach to Quantum Random Functions
Nico Döttling, Giulio Malavolta, Sihang Pu
Nico Döttling, Giulio Malavolta, Sihang Pu
Improvements to RSA key generation and CRT on embedded devices
Mike Hamburg, Mike Tunstall, Qinglai Xiao
Mike Hamburg, Mike Tunstall, Qinglai Xiao
Recovering cryptographic keys from partial information, by example
Gabrielle De Micheli, Nadia Heninger
Gabrielle De Micheli, Nadia Heninger
Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model
Mariusz Jurkiewicz
Mariusz Jurkiewicz
The Age of Testifying Wearable Devices: The Case of Intoxication Detection
Ben Nassi, Lior Rokach, Yuval Elovici
Ben Nassi, Lior Rokach, Yuval Elovici
Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER
Satoshi Okada, Yuntao Wang
Satoshi Okada, Yuntao Wang
Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques
Kamil Kluczniak
Kamil Kluczniak
PANCAKE: Frequency Smoothing for Encrypted Data Stores
Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
Oblivious Transfer is in MiniQCrypt
Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan
Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan
Analysing the HPKE Standard
Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
EPID with Malicious Revocation
Olivier Sanders, Jacques Traoré
Olivier Sanders, Jacques Traoré
A note on the calculation of some functions in finite fields: Tricks of the Trade
Michael Scott
Michael Scott
Pseudo-Free Families and Cryptographic Primitives
Mikhail Anokhin
Mikhail Anokhin
CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors
Seyedeh Sharareh Mirzargar, Andrea Guerrieri, Mirjana Stojilović
Seyedeh Sharareh Mirzargar, Andrea Guerrieri, Mirjana Stojilović
Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs
Seyedeh Sharareh Mirzargar, Gaiëtan Renault, Andrea Guerrieri, Mirjana Stojilović
Seyedeh Sharareh Mirzargar, Gaiëtan Renault, Andrea Guerrieri, Mirjana Stojilović
Verified fast formulas for control bits for permutation networks
Daniel J. Bernstein
Daniel J. Bernstein
Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices
Thomas Kaeding
Thomas Kaeding
Partitioning Oracle Attacks
Julia Len, Paul Grubbs, Thomas Ristenpart
Julia Len, Paul Grubbs, Thomas Ristenpart
Unlinkable and Invisible γ-Sanitizable Signatures
Angèle Bossuat, Xavier Bultel
Angèle Bossuat, Xavier Bultel
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger
Christian Badertscher, Julia Hesse, Vassilis Zikas
Christian Badertscher, Julia Hesse, Vassilis Zikas
General Properties of Quantum Bit Commitments
Jun Yan
Jun Yan
One-Way Functions Imply Secure Computation in a Quantum World
James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs
Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert
Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert
Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN
Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
Cryptanalysis of Aggregate $\Gamma$-Signature and Practical Countermeasures in Application to Bitcoin
Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao
Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao
A Low-Depth Homomorphic Circuit for Logistic Regression Model Training
Eric Crockett
Eric Crockett
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Andrea Basso, Sujoy Sinha Roy
Andrea Basso, Sujoy Sinha Roy
Design and implementation of HElib: a homomorphic encryption library
Shai Halevi, Victor Shoup
Shai Halevi, Victor Shoup
Proofs of non-Supermajority: the missing link for two-phase BFT with responsive view-change and linear complexity
Christophe Levrat, Matthieu Rambaud
Christophe Levrat, Matthieu Rambaud
Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain
Anupam Pattanayak, Subhasish Dhal, Sourav Kanti Addya
Anupam Pattanayak, Subhasish Dhal, Sourav Kanti Addya
Robust Subgroup Multi-Signatures for Consensus
David Galindo, Jia Liu
David Galindo, Jia Liu
Machine-checking the universal verifiability of ElectionGuard
Thomas Haines, Rajeev Gore, Jack Stodart
Thomas Haines, Rajeev Gore, Jack Stodart
Carbon Trading with Blockchain
Andreas Richardson, Jiahua Xu
Andreas Richardson, Jiahua Xu
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Kwangsu Lee
Kwangsu Lee
New method of verifying cryptographic protocols based on the process model
A. M. Mironov
A. M. Mironov
Lighthouses: A Warning System for Super-Spreader Events
Leonie Reichert, Samuel Brack, Björn Scheuermann
Leonie Reichert, Samuel Brack, Björn Scheuermann
Enhancing Code Based Zero-knowledge Proofs using Rank Metric
Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Victor Mateu
Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Victor Mateu
On The Round Complexity of Secure Quantum Computation
James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
TaiJi: Longest Chain Availability with BFT Fast Confirmation
Songze Li, David Tse
Songze Li, David Tse
Succinct Blind Quantum Computation Using a Random Oracle
Jiayu Zhang
Jiayu Zhang
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version)
Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo
Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo
Making the BKW Algorithm Practical for LWE
Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
Load Balancing for Sharded Blockchains
Naoya Okanami, Ryuya Nakamura, Takashi Nishide
Naoya Okanami, Ryuya Nakamura, Takashi Nishide
Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network
Mohammad Amin Rakeei, Farokhlagha Moazami
Mohammad Amin Rakeei, Farokhlagha Moazami
Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort
Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen
Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen
Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA
Mustafa Khairallah
Mustafa Khairallah
Ovid: Message-based Automatic Contact Tracing
Leonie Reichert, Samuel Brack, Björn Scheuermann
Leonie Reichert, Samuel Brack, Björn Scheuermann
Lower bounds for the depth of modular squaring
Benjamin Wesolowski, Ryan Williams
Benjamin Wesolowski, Ryan Williams
The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction
Michael Kounavis, David Durham, Sergej Deutsch, Krystian Matusiewicz, David Wheeler
Michael Kounavis, David Durham, Sergej Deutsch, Krystian Matusiewicz, David Wheeler
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates
Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay
Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay
Analysis of Ascon, DryGASCON, and Shamash Permutations
Cihangir Tezcan
Cihangir Tezcan
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3
Patrick Longa, Wen Wang, Jakub Szefer
Patrick Longa, Wen Wang, Jakub Szefer
How to Abuse and Fix Authenticated Encryption Without Key Commitment
Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage
Yan Yan, Elisabeth Oswald, Srinivas Vivek
Yan Yan, Elisabeth Oswald, Srinivas Vivek
Rate-1 Quantum Fully Homomorphic Encryption
Orestis Chardouvelis, Nico Doettling, Giulio Malavolta
Orestis Chardouvelis, Nico Doettling, Giulio Malavolta
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system
Jing Yang, Fang-Wei Fu
Jing Yang, Fang-Wei Fu
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Subversion-Resilient Enhanced Privacy ID
Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente
Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente
More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Compressed $\Sigma$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
Thomas Attema, Ronald Cramer, Matthieu Rambaud
Thomas Attema, Ronald Cramer, Matthieu Rambaud
Line-Point Zero Knowledge and Its Applications
Samuel Dittmer, Yuval Ishai, Rafail Ostrovsky
Samuel Dittmer, Yuval Ishai, Rafail Ostrovsky
Observations on COMET
Daniel J. Bernstein, Henri Gilbert, Meltem Sonmez Turan
Daniel J. Bernstein, Henri Gilbert, Meltem Sonmez Turan
On known constructions of APN and AB functions and their relation to each other
Marco Calderini, Lilya Budaghyan, Claude Carlet
Marco Calderini, Lilya Budaghyan, Claude Carlet
DPaSE: Distributed Password-Authenticated Symmetric Encryption
Poulami Das, Julia Hesse, Anja Lehmann
Poulami Das, Julia Hesse, Anja Lehmann
Analysis of Multivariate Encryption Schemes: Application to Dob
Morten Øygarden, Patrick Felke, Håvard Raddum
Morten Øygarden, Patrick Felke, Håvard Raddum
PayMo: Payment Channels For Monero
Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder
Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder
SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures
Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii
Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii
Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module
Kevin "Kenny" Niehage
Kevin "Kenny" Niehage
Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers
Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay
Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay
Round-Optimal and Communication-Efficient Multiparty Computation
Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas
Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas
Removable Weak Keys for Discrete Logarithm Based Cryptography
Michael John Jacobson Jr., Prabhat Kushwaha
Michael John Jacobson Jr., Prabhat Kushwaha
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains
Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Towards Multiparty Computation Withstanding Coercion of All Parties
Ran Canetti, Oxana Poburinnaya
Ran Canetti, Oxana Poburinnaya
Interactive Proofs for Social Graphs
Liran Katzir, Clara Shikhelman, Eylon Yogev
Liran Katzir, Clara Shikhelman, Eylon Yogev
CP-ABE for Circuits (and more) in the Symmetric Key Setting
Shweta Agrawal, Shota Yamada
Shweta Agrawal, Shota Yamada
Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More
Huijia Lin, Tianren Liu, Hoeteck Wee
Huijia Lin, Tianren Liu, Hoeteck Wee
Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures
Dana Dachman-Soled
Dana Dachman-Soled
On Computational Shortcuts for Information-Theoretic PIR
Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai
Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai
On Statistical Security in Two-Party Computation
Dakshita Khurana, Muhammad Haris Mughees
Dakshita Khurana, Muhammad Haris Mughees
Barriers for Succinct Arguments in the Random Oracle Model
Alessandro Chiesa, Eylon Yogev
Alessandro Chiesa, Eylon Yogev
Linear-Time Arguments with Sublinear Verification from Tensor Codes
Jonathan Bootle, Alessandro Chiesa, Jens Groth
Jonathan Bootle, Alessandro Chiesa, Jens Groth
Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads
Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, and Pratik Soni
Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, and Pratik Soni
Improved Key Recovery of the HFEv- Signature Scheme
Chengdong Tao, Albrecht Petzoldt, Jintai Ding
Chengdong Tao, Albrecht Petzoldt, Jintai Ding
Quantum encryption with certified deletion
Anne Broadbent, Rabib Islam
Anne Broadbent, Rabib Islam
Non-interactive classical verification of quantum computation
Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung
Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung
Weakly Extractable One-Way Functions
Nir Bitansky, Noa Eizenstadt, Omer Paneth
Nir Bitansky, Noa Eizenstadt, Omer Paneth
Functional Encryption for Quadratic Functions from k-Lin, Revisited
Hoeteck Wee
Hoeteck Wee
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors
Benny Applebaum, Eliran Kachlon, Arpita Patra
Benny Applebaum, Eliran Kachlon, Arpita Patra
Quantum Period Finding against Symmetric Primitives in Practice
Xavier Bonnetain, Samuel Jaques
Xavier Bonnetain, Samuel Jaques
Correlated Pseudorandom Functions from Variable-Density LPN
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity
Congwei Zhou, Bin Hu, Jie Guan
Congwei Zhou, Bin Hu, Jie Guan
Secure Graph Database Search with Oblivious Filter
Jamie Cui, Chaochao Chen, Alex X. Liu, Li Wang
Jamie Cui, Chaochao Chen, Alex X. Liu, Li Wang
New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version)
Anubhab Baksi
Anubhab Baksi
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers
Daniele Micciancio, Jessica Sorrell
Daniele Micciancio, Jessica Sorrell
Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields
Antigoni Polychroniadou, Yifan Song
Antigoni Polychroniadou, Yifan Song
Transparent Error Correcting in a Computationally Bounded World
Ofer Grossman, Justin Holmgren, Eylon Yogev
Ofer Grossman, Justin Holmgren, Eylon Yogev
Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl
Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl
The Convergence of Slide-type Reductions
Michael Walter
Michael Walter
On Broadcast in Generalized Network and Adversarial Models
Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer
Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer
Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm
Palash Sarkar
Palash Sarkar
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting
Thomas Haines, Johannes Mueller
Thomas Haines, Johannes Mueller
Grover on GIFT
Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Hwajeong Seo
Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Hwajeong Seo
A Practical Key-Recovery Attack on 805-Round Trivium
Chen-Dong Ye, Tian Tian
Chen-Dong Ye, Tian Tian
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols
Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
SKINNY with Scalpel - Comparing Tools for Differential Analysis
Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme
Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme
Quantum Garbled Circuits
Zvika Brakerski, Henry Yuen
Zvika Brakerski, Henry Yuen
Transferable E-cash: A Cleaner Model and the First Practical Instantiation
Balthazar Bauer, Georg Fuchsbauer, Chen Qian
Balthazar Bauer, Georg Fuchsbauer, Chen Qian
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption
Diana Maimut, George Teseleanu
Diana Maimut, George Teseleanu
Minimal binary linear codes - a general framework based on bent concatenation
Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei
Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei
NTT Multiplication for NTT-unfriendly Rings
Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
Efficient Privacy Preserving Logistic Regression Inference and Training
Kyoohyung Han, Jinhyuck Jeong, Jung Hoon Sohn, Yongha Son
Kyoohyung Han, Jinhyuck Jeong, Jung Hoon Sohn, Yongha Son
Post-Quantum Multi-Party Computation
Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng, Jiachen Shen, Zhenfu Cao
Zhihao Zheng, Jiachen Shen, Zhenfu Cao
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux
Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee
Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee
Interactive Proofs for Quantum Black-Box Computations
Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang
Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang
A Survey of ECDSA Threshold Signing
Jean-Philippe Aumasson, Adrian Hamelink, Omer Shlomovits
Jean-Philippe Aumasson, Adrian Hamelink, Omer Shlomovits
Key Mismatch Attack on NewHope Revisited
Jan Vacek, Jan Václavek
Jan Vacek, Jan Václavek
Signcryption in a Quantum World
Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah
Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah
FB-Tree: Highly Efficient Tree-Based Index for Encrypted Boolean Queries in Smart Cities
Zhiqiang Wu, Kenli Li, Jin Wang, Naixue Xiong
Zhiqiang Wu, Kenli Li, Jin Wang, Naixue Xiong
Decentralized Multi-Authority ABE for DNFs from LWE
Pratish Datta, Ilan Komargodski, Brent Waters
Pratish Datta, Ilan Komargodski, Brent Waters
An Alternative Approach for SIDH Arithmetic
Cyril Bouvier, Laurent Imbert
Cyril Bouvier, Laurent Imbert
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds
Nai-Hui Chia, Kai-Min Chung, and Takashi Yamakawa
Nai-Hui Chia, Kai-Min Chung, and Takashi Yamakawa
Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium
Il-Ju Kim, Tae-Ho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han
Il-Ju Kim, Tae-Ho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han
Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE
Tapas Pal, Ratna Dutta
Tapas Pal, Ratna Dutta
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates
Jia-Chng Loh, Geong-Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong
Jia-Chng Loh, Geong-Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong
Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two
Borja Gómez
Borja Gómez
Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review
Aaqib Bashir Dar, Asif Iqbal Baba, Auqib Hamid Lone, Roohie Naaz, Fan Wu
Aaqib Bashir Dar, Asif Iqbal Baba, Auqib Hamid Lone, Roohie Naaz, Fan Wu
Correlation-Intractable Hash Functions via Shift-Hiding
Alex Lombardi, Vinod Vaikuntanathan
Alex Lombardi, Vinod Vaikuntanathan
When to Barrett reduce in the inverse NTT
Bas Westerbaan
Bas Westerbaan
Stronger bounds on the cost of computing Groebner bases for HFE systems
Elisa Gorla, Daniela Mueller, Christophe Petit
Elisa Gorla, Daniela Mueller, Christophe Petit
Semi-regular sequences and other random systems of equations
M. Bigdeli, E. De Negri, M. M. Dizdarevic, E. Gorla, R. Minko, S. Tsakou
M. Bigdeli, E. De Negri, M. M. Dizdarevic, E. Gorla, R. Minko, S. Tsakou
ELM : A Low-Latency and Scalable Memory Encryption Scheme
Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
Transciphering, using FiLIP and TFHE for an efficient delegation of computation
Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage
Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
Privacy Amplification with Tamperable Memory via Non-malleable Two-source Extractors
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
A discretization attack
Daniel J. Bernstein
Daniel J. Bernstein
Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View
Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud
Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil
Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil
Costs of an Attack Against Proof-of-Work
Loïc Etienne
Loïc Etienne
LURK: Server-Controlled TLS Delegation
Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
Evaluation Methods for Chebyshev Polynomials
Zhengjun Cao, Lihua Liu, Leming Hong
Zhengjun Cao, Lihua Liu, Leming Hong
Security of Hybrid Key Encapsulation
Matthew Campagna, Adam Petcher
Matthew Campagna, Adam Petcher
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching
Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal
Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal
Lattice-Based Proof-of-Work for Post-Quantum Blockchains
Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz
Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz
Tight adaptive reprogramming in the QROM
Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
Vivek Arte, Mihir Bellare, Louiza Khati
Vivek Arte, Mihir Bellare, Louiza Khati
On two fundamental problems on APN power functions
Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay Kaleyski
Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay Kaleyski
Toward Provable One Way Functions
Hagar Dolev, Shlomi Dolev
Hagar Dolev, Shlomi Dolev
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh
Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh
Modular Lagrange Interpolation of the Mod Function for Bootstrapping of Approximate HE
Charanjit S. Jutla, Nathan Manohar
Charanjit S. Jutla, Nathan Manohar
Gadget-Based iNTRU Lattice Trapdoors
Nicholas Genise, Baiyu Li
Nicholas Genise, Baiyu Li
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
Reducing Round Complexity of Byzantine Broadcast
Linda Chen, Jun Wan
Linda Chen, Jun Wan
Tight State-Restoration Soundness in the Algebraic Group Model
Ashrujit Ghoshal, Stefano Tessaro
Ashrujit Ghoshal, Stefano Tessaro
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes
Howard M. Heys
Howard M. Heys
Vetted Encryption
Martha Norberg Hovd, Martijn Stam
Martha Norberg Hovd, Martijn Stam
A Systematic Appraisal of Side Channel Evaluation Strategies
Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sebastien Duval, Christophe Giraud, Eliane Jaulmes, Francois Koeune, Elisabeth Oswald, Francois-Xavier Standaert, Carolyn Whitnall
Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sebastien Duval, Christophe Giraud, Eliane Jaulmes, Francois Koeune, Elisabeth Oswald, Francois-Xavier Standaert, Carolyn Whitnall
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts
Shlomi Dolev, Ziyu Wang
Shlomi Dolev, Ziyu Wang
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
Indifferentiability of SKINNY-HASH Internal Functions
Akinori Hosoyamada, Tetsu Iwata
Akinori Hosoyamada, Tetsu Iwata
Improved Cryptanalysis of UOV and Rainbow
Ward Beullens
Ward Beullens
Forward and Backward Private Conjunctive Searchable Symmetric Encryption
Sikhar Patranabis, Debdeep Mukhopadhyay
Sikhar Patranabis, Debdeep Mukhopadhyay
Zero-Communication Reductions
Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
Homomorphic Evaluation of the SM4
Yu Xue
Yu Xue
New Approaches for Quantum Copy-Protection
Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang
Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang
Optimized Architectures for Elliptic Curve Cryptography over Curve448
Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary
Achintya Desai, Shubham Raj, Kannan Srinathan
Achintya Desai, Shubham Raj, Kannan Srinathan
Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation
Esra Yeniaras, Murat Cenk
Esra Yeniaras, Murat Cenk
Transciphering Framework for Approximate Homomorphic Encryption (Full Version)
Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon
Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon
One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model
Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
Updateable Inner Product Argument with Logarithmic Verifier and Applications
Vanesa Daza, Carla Ràfols, Alexandros Zacharakis
Vanesa Daza, Carla Ràfols, Alexandros Zacharakis
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
Ashley Fraser, Elizabeth A. Quaglia
Ashley Fraser, Elizabeth A. Quaglia
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security
Anders Dalskov, Daniel Escudero, Marcel Keller
Anders Dalskov, Daniel Escudero, Marcel Keller
Adaptively secure Threshold Symmetric-key Encryption
Pratyay Mukherjee
Pratyay Mukherjee
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption
Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, and Bogdan Warinschi
Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, and Bogdan Warinschi
On The Insider Security of MLS
Joël Alwen, Daniel Jost, Marta Mularczyk
Joël Alwen, Daniel Jost, Marta Mularczyk
Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness
Chris Brzuska and Geoffroy Couteau
Chris Brzuska and Geoffroy Couteau
On Self-Equivalence Encodings in White-Box Implementations
Adrián Ranea, Bart Preneel
Adrián Ranea, Bart Preneel
Separation Results for Boolean Function Classes
Aniruddha Biswas, Palash Sarkar
Aniruddha Biswas, Palash Sarkar
CSI-RAShi: Distributed key generation for CSIDH
Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren
Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
Sebastian Paul, Patrik Scheible
Sebastian Paul, Patrik Scheible
Provably Quantum-Secure Tweakable Block Ciphers
Akinori Hosoyamada, Tetsu Iwata
Akinori Hosoyamada, Tetsu Iwata
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher
Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri
Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri
On Succinct Arguments and Witness Encryption from Groups
Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu
Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu
Poppins: A Direct Construction for Asymptotically Optimal zkSNARKs
Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno
Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno
Improved Rectangle Attacks on SKINNY and CRAFT
Hosein Hadipour, Nasour Bagheri, and Ling Song
Hosein Hadipour, Nasour Bagheri, and Ling Song
Security of Public Key Encryption against Resetting Attacks
Juliane Krämer, Patrick Struck
Juliane Krämer, Patrick Struck
On Index Calculus Algorithms for Subfield Curves
Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit
Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit
Secure Software Leasing from Standard Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
Payment Trees: Low Collateral Payments for Payment Channel Networks
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
Individual Simulations
Yi Deng
Yi Deng
Cryptanalysis of Feistel-Based Format-Preserving Encryption
Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
A note on the low order assumption in class groups of imaginary quadratic number fields
Karim Belabas, Thorsten Kleinjung, Antonio Sanso, and Benjamin Wesolowski
Karim Belabas, Thorsten Kleinjung, Antonio Sanso, and Benjamin Wesolowski
Provable Security Analysis of Decentralized Cryptographic Contact Tracing
Noel Danz, Oliver Derwisch, Anja Lehmann, Wenzel Puenter, Marvin Stolle, Joshua Ziemann
Noel Danz, Oliver Derwisch, Anja Lehmann, Wenzel Puenter, Marvin Stolle, Joshua Ziemann
On the Success Probability of Solving Unique SVP via BKZ
Eamonn W. Postlethwaite, Fernando Virdia
Eamonn W. Postlethwaite, Fernando Virdia
Multiparty Cardinality Testing for Threshold Private Set Intersection
Pedro Branco, Nico Döttling, Sihang Pu
Pedro Branco, Nico Döttling, Sihang Pu
Simulation Extractable Versions of Groth’s zk-SNARK Revisited
Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols
Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao
Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao
QCB: Efficient Quantum-secure Authenticated Encryption
Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin
Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin
Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer
Joppe W. Bos, Joost Renes, Christine van Vredendaal
Joppe W. Bos, Joost Renes, Christine van Vredendaal
TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4
İrem Keskinkurt Paksoy, Murat Cenk
İrem Keskinkurt Paksoy, Murat Cenk
Robust Property-Preserving Hash Functions for Hamming Distance and More
Nils Fleischhacker, Mark Simkin
Nils Fleischhacker, Mark Simkin
Byzantine Ordered Consensus without Byzantine Oligarchy
Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, Lorenzo Alvisi
Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, Lorenzo Alvisi
Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability
Yunxiu Ye, Zhenfu Cao, Jiachen Shen
Yunxiu Ye, Zhenfu Cao, Jiachen Shen
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Čapkun
Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Čapkun
On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software
Lauren De Meyer, Elke De Mulder, Michael Tunstall
Lauren De Meyer, Elke De Mulder, Michael Tunstall
Concrete quantum cryptanalysis of binary elliptic curves
Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange
Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange
Optimized Software Implementations for theLightweight Encryption Scheme ForkAE
Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, Antoon Purnal
Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, Antoon Purnal
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis
Lichao Wu, Guilherme Perin, Stjepan Picek
Lichao Wu, Guilherme Perin, Stjepan Picek
Optimal Oblivious Parallel RAM
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, and Runting Shi
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, and Runting Shi
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
Bernardo David, Rafael Dowsley
Bernardo David, Rafael Dowsley
FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps
Osman Biçer, Alptekin Küpçü
Osman Biçer, Alptekin Küpçü
Sword: An Opaque Blockchain Protocol
Farid Elwailly
Farid Elwailly
Improved attacks against key reuse in learning with errors key exchange
Nina Bindel, Douglas Stebila, Shannon Veitch
Nina Bindel, Douglas Stebila, Shannon Veitch
Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field
Borja Gómez
Borja Gómez
Secure Two-Party Quantum Computation Over Classical Channels
Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri
Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri
Multi-Input Quadratic Functional Encryption from Pairings
Shweta Agrawal, Rishab Goyal, Junichi Tomida
Shweta Agrawal, Rishab Goyal, Junichi Tomida
Entropy Estimation of Physically Unclonable Functions with Offset Error
Mitsuru Shiozaki, Yohei Hori, Takeshi Fujino
Mitsuru Shiozaki, Yohei Hori, Takeshi Fujino
Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
Craig Costello, Michael Meyer, Michael Naehrig
Craig Costello, Michael Meyer, Michael Naehrig
Compact Authenticated Key Exchange in the Quantum Random Oracle Model
Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang
Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford
Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford
DORY: An Encrypted Search System with Distributed Trust
Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, Ion Stoica
Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, Ion Stoica
Tightly-Secure Authenticated Key Exchange, Revisited
Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4
Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels
Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels
A Simple Protocol to Compare EMFI Platforms
J. Toulemont, N. Ouldei-Tebina, J. M. Galliere, P. Nouet, E. Bourbao, P. Maurine
J. Toulemont, N. Ouldei-Tebina, J. M. Galliere, P. Nouet, E. Bourbao, P. Maurine
Lattice-based Key Sharing Schemes - A Survey
Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin
Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin
Quarks: Quadruple-efficient transparent zkSNARKs
Srinath Setty, Jonathan Lee
Srinath Setty, Jonathan Lee
Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments
Jonathan Lee
Jonathan Lee
Classical Verification of Quantum Computations with Efficient Verifier
Nai-Hui Chia, Kai-Min Chung, and Takashi Yamakawa
Nai-Hui Chia, Kai-Min Chung, and Takashi Yamakawa
Bent Functions from Cellular Automata
Maximilien Gadouleau, Luca Mariot, Stjepan Picek
Maximilien Gadouleau, Luca Mariot, Stjepan Picek
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version)
Alexandros Bakas, Antonis Michalas
Alexandros Bakas, Antonis Michalas
Classical vs Quantum Random Oracles
Takashi Yamakawa, Mark Zhandry
Takashi Yamakawa, Mark Zhandry
PRINCEv2 - More Security for (Almost) No Overhead
Dušan Božilov, Maria Eichlseder, Miroslav Kneževic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer
Dušan Božilov, Maria Eichlseder, Miroslav Kneževic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis
Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay
Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay
Fault Attacks In Symmetric Key Cryptosystems
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
Multi-Party Functional Encryption
Shweta Agrawal, Rishab Goyal, Junichi Tomida
Shweta Agrawal, Rishab Goyal, Junichi Tomida
Revisiting ECM on GPUs
Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu
Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu
Humanly Computable Passwords as Lattice based OTP generator with LWE
Slawomir Matelski
Slawomir Matelski
Improved Fault Analysis on SIMECK Ciphers
Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani
Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani
Multi-stage Proof-of-Works: Properties and Vulnerabilities
Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
MuSig2: Simple Two-Round Schnorr Multi-Signatures
Jonas Nick, Tim Ruffing, and Yannick Seurin
Jonas Nick, Tim Ruffing, and Yannick Seurin
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance
Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation
Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren
Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren
TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks
Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay
Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay
Improved Reduction Between SIS Problems over Structured Lattices
ZaHyun Koo, Yongwoo Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
ZaHyun Koo, Yongwoo Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z
Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan
Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan
Boolean Ring Cryptographic Equation Solving
Sean Murphy, Maura Paterson, Christine Swart
Sean Murphy, Maura Paterson, Christine Swart
Broadcast-Optimal Two Round MPC with an Honest Majority
Ivan Damgård, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
Ivan Damgård, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
New Representations of the AES Key Schedule
Gaëtan Leurent, Clara Pernot
Gaëtan Leurent, Clara Pernot
Adaptive Extractors and their Application to Leakage Resilient Secret Sharing
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Bit Security Estimation Using Various Information-Theoretic Measures
Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No
Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No
A New Code Based Signature Scheme without Trapdoors
Zhe Li, Chaoping Xing, Sze Ling Yeo
Zhe Li, Chaoping Xing, Sze Ling Yeo
Adversarial Level Agreements for Two-Party Protocols
Marilyn George, Seny Kamara
Marilyn George, Seny Kamara
Random-index PIR and Applications
Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov
Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time
Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang
Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi
Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi
Two-round trip Schnorr multi-signatures via delinearized witnesses
Handan Kilinc Alper, Jeffrey Burdges
Handan Kilinc Alper, Jeffrey Burdges
Taming the many EdDSAs
Konstantinos Chalkias, François Garillot, Valeria Nikolaenko
Konstantinos Chalkias, François Garillot, Valeria Nikolaenko
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV
Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi
Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi
Improved (Related-key) Differential Cryptanalysis on GIFT
Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding
Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding
DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version)
Siang Meng Sim, Dirmanto Jap, Shivam Bhasin
Siang Meng Sim, Dirmanto Jap, Shivam Bhasin
SQISign: compact post-quantum signatures from quaternions and isogenies
Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski
Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski
Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation
Alin Tomescu, Yu Xia, Zachary Newman
Alin Tomescu, Yu Xia, Zachary Newman
Hardness of Entropic Module-LWE
Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang
Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang
A Complete Analysis of the BKZ Lattice Reduction Algorithm
Jianwei Li and Phong Q. Nguyen
Jianwei Li and Phong Q. Nguyen
Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions
Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi
Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi
Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Classifiers
Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen
Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen
Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model
Masayuki Fukumitsu, Shingo Hasegawa
Masayuki Fukumitsu, Shingo Hasegawa
BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer
Farid Javani, Alan T. Sherman
Farid Javani, Alan T. Sherman
On the Existence of Weak Keys for QC-MDPC Decoding
Nicolas Sendrier, Valentin Vasseur
Nicolas Sendrier, Valentin Vasseur
vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging
Richard B. Riddick
Richard B. Riddick
Certificateless Public-key Authenticate Searchable Encryption with Probabilistic Trapdoor Generation
Leixiao Cheng, Fei Meng
Leixiao Cheng, Fei Meng
Decentralized Asset Custody Scheme with Security against Rational Adversary
Zhaohua Chen, Guang Yang
Zhaohua Chen, Guang Yang
Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices
Colin O'Flynn
Colin O'Flynn
Integral Cryptanalysis of Reduced-Round Tweakable TWINE
Muhammad ElSheikh, Amr M. Youssef
Muhammad ElSheikh, Amr M. Youssef
Synchronous Constructive Cryptography
Chen-Da Liu-Zhang, Ueli Maurer
Chen-Da Liu-Zhang, Ueli Maurer
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version)
Alexandros Bakas, Antonis Michalas
Alexandros Bakas, Antonis Michalas
Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
Jonathan Takeshita, Dayane Reis, Ting Gong, Michael Niemier, X. Sharon Hu, Taeho Jung
Jonathan Takeshita, Dayane Reis, Ting Gong, Michael Niemier, X. Sharon Hu, Taeho Jung
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand
Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu
Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu
Verifiable Functional Encryption using Intel SGX
Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote
Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote
The Topographic Signature (TopoSign) Protocol
Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk
Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk
Aggregate Signature with Detecting Functionality from Group Testing
Shingo Sato, Junji Shikata, Tsutomu Matsumoto
Shingo Sato, Junji Shikata, Tsutomu Matsumoto
Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing
Shingo Sato, Junji Shikata
Shingo Sato, Junji Shikata
R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey
Pedro Hecht
Pedro Hecht
Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4
Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
Differential analysis of the ZUC-256 initialisation
Steve Babbage, Alexander Maximov
Steve Babbage, Alexander Maximov
Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack
Majid Mumtaz, Ping Luo
Majid Mumtaz, Ping Luo
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness
Joseph Jaeger, Stefano Tessaro
Joseph Jaeger, Stefano Tessaro
Triply Adaptive UC NIZK
Ran Canetti, Pratik Sarkar, and Xiao Wang
Ran Canetti, Pratik Sarkar, and Xiao Wang
Public-key Authenticate Searchable Encryption With Probabilistic Trapdoor Generation
Leixiao Cheng, Fei Meng
Leixiao Cheng, Fei Meng
Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions
Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka
Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC
Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas
Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas
An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers
Vitaly Kiryukhin
Vitaly Kiryukhin
FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results
Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment
Andrey Sobol
Andrey Sobol
Towards Non-Interactive Witness Hiding
Benjamin Kuykendall, Mark Zhandry
Benjamin Kuykendall, Mark Zhandry
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Marc Fischlin, Felix Rohrbach
Marc Fischlin, Felix Rohrbach
Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys
Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
Correlation Power Analysis and Higher-order Masking Implementation of WAGE
Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
Tingting Cui, Lorenzo Grassi
Tingting Cui, Lorenzo Grassi
WBCD: White-box Block Cipher Scheme Based on Dynamic Library
Yatao Yang, Ye Zhang, Yuying Zhai, Zheng Yuan, Guangwu Xu
Yatao Yang, Ye Zhang, Yuying Zhai, Zheng Yuan, Guangwu Xu
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro
Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro
Finding EM leakages at design stage: a simulation methodology
Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult
Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult
Black-Box Non-Interactive Non-Malleable Commitments
Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
TR-31 and AS 2805 (Non)equivalence report
Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
A Lower Bound for One-Round Oblivious RAM
David Cash, Andrew Drucker, Alexander Hoover
David Cash, Andrew Drucker, Alexander Hoover
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model
Andrea Coladangelo, Christian Majenz, and Alexander Poremba
Andrea Coladangelo, Christian Majenz, and Alexander Poremba
Bypassing Isolated Execution on RISC-V with Fault Injection
Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma
Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level
Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont
Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont
Schrödinger's Pirate: How To Trace a Quantum Decoder
Mark Zhandry
Mark Zhandry
Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy
Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)
Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
Cryptographic Group Actions and Applications
Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis
Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis
Coupling of Random Systems
David Lanzenberger, Ueli Maurer
David Lanzenberger, Ueli Maurer
Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions
Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
Lossiness and Entropic Hardness for Ring-LWE
Zvika Brakerski, Nico Döttling
Zvika Brakerski, Nico Döttling
Constant-time verification for cut-and-choose-based signatures
Robert Ransom
Robert Ransom
Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
On the Round Complexity of the Shuffle Model
Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit
Siam Hussain, Baiyu Li, Farinaz Koushanfar, Rosario Cammarota
Siam Hussain, Baiyu Li, Farinaz Koushanfar, Rosario Cammarota
MultiTLS: Secure communication channels with cipher suite diversity
Ricardo Moura, David R. Matos, Miguel Pardal, Miguel Correia
Ricardo Moura, David R. Matos, Miguel Pardal, Miguel Correia
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model
Shweta Agrawal, Daniel Wichs, Shota Yamada
Shweta Agrawal, Daniel Wichs, Shota Yamada
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions
Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang
Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang
Short Paper: PoSH Proof of Staked Hardware Consensus
Rami Khalil, Naranker Dulay
Rami Khalil, Naranker Dulay
MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication
David Heath, Vladimir Kolesnikov, Stanislav Peceny
David Heath, Vladimir Kolesnikov, Stanislav Peceny
Multi Random Projection Inner Product Encryption, Applications to Proximity Searchable Encryption for the Iris Biometric
Chloe Cachet, Sohaib Ahmad, Luke Demarest, Serena Riback, Ariel Hamlin, Benjamin Fuller
Chloe Cachet, Sohaib Ahmad, Luke Demarest, Serena Riback, Ariel Hamlin, Benjamin Fuller
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
Ryo Nishimaki
Ryo Nishimaki
Cryptanalysis of a round optimal lattice-based multisignature scheme
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
On the Price of Concurrency in Group Ratcheting Protocols
Alexander Bienstock, Yevgeniy Dodis, Paul Rösler
Alexander Bienstock, Yevgeniy Dodis, Paul Rösler
On the Power of an Honest Majority in Three-Party Computation Without Broadcast
Bar Alon, Ran Cohen, Eran Omri, Tom Suad
Bar Alon, Ran Cohen, Eran Omri, Tom Suad
Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model
Sigurd Eskeland
Sigurd Eskeland
FHE-Based Bootstrapping of Designated-Prover NIZK
Zvika Brakerski, Sanjam Garg, Rotem Tsabary
Zvika Brakerski, Sanjam Garg, Rotem Tsabary
Batch Verification for Statistical Zero Knowledge Proofs
Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan
Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan
A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields
Jorge Nakahara Jr
Jorge Nakahara Jr
Practical Isogeny-Based Key-exchange with Optimal Tightness
Bor de Kock, Kristian Gjøsteen, Mattia Veroni
Bor de Kock, Kristian Gjøsteen, Mattia Veroni
Template Attacks Based on the Multivariate Joint Distribution
Min Yang, Qingshu Meng, An Wang, Xin Liu
Min Yang, Qingshu Meng, An Wang, Xin Liu
Specifying cycles of minimal length for commonly used linear layers in block ciphers
Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic
Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic
On Average-Case Hardness in TFNP from One-Way Functions
Pavel Hubáček, Chethan Kamath, Karel Král, Veronika Slívová
Pavel Hubáček, Chethan Kamath, Karel Král, Veronika Slívová
KVaC: Key-Value Commitments for Blockchains and Beyond
Shashank Agrawal, Srinivasan Raghuraman
Shashank Agrawal, Srinivasan Raghuraman
Characterizing Deterministic-Prover Zero Knowledge
Nir Bitansky, Arka Rai Choudhuri
Nir Bitansky, Arka Rai Choudhuri
ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?
Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
Don't throw your nonces out with the bathwater: Speeding up Dilithium by reusing the tail of y
Amber Sprenkels, Bas Westerbaan
Amber Sprenkels, Bas Westerbaan
Secure Massively Parallel Computation for Dishonest Majority
Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi
Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi
Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara, Chiara Ricciardi
Anna Lisa Ferrara, Chiara Ricciardi
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs
Dimitris Mouris, Nektarios Georgios Tsoutsos
Dimitris Mouris, Nektarios Georgios Tsoutsos
Functional Encryption for Set Intersection in the Multi-Client Setting
Kwangsu Lee, Minhye Seo
Kwangsu Lee, Minhye Seo
Key Committing AEADs
Shay Gueron
Shay Gueron
An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls
Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji
Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
Gennaro Avitabile, Daniele Friolo, Ivan Visconti
Gennaro Avitabile, Daniele Friolo, Ivan Visconti
Deterministic Wallets in a Quantum World
Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck
Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck
An Area Aware Accelerator for Elliptic Curve Point Multiplication
Malik Imran, Samuel Pagliarini, Muhammad Rashid
Malik Imran, Samuel Pagliarini, Muhammad Rashid
Lic-Sec: an enhanced AppArmor Docker security profile generator
Hui Zhu, Christian Gehrmann
Hui Zhu, Christian Gehrmann
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
Siemen Dhooghe, Svetla Nikova
Siemen Dhooghe, Svetla Nikova
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs
Wonseok Choi, Byeonghak Lee, Yeongmin Lee, Jooyoung Lee
Wonseok Choi, Byeonghak Lee, Yeongmin Lee, Jooyoung Lee
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions
Lior Rotem, Gil Segev
Lior Rotem, Gil Segev
Rescue-Prime: a Standard Specification (SoK)
Alan Szepieniec, Tomer Ashur, Siemen Dhooghe
Alan Szepieniec, Tomer Ashur, Siemen Dhooghe
Factoring Algorithm Based on Parameterized Newton Method
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
A post-quantum signature scheme from the secant variety of the Grassmannian
Daniele Di Tullio, Manoj Gyawali
Daniele Di Tullio, Manoj Gyawali
On the Efficient Estimation of Min-Entropy
Yongjune Kim, Cyril Guyot, Young-Sik Kim
Yongjune Kim, Cyril Guyot, Young-Sik Kim
Succinct and Adaptively Secure ABE for ABP from k-Lin
Huijia Lin, Ji Luo
Huijia Lin, Ji Luo
Epochal Signatures for Deniable Group Chats
Andreas Hülsing and Fiona Johanna Weber
Andreas Hülsing and Fiona Johanna Weber
MOTION - A Framework for Mixed-Protocol Multi-Party Computation
Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
A Note on Koblitz Curves over Prime Fields
Han Wu, Guangwu Xu
Han Wu, Guangwu Xu
Adaptively Secure Inner Product Encryption from LWE
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks
Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin
Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin
Security Analysis of Subterranean 2.0
Ling Song, Yi Tu, Danping Shi, Lei Hu
Ling Song, Yi Tu, Danping Shi, Lei Hu
A Logarithmic Lower Bound for Oblivious RAM (for all parameters)
Ilan Komargodski, Wei-Kai Lin
Ilan Komargodski, Wei-Kai Lin
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound
Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei
Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei
Secure training of decision trees with continuous attributes
Mark Abspoel, Daniel Escudero, Nikolaj Volgushev
Mark Abspoel, Daniel Escudero, Nikolaj Volgushev
A Secure Software Defined Networking based Framework for IoT Networks
Ambili K N, Jimmy Jose
Ambili K N, Jimmy Jose
Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN
Jingchun Yang, Dongdai Lin
Jingchun Yang, Dongdai Lin
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet Moundi
Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet Moundi
Bitcoin-Monero Cross-chain Atomic Swap
Joël Gugger
Joël Gugger
High-Speed FPGA Implementation of SIKE Based on An Ultra-Low-Latency Modular Multiplier
Jing Tian, Bo Wu, Zhongfeng Wang
Jing Tian, Bo Wu, Zhongfeng Wang
Optimized Voronoi-based algorithms for parallel shortest vector computations
Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
Alexandre Adomnicai, Thomas Peyrin
Alexandre Adomnicai, Thomas Peyrin
The Velvet Path to Superlight Blockchain Clients
Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros
Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain
Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta
Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta
On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme
Yasufumi Hashimoto
Yasufumi Hashimoto
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Approximate Homomorphic Encryption with Reduced Approximation Error
Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov
Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov
Economic Proof of Work
Jia Kan
Jia Kan
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.
V. Ustimenko
V. Ustimenko
SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets
Karim M. Abdellatif, Olivier Hériveaux
Karim M. Abdellatif, Olivier Hériveaux
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
Thomas Haines, Rajeev Gore, Bhavesh Sharma
Thomas Haines, Rajeev Gore, Bhavesh Sharma
On combinatorial approaches to search for quadratic APN functions
Konstantin Kalgin, Valeriya Idrisova
Konstantin Kalgin, Valeriya Idrisova
A cautionary note on the use of Gurobi for cryptanalysis
Muhammad ElSheikh, Amr M. Youssef
Muhammad ElSheikh, Amr M. Youssef
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
Abhraneel Dutta, Aaron Hutchinson, Koray Karabina
Abhraneel Dutta, Aaron Hutchinson, Koray Karabina
Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices
Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi
Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols
Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
Radical isogenies
Wouter Castryck, Thomas Decru, Frederik Vercauteren
Wouter Castryck, Thomas Decru, Frederik Vercauteren
Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications
Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest
Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest
Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction
Gili Schul-Ganz, Gil Segev
Gili Schul-Ganz, Gil Segev
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
Thai Duong, Duong Hieu Phan, Ni Trieu
Thai Duong, Duong Hieu Phan, Ni Trieu
High-Assurance Cryptography Software in the Spectre Era
Gilles Barthe, Sunjay Cauligi, Benjamin Gregoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
Gilles Barthe, Sunjay Cauligi, Benjamin Gregoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers
Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers
PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings
Pedro Hecht
Pedro Hecht
NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel
Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel
Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation?
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Unbounded HIBE with Tight Security
Roman Langrehr, Jiaxin Pan
Roman Langrehr, Jiaxin Pan
Formalizing Bitcoin Crashes with Universally Composable Security
Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu
Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu
How to Build Optimally Secure PRFs Using Block Ciphers
Benoît Cogliati, Ashwin Jha, Mridul Nandi
Benoît Cogliati, Ashwin Jha, Mridul Nandi
Far Field EM Side-Channel Attack on AES Using Deep Learning
Ruize Wang, Huanyu Wang, Elena Dubrova
Ruize Wang, Huanyu Wang, Elena Dubrova
Cycle structure of generalized and closed loop invariants
Yongzhuang Wei, Rene Rodriguez, Enes Pasalic
Yongzhuang Wei, Rene Rodriguez, Enes Pasalic
TN-IDS for Network Layer Attacks in RPL based IoT Systems
Ambili K N, Jimmy Jose
Ambili K N, Jimmy Jose
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)
Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, and Mingsheng Wang
Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, and Mingsheng Wang
The Round Complexity of Secure Computation Against Covert Adversaries
Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu, Ertem Nusret Tas, David Tse
Joachim Neu, Ertem Nusret Tas, David Tse
On the Adaptive Security of MACs and PRFs
Andrew Morgan, Rafael Pass, Elaine Shi
Andrew Morgan, Rafael Pass, Elaine Shi
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers
Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki
Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng
Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng
Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE
Keita Emura, Atsushi Takayasu, Yohei Watanabe
Keita Emura, Atsushi Takayasu, Yohei Watanabe
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone, Javier Verbel
Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone, Javier Verbel
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications
Tapas Pal, Ratna Dutta
Tapas Pal, Ratna Dutta
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions
David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
A Fast and Compact RISC-V Accelerator for Ascon and Friends
Stefan Steinegger, Robert Primas
Stefan Steinegger, Robert Primas
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Bart Mennink
Bart Mennink
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices
Olivier Bernard, Adeline Roux-Langlois
Olivier Bernard, Adeline Roux-Langlois
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting
Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Rongmao Chen, Xinyi Huang, Moti Yung
Rongmao Chen, Xinyi Huang, Moti Yung
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
Jodie Knapp, Elizabeth A. Quaglia
Jodie Knapp, Elizabeth A. Quaglia
Unconditionally secure quantum bit commitment: Revised
Ming-Xing Luo, Xiaojun Wang
Ming-Xing Luo, Xiaojun Wang
Minimizing the Two-Round Tweakable Even-Mansour Cipher
Avijit Dutta
Avijit Dutta
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
Pratik Soni, Stefano Tessaro
Pratik Soni, Stefano Tessaro
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Mihai-Zicu Mina, Emil Simion
Mihai-Zicu Mina, Emil Simion
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation
Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong
Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong
Cryptanalysis of the permutation based algorithm SpoC
Liliya Kraleva, Raluca Posteuca, Vincent Rijmen
Liliya Kraleva, Raluca Posteuca, Vincent Rijmen
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
Julia Kastner, Julian Loss, Jiayu Xu
Julia Kastner, Julian Loss, Jiayu Xu
Efficient indifferentiable hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue
Dmitrii Koshelev
Dmitrii Koshelev
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions
Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez
Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez
An Efficient Transformation Capabilities of Single Database Private Block Retrieval
Radhakrishna Bhat, N R Sunitha
Radhakrishna Bhat, N R Sunitha
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
Adrian Marotzke
Adrian Marotzke
Constant time algorithms for ROLLO-I-128
Carlos Aguilar-Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla
Carlos Aguilar-Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering
Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong
Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong
Mimblewimble Non-Interactive Transaction Scheme
Gary Yu
Gary Yu
Signatures of Knowledge for Boolean Circuits under Standard Assumptions
Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
Quantum Search for Scaled Hash Function Preimages
Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Victor Mateu
Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Victor Mateu
A new idea in response to fast correlation attacks on small-state stream ciphers
Vahid Amin Ghafari, Fujiang Lin
Vahid Amin Ghafari, Fujiang Lin
Circular Security Is Complete for KDM Security
Fuyuki Kitagawa, Takahiro Matsuda
Fuyuki Kitagawa, Takahiro Matsuda
Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts
Daniel Shumow
Daniel Shumow
On the Complexity of the Crossbred Algorithm
João Diogo Duarte
João Diogo Duarte
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces
Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework
Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain
Santi J. Vives
Santi J. Vives
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems
Ben Smyth
Ben Smyth
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation
Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez
Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez
Attacking Threshold Wallets
Jean-Philippe Aumasson, Omer Shlomovits
Jean-Philippe Aumasson, Omer Shlomovits
Lower Bounds on the Degree of Block Ciphers
Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
Arpita Patra, Divya Ravi, Swati Singla
Arpita Patra, Divya Ravi, Swati Singla
Rotational analysis of ChaCha permutation
Stefano Barbero, Emanuele Bellini, Rusydi Makarim
Stefano Barbero, Emanuele Bellini, Rusydi Makarim
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
Side-channel Attacks with Multi-thread Mixed Leakage
Yiwen Gao, Yongbin Zhou
Yiwen Gao, Yongbin Zhou
On the Linear Distinguishing Attack against ZUC-256 Stream Cipher
ZUC Design Team
ZUC Design Team
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions
Ian McQuoid, Mike Rosulek, Lawrence Roy
Ian McQuoid, Mike Rosulek, Lawrence Roy
Candidate Obfuscation via Oblivious LWE Sampling
Hoeteck Wee, Daniel Wichs
Hoeteck Wee, Daniel Wichs
Sign in finite fields
Abraham Westerbaan, Bas Westerbaan
Abraham Westerbaan, Bas Westerbaan
MoSS: Modular Security Specifications Framework
Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrotniak
Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrotniak
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
Mohammad Sadeq Dousti, Alptekin Küpçü
Mohammad Sadeq Dousti, Alptekin Küpçü
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4
Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay
Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay
A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm
Yihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu
Yihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu
Security in banking
Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
Evolving Secret Sharing with Essential Participants
Jyotirmoy Pramanik, Avishek Adhikari
Jyotirmoy Pramanik, Avishek Adhikari
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
Fukang Liu, Takanori Isobe, Willi Meier
Fukang Liu, Takanori Isobe, Willi Meier
RandChain: A Scalable and Fair Decentralised Randomness Beacon
Runchao Han, Haoyu Lin, Jiangshan Yu
Runchao Han, Haoyu Lin, Jiangshan Yu
Cryptanalysis of the MALICIOUS Framework
Tim Beyne, Chaoyun Li
Tim Beyne, Chaoyun Li
Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification
Yang Yu, Michail Moraitis, Elena Dubrova
Yang Yu, Michail Moraitis, Elena Dubrova
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories
Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu
Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis, Felix Günther
Hannah Davis, Felix Günther
Secure Data Hiding for Contact Tracing
Craig Gotsman, Kai Hormann
Craig Gotsman, Kai Hormann
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things
Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari
Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari
Simple and Efficient FE for Quadratic Functions
Junqing Gong, Haifeng Qian
Junqing Gong, Haifeng Qian
A Bit-Vector Differential Model for the Modular Addition by a Constant
Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
Post-Quantum Anonymous Veto Networks
Jintai Ding, Doug Emery, Johannes Mueller, Peter Y. A. Ryan, Vonn Kee Wong
Jintai Ding, Doug Emery, Johannes Mueller, Peter Y. A. Ryan, Vonn Kee Wong
Polynomial IOPs for Linear Algebra Relations
Alan Szepieniec, Yuncong Zhang
Alan Szepieniec, Yuncong Zhang
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Towards Classical Hardness of Module-LWE: The Linear Rank Case
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
Security of Streaming Encryption in Google's Tink Library
Viet Tung Hoang, Yaobin Shen
Viet Tung Hoang, Yaobin Shen
Small Superset and Big Subset Obfuscation
Steven D. Galbraith, Trey Li
Steven D. Galbraith, Trey Li
Governance framework for Quipuswap - automated decentralized exchange
Andrey Sobol, Anastasiia Kondaurova
Andrey Sobol, Anastasiia Kondaurova
Hardware-Assisted Intellectual Property Protection of Deep Learning Models
Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.
Vasyl Ustimenko
Vasyl Ustimenko
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel
Yuntao Liu, Ankur Srivastava
Yuntao Liu, Ankur Srivastava
A Study on Privacy-Preserving GRU Inference Framework
Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso
Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem
Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem
Private Join and Compute from PIR with Default
Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu
Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu
Indistinguishability Obfuscation from Circular Security
Romain Gay, Rafael Pass
Romain Gay, Rafael Pass
Obfuscating Finite Automata
Steven D. Galbraith, Lukas Zobernig
Steven D. Galbraith, Lukas Zobernig
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
Leah Lathrop
Leah Lathrop
Attacks on Integer-RLWE
Alessandro Budroni, Benjamin Chetioui, Ermes Franch
Alessandro Budroni, Benjamin Chetioui, Ermes Franch
An Analysis of Fault Attacks on CSIDH
Jason LeGrow, Aaron Hutchinson
Jason LeGrow, Aaron Hutchinson
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks
Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger
Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson
Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson
Indistinguishability Obfuscation from Well-Founded Assumptions
Aayush Jain, Huijia Lin, Amit Sahai
Aayush Jain, Huijia Lin, Amit Sahai
CrypTFlow2: Practical 2-Party Secure Inference
Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
Robust distributed symmetric-key encryption
Xunhua Wang, Ben Huson
Xunhua Wang, Ben Huson
Mechanised Models and Proofs for Distance-Bounding
Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gerault, Pascal Lafourcade
Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gerault, Pascal Lafourcade
Attribute-Based Symmetric Searchable Encryption
Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas
Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas
Lightweight Virtual Payment Channels
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
Unifying Generic Group Models
Ueli Maurer, Christopher Portmann, Jiamin Zhu
Ueli Maurer, Christopher Portmann, Jiamin Zhu
Bootstrapping fully homomorphic encryption over the integers in less than one second
Hilder Vitor Lima Pereira
Hilder Vitor Lima Pereira
SPARKs: Succinct Parallelizable Arguments of Knowledge
Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
Cryptanalysis of Masked Ciphers: A not so Random Idea
Tim Beyne, Siemen Dhooghe, Zhenda Zhang
Tim Beyne, Siemen Dhooghe, Zhenda Zhang
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs
Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyojin Yoon, Jihoon Cho, Dong-Guk Han
Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyojin Yoon, Jihoon Cho, Dong-Guk Han
A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions
Anita John, Alan Reji, Ajay P Manoj, Atul Premachandran, Basil Zachariah, Jimmy Jose
Anita John, Alan Reji, Ajay P Manoj, Atul Premachandran, Basil Zachariah, Jimmy Jose
Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module
Junting Xiao, Tadahiko Ito
Junting Xiao, Tadahiko Ito
Algorithm for SIS and MultiSIS problems
Igor Semaev
Igor Semaev
120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron
Anupam Golder, Baogeng Ma, Debayan Das, Josef Danial, Shreyas Sen, Arijit Raychowdhury
Anupam Golder, Baogeng Ma, Debayan Das, Josef Danial, Shreyas Sen, Arijit Raychowdhury
Fuzzy Asymmetric Password-Authenticated Key Exchange
Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Thomas Peyrin, Haoyang Wang
Thomas Peyrin, Haoyang Wang
Orienting supersingular isogeny graphs
Leonardo Colò, David Kohel
Leonardo Colò, David Kohel
On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.
Vasyl Ustimenko
Vasyl Ustimenko
A Differential Meet-in-the-Middle Attack on the Zip cipher
Michael Stay
Michael Stay
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher
Manan Pareek, Dr. Girish Mishra, Varun Kohli
Manan Pareek, Dr. Girish Mishra, Varun Kohli
SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE
Ruta Jawale, Yael Tauman Kalai, Dakshita Khurana, Rachel Zhang
Ruta Jawale, Yael Tauman Kalai, Dakshita Khurana, Rachel Zhang
Mercurial Signatures for Variable-Length Messages
Elizabeth C. Crites, Anna Lysyanskaya
Elizabeth C. Crites, Anna Lysyanskaya
Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher
Sarah Alzakari, Poorvi Vora
Sarah Alzakari, Poorvi Vora
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis
Guilherme Perin, Stjepan Picek
Guilherme Perin, Stjepan Picek
Synchronizable Exchange
Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies
Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions
Dongxi Liu, Surya Nepal
Dongxi Liu, Surya Nepal
Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path
David Heath, Vladimir Kolesnikov
David Heath, Vladimir Kolesnikov
Optimized Binary GCD for Modular Inversion
Thomas Pornin
Thomas Pornin
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
Koksal Mus, Saad Islam, Berk Sunar
Koksal Mus, Saad Islam, Berk Sunar
Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza
Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza
Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$
Dmitrii Koshelev
Dmitrii Koshelev
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness
Gideon Samid
Gideon Samid
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang
Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang
EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices
Rick Boivie, Charanjit S. Jutla, Daniel Friedman, Ghavam Shahidi
Rick Boivie, Charanjit S. Jutla, Daniel Friedman, Ghavam Shahidi
Computation of a 30750-Bit Binary Field Discrete Logarithm
Robert Granger, Thorsten Kleinjung, Arjen K. Lenstra, Benjamin Wesolowski, Jens Zumbragel
Robert Granger, Thorsten Kleinjung, Arjen K. Lenstra, Benjamin Wesolowski, Jens Zumbragel
Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption
Hamish Hunt, Jack Crawford, Oliver Masters, Enrico Steffinlongo, Flavio Bergamaschi
Hamish Hunt, Jack Crawford, Oliver Masters, Enrico Steffinlongo, Flavio Bergamaschi
From Partial to Global Asynchronous Reliable Broadcast
Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang
Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang
Post-Quantum Verification of Fujisaki-Okamoto
Dominique Unruh
Dominique Unruh
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference
Qizheng Wang, Wenping Ma, Jie Li, Ge Liu
Qizheng Wang, Wenping Ma, Jie Li, Ge Liu
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key Settings
Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim
Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim
Multi-Threshold Asynchronous Reliable Broadcast and Consensus
Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang
Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang
Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs
Johannes Tobisch, Anita Aghaie, Georg T. Becker
Johannes Tobisch, Anita Aghaie, Georg T. Becker
Constant Time Montgomery Ladder
Kaushik Nath, Palash Sarkar
Kaushik Nath, Palash Sarkar
Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings
Mark Zhandry
Mark Zhandry
Performance comparison between deep learning-based and conventional cryptographic distinguishers
Emanuele Bellini, Matteo Rossi
Emanuele Bellini, Matteo Rossi
On What to Learn: Train or Adapt a Deeply Learned Profile?
Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser
Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser
Amplifying the Security of Functional Encryption, Unconditionally
Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai
Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai
Self-Processing Private Sensor Data via Garbled Encryption
Nathan Manohar, Abhishek Jain, Amit Sahai
Nathan Manohar, Abhishek Jain, Amit Sahai
HABIT: Hardware-Assisted Bluetooth-based Infection Tracking
Nathan Manohar, Peter Manohar, Rajit Manohar
Nathan Manohar, Peter Manohar, Rajit Manohar
STARK Friendly Hash -- Survey and Recommendation
Eli Ben-Sasson, Lior Goldberg, David Levit
Eli Ben-Sasson, Lior Goldberg, David Levit
Data Oblivious Algorithms for Multicores
Vijaya Ramachandran, Elaine Shi
Vijaya Ramachandran, Elaine Shi
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
Johannes Mittmann, Werner Schindler
Johannes Mittmann, Werner Schindler
On the (in)security of ROS
Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
Secure Conflict-free Replicated Data Types
Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, Nuno Preguiça
Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, Nuno Preguiça
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
Runchao Han, Jiangshan Yu, Ren Zhang
Runchao Han, Jiangshan Yu, Ren Zhang
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness
Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar Weippl
Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar Weippl
Alternative Tower Field Construction for Quantum Implementation of the AES S-box
Doyoung Chung, Seungkwang Lee, Dooho choi, Jooyoung Lee
Doyoung Chung, Seungkwang Lee, Dooho choi, Jooyoung Lee
Directly revocable ciphertext-policy attribute-based encryption from lattices
Fei Meng
Fei Meng
DLDDO: Deep Learning to Detect Dummy Operations
JongHyeok Lee, Dong-Guk Han
JongHyeok Lee, Dong-Guk Han
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves
Suyash Bagad, Saravanan Vijayakumaran
Suyash Bagad, Saravanan Vijayakumaran
BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks
Colin O'Flynn
Colin O'Flynn
Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security
Mahender Kumar
Mahender Kumar
Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions
Davide Andreoletti, Omran Ayoub, Silvia Giordano, Massimo Tornatore, Giacomo Verticale
Davide Andreoletti, Omran Ayoub, Silvia Giordano, Massimo Tornatore, Giacomo Verticale
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller
Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller
Instantiation of RO Model Transforms via Extractable Functions
Mohammad Zaheri
Mohammad Zaheri
A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings
Atul Chaturvedi, Varun Shukla, Manoj K. Misra
Atul Chaturvedi, Varun Shukla, Manoj K. Misra
Homomorphic string search with constant multiplicative depth
Charlotte Bonte, Ilia Iliashenko
Charlotte Bonte, Ilia Iliashenko
The design of scalar AES Instruction Set Extensions for RISC-V
Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf
Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf
Local XOR Unification: Definitions, Algorithms and Application to Cryptography
Hai Lin, Christopher Lynch
Hai Lin, Christopher Lynch
Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
Omri Shmueli
Omri Shmueli
A Gas-Efficient Superlight Bitcoin Client in Solidity
Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
Secure Computation over Lattices and Elliptic Curves
Brett Hemenway Falk, Daniel Noble
Brett Hemenway Falk, Daniel Noble
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang
Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang
Ferret: Fast Extension for coRRElated oT with small communication
Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
Another code-based adaptation of Lyubashevsky’s signature cryptanalysed
Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit
Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit
Security Challenges in Smart Grid and Suitable Countermeasures
Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey
Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications
Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park
Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park
Further Cryptographic Properties of the Multiplicative Inverse Function
Deng Tang, Bimal Mandal, Subhamoy Maitra
Deng Tang, Bimal Mandal, Subhamoy Maitra
Tight Bounds for Simon's Algorithm
Xavier Bonnetain
Xavier Bonnetain
An Efficient Certificateless Authentication Protocol for the SAE J1939
Basker Palaniswamy
Basker Palaniswamy
Formalizing Nakamoto-Style Proof of Stake
Søren Eller Thomsen and Bas Spitters
Søren Eller Thomsen and Bas Spitters
Black-Box Transformations from Passive to Covert Security with Public Verifiability
Ivan Damgård, Claudio Orlandi, Mark Simkin
Ivan Damgård, Claudio Orlandi, Mark Simkin
Does Fiat-Shamir Require a Cryptographic Hash Function?
Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach
Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach
Ultra-Short Multivariate Public Key Signatures
Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa
Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa
Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis
Tarun Yadav, Manoj Kumar
Tarun Yadav, Manoj Kumar
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald, Wang Yao, Zhiming Zheng
Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald, Wang Yao, Zhiming Zheng
Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE
Ruta Jawale, Dakshita Khurana
Ruta Jawale, Dakshita Khurana
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh
Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh
When is a test not a proof?
Eleanor McMurtry, Olivier Pereira, Vanessa Teague
Eleanor McMurtry, Olivier Pereira, Vanessa Teague
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow
Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu
Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu
Enhanced Flush+Reload Attack on AES
Milad Seddigh, Hadi Soleimany
Milad Seddigh, Hadi Soleimany
Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited
Ashish Choudhury
Ashish Choudhury
Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework
Marco Baldi, Karan Khathuria, Edoardo Persichetti, Paolo Santini
Marco Baldi, Karan Khathuria, Edoardo Persichetti, Paolo Santini
A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis
Huimin Li, Marina Krček, Guilherme Perin
Huimin Li, Marina Krček, Guilherme Perin
Optimizing Implementations of Linear Layers
Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang
Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang
Federated Learning in Side-Channel Analysis
Huanyu Wang, Elena Dubrova
Huanyu Wang, Elena Dubrova
A Not-So-Trival Replay Attack Against DH-PSI
Hongrui Cui, Yu Yu
Hongrui Cui, Yu Yu
Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet
Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet
On the Attack Evaluation and the Generalization Ability in Profiling Side-channel Analysis
Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
Rapidly Verifiable XMSS Signatures
Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal
Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
Jan Richter-Brockmann, Johannes Mono, Tim Güneysu
Jan Richter-Brockmann, Johannes Mono, Tim Güneysu
Fault Injection as an Oscilloscope: Fault Correlation Analysis
Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski
Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski
Multi-Currency Ledgers
Joachim Zahnentferner
Joachim Zahnentferner
Gossiping For Communication-Efficient Broadcast
Georgios Tsimos, Julian Loss, Charalampos Papamanthou
Georgios Tsimos, Julian Loss, Charalampos Papamanthou
Toward an Asymmetric White-Box Proposal
Lucas Barthelemy
Lucas Barthelemy
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks
Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin
Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek
Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek
Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi
Aein Rezaei Shahmirzadi, Amir Moradi
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme
Emanuele Strieder, Christoph Frisch, Michael Pehl
Emanuele Strieder, Christoph Frisch, Michael Pehl
Updatable Blockchains
Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros
Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros
Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption
Keita Emura, Atsushi Takayasu, Yohei Watanabe
Keita Emura, Atsushi Takayasu, Yohei Watanabe
Wendy, the Good Little Fairness Widget
Klaus Kursawe
Klaus Kursawe
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
Jeroen Delvaux
Jeroen Delvaux
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES
Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault
Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault
Classical Reduction of Gap SVP to LWE: A Concrete Security Analysis
Palash Sarkar, Subhadip Singha
Palash Sarkar, Subhadip Singha
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti, Srinivas Vivek
Annapurna Valiveti, Srinivas Vivek
Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes
Sankhanil De, Ranjan Ghosh
Sankhanil De, Ranjan Ghosh
Unclonable Decryption Keys
Marios Georgiou, Mark Zhandry
Marios Georgiou, Mark Zhandry
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
Claude Carlet, Sylvain Guilley, Sihem Mesnager
Claude Carlet, Sylvain Guilley, Sihem Mesnager
Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves
Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya
Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya
New Methods and Abstractions for RSA-Based Forward Secure Signatures
Susan Hohenberger, Brent Waters
Susan Hohenberger, Brent Waters
Post-Quantum Group Key Agreement Scheme
Julia Bobrysheva, Sergey Zapechnikov
Julia Bobrysheva, Sergey Zapechnikov
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli
Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli
Quantum Immune One-Time Memories
Qipeng Liu, Amit Sahai, Mark Zhandry
Qipeng Liu, Amit Sahai, Mark Zhandry
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
Yu Yu, Jiang Zhang
Yu Yu, Jiang Zhang
An Algorithmic Reduction Theory for Binary Codes: LLL and more
Thomas Debris-Alazard, Léo Ducas, Wessel P. J. van Woerden
Thomas Debris-Alazard, Léo Ducas, Wessel P. J. van Woerden
SoK: A Taxonomy of Cryptocurrency Wallets
Kostis Karantias
Kostis Karantias
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks
Ping Wang, Ping Chen, Zhimin Luo, Gaofeng Dong, Mengce Zheng, Nenghai Yu, Honggang Hu
Ping Wang, Ping Chen, Zhimin Luo, Gaofeng Dong, Mengce Zheng, Nenghai Yu, Honggang Hu
Development of The RISC-V Entropy Source Interface
Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall
Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall
Agora: A Privacy-Aware Data Marketplace
Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui
Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç, Alptekin Küpçü
Ferhat Karakoç, Alptekin Küpçü
Privacy-Preserving Automated Exposure Notification
Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner
Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner
Protecting Cryptography Against Compelled Self-Incrimination
Sarah Scheffler, Mayank Varia
Sarah Scheffler, Mayank Varia
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT
Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
SNARGs for Bounded Depth Computations from Sub-Exponential LWE
Yael Tauman Kalai, Rachel Zhang
Yael Tauman Kalai, Rachel Zhang
A Classification of Computational Assumptions in the Algebraic Group Model
Balthazar Bauer, Georg Fuchsbauer, Julian Loss
Balthazar Bauer, Georg Fuchsbauer, Julian Loss
Client-oblivious OPRAM
Gareth T. Davies, Christian Janson, Daniel P. Martin
Gareth T. Davies, Christian Janson, Daniel P. Martin
Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld
Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld
Improving Revocation for Group Signature with Redactable Signature
Olivier Sanders
Olivier Sanders
Fooling primality tests on smartcards
Vladimir Sedlacek, Jan Jancar, Petr Svenda
Vladimir Sedlacek, Jan Jancar, Petr Svenda
Designing Reverse Firewalls for the Real World
Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe
Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe
Linear-Complexity Private Function Evaluation is Practical
Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Chelsea Komlo, Ian Goldberg
Chelsea Komlo, Ian Goldberg
Asynchronous Byzantine Agreement with Subquadratic Communication
Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss
Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss
On the Guaranteed Number of Activations in XS-circuits
Sergey Agievich
Sergey Agievich
Surveying global verifiability
Ben Smyth
Ben Smyth
On Composability of Game-based Password Authenticated Key Exchange
Marjan Škrobot, Jean Lancrenon
Marjan Škrobot, Jean Lancrenon
Encrypt-to-self: Securely Outsourcing Storage
Jeroen Pijnenburg, Bertram Poettering
Jeroen Pijnenburg, Bertram Poettering
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT
Aayush Jain, Varun Kohli, Girish Mishra
Aayush Jain, Varun Kohli, Girish Mishra
Post-Quantum Adaptor Signatures and Payment Channel Networks
Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin
Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin
Generic Superlight Client for Permissionless Blockchains
Yuan Lu, Qiang Tang, Guiling Wang
Yuan Lu, Qiang Tang, Guiling Wang
Dragoon: Private Decentralized HITs Made Practical
Yuan Lu, Qiang Tang, Guiling Wang
Yuan Lu, Qiang Tang, Guiling Wang
Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited
Yuan Lu, Zhenliang Lu, Qiang Tang, and Guiling Wang
Yuan Lu, Zhenliang Lu, Qiang Tang, and Guiling Wang
Dumbo: Faster Asynchronous BFT Protocols
Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
Proof of Storage-Time: Efficiently Checking Continuous Data Availability
Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$
Loïc Ferreira
Loïc Ferreira
PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks
David A August, Anne C Smith
David A August, Anne C Smith
An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
Daniel Kales, Greg Zaverucha
Daniel Kales, Greg Zaverucha
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoit Viguier
Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoit Viguier
On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function
Congwei Zhou, Bin Hu, Jie Guan
Congwei Zhou, Bin Hu, Jie Guan
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison
Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration
Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis
Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis
Round-optimal Black-box Commit-and-prove with Succinct Communication
Susumu Kiyoshima
Susumu Kiyoshima
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs
Michele Ciampi, Roberto Parisella, Daniele Venturi
Michele Ciampi, Roberto Parisella, Daniele Venturi
Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles
Arnold G. Reinhold
Arnold G. Reinhold
Refined Analysis of the Asymptotic Complexity of the Number Field Sieve
Aude Le Gluher, Pierre-Jean Spaenlehauer, Emmanuel Thomé
Aude Le Gluher, Pierre-Jean Spaenlehauer, Emmanuel Thomé
Modified Secure Hashing algorithm(MSHA-512)
Ashoka SB, Lakshmikanth D
Ashoka SB, Lakshmikanth D
Encrypted Blockchain Databases
Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
Xuan Thanh Do, Duong Hieu Phan, Moti Yung
Xuan Thanh Do, Duong Hieu Phan, Moti Yung
Private Set Intersection from TFHE for Cloud Computing Scenarios
Jiayu Qiang, Yi Deng
Jiayu Qiang, Yi Deng
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
The Provable Security of Ed25519: Theory and Practice
Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries
Kwangsu Lee
Kwangsu Lee
Interconnect-Aware Bitstream Modification
Michail Moraitis, Elena Dubrova
Michail Moraitis, Elena Dubrova
On the security of the Rescue hash function
Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer
Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer
UC-Secure OT from LWE, Revisited
Willy Quach
Willy Quach
Security Limitations of Classical-Client Delegated Quantum Computing
Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden
Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation
Osman Biçer, Alptekin Küpçü
Osman Biçer, Alptekin Küpçü
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music, Céline Chevalier, Elham Kashefi
Luka Music, Céline Chevalier, Elham Kashefi
Cryptographic Divergences: New Techniques and New Applications
Marc Abboud, Thomas Prest
Marc Abboud, Thomas Prest
Incompressible Encodings
Tal Moran, Daniel Wichs
Tal Moran, Daniel Wichs
Strengthening Sequential Side-Channel Attacks Through Change Detection
Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
Lior Rotem, Gil Segev
Lior Rotem, Gil Segev
Another Look at Extraction and Randomization of Groth's zk-SNARK
Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov
Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov
A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>
Shuyang Tang
Shuyang Tang
On (expected polynomial) runtime in cryptography
Michael Klooß
Michael Klooß
Security Analysis of Olvid's SAS-based Trust Establishment Protocol
Michel Abdalla
Michel Abdalla
Secure merge with $O(n \log \log n)$ secure operation
Brett Hemenway Falk, Rafail Ostrovsky
Brett Hemenway Falk, Rafail Ostrovsky
Toward Comparable Homomorphic Encryption for Crowd-sensing Network
Daxin Huang, Qingqing Gan, Xiaoming Wang, Chengpeng Huang, Yijian Lin
Daxin Huang, Qingqing Gan, Xiaoming Wang, Chengpeng Huang, Yijian Lin
Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud
Furkan Turan, Ingrid Verbauwhede
Furkan Turan, Ingrid Verbauwhede
Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption
Bastian Richter, Amir Moradi
Bastian Richter, Amir Moradi
Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu
Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu
Quantum Attacks on HCTR and its Variants
Mostafizar Rahman, Goutam Paul
Mostafizar Rahman, Goutam Paul
Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$
Ward Beullens
Ward Beullens
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
Mihir Bellare, Wei Dai, Phillip Rogaway
Mihir Bellare, Wei Dai, Phillip Rogaway
Secure Generalized Deduplication via Multi-Key Revealing Encryption
Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin, Rasmus Vestergaard
Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin, Rasmus Vestergaard
Superposition Attack on OT Protocols
Ehsan Ebrahimi, Céline Chevalier, Marc Kaplan, Michele Minelli
Ehsan Ebrahimi, Céline Chevalier, Marc Kaplan, Michele Minelli
Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519
Mojtaba Bisheh Niasar, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Mojtaba Bisheh Niasar, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
A Generalization of Paillier's Public-Key System With Fast Decryption
Ying Guo, Zhenfu Cao, Xiaolei Dong
Ying Guo, Zhenfu Cao, Xiaolei Dong
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches
Viet Ba Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj
Viet Ba Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj
Symbolic and Computational Reasoning About Cryptographic Modes of Operation
Catherine Meadows
Catherine Meadows
PHyCT : Privacy preserving Hybrid Contact Tracing
Mahabir Prasad Jhanwar, Sumanta Sarkar
Mahabir Prasad Jhanwar, Sumanta Sarkar
Trace-$\Sigma$: a privacy-preserving contact tracing app
Jean-François Biasse, Sriram Chellappan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila Yavuz
Jean-François Biasse, Sriram Chellappan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila Yavuz
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar
Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar
Anonymity and Rewards in Peer Rating Systems
Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso
Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso
Double-Authentication-Preventing Signatures in the Standard Model
Dario Catalano, Georg Fuchsbauer, Azam Soleimanian
Dario Catalano, Georg Fuchsbauer, Azam Soleimanian
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner
Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner
A Note on Separating Classical and Quantum Random Oracles
Takashi Yamakawa, Mark Zhandry
Takashi Yamakawa, Mark Zhandry
Random Probing Security: Verification, Composition, Expansion and New Constructions
Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb
Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb
The Memory-Tightness of Authenticated Encryption
Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro
Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
Adventures in Crypto Dark Matter: Attacks, Fixes for Weak Pseudorandom Functions
Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim
Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim
A Love Affair Between Bias Amplifiers and Broken Noise Sources
George Teseleanu
George Teseleanu
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier
Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
Non-Malleable Time-Lock Puzzles and Applications
Cody Freitag, Ilan Komargodski, Rafael Pass, Naomi Sirkin
Cody Freitag, Ilan Komargodski, Rafael Pass, Naomi Sirkin
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin
Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin
Dynamic Universal Accumulator with Batch Update over Bilinear Groups
Giuseppe Vitto, Alex Biryukov
Giuseppe Vitto, Alex Biryukov
Non-Malleable Codes for Bounded Polynomial-Depth Tampering
Dana Dachman-Soled, Ilan Komargodski, Rafael Pass
Dana Dachman-Soled, Ilan Komargodski, Rafael Pass
Improved Differential-Linear Attacks with Applications to ARX Ciphers
Christof Beierle, Gregor Leander, Yosuke Todo
Christof Beierle, Gregor Leander, Yosuke Todo
Timelocked Bribing
Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
An Instruction Set Extension to Support Software-Based Masking
Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham, Francesco Regazzoni
Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham, Francesco Regazzoni
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
Alex Lombardi, Vinod Vaikuntanathan
Alex Lombardi, Vinod Vaikuntanathan
Leakage-Resilient Key Exchange and Two-Seed Extractors
Xin Li, Fermi Ma, Willy Quach, Daniel Wichs
Xin Li, Fermi Ma, Willy Quach, Daniel Wichs
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
Akshima, David Cash, Andrew Drucker, Hoeteck Wee
Akshima, David Cash, Andrew Drucker, Hoeteck Wee
Lattice-Based Blind Signatures, Revisited
Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
Perfect Zero Knowledge: New Upperbounds and Relativized Separations
Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran
Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics
Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz
Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz
Handling Adaptive Compromise for Practical Encryption Schemes
Joseph Jaeger, Nirvan Tyagi
Joseph Jaeger, Nirvan Tyagi
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai
Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai
Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol
Jia Xu, Yiwen Gao, Hoonwei Lim, Hongbing Wang, and Ee-Chien Chang
Jia Xu, Yiwen Gao, Hoonwei Lim, Hongbing Wang, and Ee-Chien Chang
Functional Encryption for Attribute-Weighted Sums from $k$-Lin
Michel Abdalla, Junqing Gong, Hoeteck Wee
Michel Abdalla, Junqing Gong, Hoeteck Wee
Decentralized reputation
Tassos Dimitriou
Tassos Dimitriou
Curves with fast computations in the first pairing group
Rémi Clarisse, Sylvain Duquesne, Olivier Sanders
Rémi Clarisse, Sylvain Duquesne, Olivier Sanders
Chosen Ciphertext Security from Injective Trapdoor Functions
Susan Hohenberger, Venkata Koppula, Brent Waters
Susan Hohenberger, Venkata Koppula, Brent Waters
Verifiable state machines: Proofs that untrusted services operate correctly
Srinath Setty, Sebastian Angel, Jonathan Lee
Srinath Setty, Sebastian Angel, Jonathan Lee
Understanding Methodology for Efficient CNN Architectures in Profiling Attacks
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
Provable Security Analysis of FIDO2
Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
Time-release Cryptography from Minimal Circuit Assumptions
Samuel Jaques, Hart Montgomery, Arnab Roy
Samuel Jaques, Hart Montgomery, Arnab Roy
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk
Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk
Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge
Thomas Attema, Ronald Cramer, Serge Fehr
Thomas Attema, Ronald Cramer, Serge Fehr
Continuous Group Key Agreement with Active Security
Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk
Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging
Max Hoffmann, Christof Paar
Max Hoffmann, Christof Paar
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang
Anonymous probabilistic payment in payment hub
Tatsuo Mitani, Akira Otsuka
Tatsuo Mitani, Akira Otsuka
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung
Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung
Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application
Latif AKÇAY, Berna ÖRS
Latif AKÇAY, Berna ÖRS
True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG)
Siddaramappa V, Ramesh K B
Siddaramappa V, Ramesh K B
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli
Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras
Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Qian Guo, Thomas Johansson, Alexander Nilsson
Qian Guo, Thomas Johansson, Alexander Nilsson
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
Jan Richter-Brockmann, Tim Güneysu
Jan Richter-Brockmann, Tim Güneysu
Fast Privacy-Preserving Punch Cards
Saba Eskandarian
Saba Eskandarian
Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback
Erica Blum, Chen-Da Liu-Zhang, Julian Loss
Erica Blum, Chen-Da Liu-Zhang, Julian Loss
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles
Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
GIFT-COFB
Subhadeep Banik, Avik Chakraborti, Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
Subhadeep Banik, Avik Chakraborti, Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
Forward Security under Leakage Resilience, Revisited
Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, and C. Pandu Rangan
Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, and C. Pandu Rangan
Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger
Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo
Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo
Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2
Benoît Cogliati, Jacques Patarin
Benoît Cogliati, Jacques Patarin
A Side-Channel Resistant Implementation of SABER
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede
Security of Multi-Adjustable Join Schemes: Separations and Implications
Mojtaba Rafiee, Shahram Khazaei
Mojtaba Rafiee, Shahram Khazaei
The Exact Security of PMAC with Three Powering-Up Masks
Yusuke Naito
Yusuke Naito
On the Security of Time-Lock Puzzles and Timed Commitments
Jonathan Katz, Julian Loss, Jiayu Xu
Jonathan Katz, Julian Loss, Jiayu Xu
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
Melissa Chase, Peihan Miao
Melissa Chase, Peihan Miao
Minerva: The curse of ECDSA nonces
Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
Adrian Ranea, Yunwen Liu, Tomer Ashur
Adrian Ranea, Yunwen Liu, Tomer Ashur
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
Denis Diemert, Tibor Jager
Denis Diemert, Tibor Jager
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
Multi-Party Revocation in Sovrin: Performance through Distributed Trust
Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
On the Confidentiality of Amounts in Grin
Suyash Bagad, Saravanan Vijayakumaran
Suyash Bagad, Saravanan Vijayakumaran
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek, Anat Bremler-Barr, Lior Shafir
Yehuda Afek, Anat Bremler-Barr, Lior Shafir
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
Fast algebraic immunity of Boolean functions and LCD codes
Sihem Mesnager, Chunming Tang
Sihem Mesnager, Chunming Tang
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Marc Fischlin, Felix Günther, Christian Janson
Marc Fischlin, Felix Günther, Christian Janson
Fault Location Identification By Machine Learning
Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay
Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
Takeshi Sugawara, Tatsuya Onuma, Yang Li
Takeshi Sugawara, Tatsuya Onuma, Yang Li
On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH
Sergij V. Goncharov
Sergij V. Goncharov
One-One Constrained Pseudorandom Functions
Naty Peter, Rotem Tsabary, Hoeteck Wee
Naty Peter, Rotem Tsabary, Hoeteck Wee
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
Anonymous IBE From Quadratic Residuosity With Fast Encryption
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Rational Behavior in Committee-Based Blockchains
Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Reputable List Curation from Decentralized Voting
Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer
Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov
Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks
Eleonora Testa, Mathias Soeken, Heinz Riener, Luca Amaru, Giovanni De Micheli
Eleonora Testa, Mathias Soeken, Heinz Riener, Luca Amaru, Giovanni De Micheli
On the minimal value set size of APN functions
Ingo Czerwinski
Ingo Czerwinski
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova
James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova
New Complexity Estimation on the Rainbow-Band-Separation Attack
Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi
Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi
Rainbow Band Separation is Better than we Thought
Ray Perlner, Daniel Smith-Tone
Ray Perlner, Daniel Smith-Tone
MPC with Friends and Foes
Bar Alon, Eran Omri, Anat Paskin-Cherniavsky
Bar Alon, Eran Omri, Anat Paskin-Cherniavsky
Personal data exchange protocol: X
Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov
Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov
Looking at the NIST Lightweight Candidates from a Masking Point-of-View
Lauren De Meyer
Lauren De Meyer
Forgery attack on the authentication encryption GIFT-COFB
Zhe CEN, Xiutao FENG, Zhangyi Wang, Chunping CAO
Zhe CEN, Xiutao FENG, Zhangyi Wang, Chunping CAO
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Thomé, P. Zimmermann
F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Thomé, P. Zimmermann
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials
Yin Li, Yu Zhang
Yin Li, Yu Zhang
Collusion Resistant Watermarkable PRFs from Standard Assumptions
Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu
Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu
The nearest-colattice algorithm
Thomas Espitau, Paul Kirchner
Thomas Espitau, Paul Kirchner
Tight Quantum Time-Space Tradeoffs for Function Inversion
Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian
Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian
Optimizing Inner Product Masking Scheme by A Coding Theory Approach
Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger
Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms
Diego Aranha, Anders Dalskov, Daniel Escudero, Claudio Orlandi
Diego Aranha, Anders Dalskov, Daniel Escudero, Claudio Orlandi
SAFE: A Secure and Efficient Long-Term Distributed Storage System
Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle
Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle
Lin2-Xor Lemma: an OR-proof that leads to the membership proof and signature
Anton A. Sokolov
Anton A. Sokolov
Lower Bounds on the Time/Memory Tradeoff of Function Inversion
Dror Chawin, Iftach Haitner, Noam Mazor
Dror Chawin, Iftach Haitner, Noam Mazor
A Level Dependent Authentication for IoT Paradigm
Chintan Patel, Nishant Doshi
Chintan Patel, Nishant Doshi
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors
Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan
Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan
How to (legally) keep secrets from mobile operators
Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete
Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks
Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks
Succinct Diophantine-Satisfiability Arguments
Patrick Towa, Damien Vergnaud
Patrick Towa, Damien Vergnaud
An F-algebra for analysing information leaks in the presence of glitches
Vittorio Zaccaria
Vittorio Zaccaria
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition
Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
BETA: Biometric Enabled Threshold Authentication
Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis
Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov
Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov
Blockchain with Varying Number of Players
T-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi
T-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi
An airdrop that preserves recipient privacy
Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon
Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon
Ledger Combiners for Fast Settlement
Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell
Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell
Coercion-Resistant Blockchain-Based E-Voting Protocol
Chiara Spadafora, Riccardo Longo, Massimiliano Sala
Chiara Spadafora, Riccardo Longo, Massimiliano Sala
LotMint: Blockchain Returning to Decentralization with Decentralized Clock
Wenbo MAO, Wenxiang WANG
Wenbo MAO, Wenxiang WANG
A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy
Leonie Reichert, Samuel Brack, Björn Scheuermann
Leonie Reichert, Samuel Brack, Björn Scheuermann
Persistent Fault Analysis With Few Encryptions
Sebastien Carre, Sylvain Guilley, Olivier Rioul
Sebastien Carre, Sylvain Guilley, Olivier Rioul
Inverse-Sybil Attacks in Automated Contact Tracing
Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Proof of Mirror Theory for $\xi_{\max}=2$
Avijit Dutta, Mridul Nandi, Abishanka Saha
Avijit Dutta, Mridul Nandi, Abishanka Saha
On Subversion-Resistant SNARKs
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan
Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan
Revisiting the Hardness of Binary Error LWE
Chao Sun, Mehdi Tibouchi, Masayuki Abe
Chao Sun, Mehdi Tibouchi, Masayuki Abe
Montgomery-friendly primes and applications to cryptography
Jean Claude Bajard, Sylvain Duquesne
Jean Claude Bajard, Sylvain Duquesne
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
Amos Beimel, Oriol Farràs
Amos Beimel, Oriol Farràs
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
Wei Dai, Stefano Tessaro, Xihu Zhang
Wei Dai, Stefano Tessaro, Xihu Zhang
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross
John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
Tight Consistency Bounds for Bitcoin
Peter Gaži, Aggelos Kiayias, Alexander Russell
Peter Gaži, Aggelos Kiayias, Alexander Russell
Efficient Software Implementation of the SIKE Protocol Using a New Data Representation
Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl
Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl
Software Evaluation of Grain-128AEAD for Embedded Platforms
Alexander Maximov, Martin Hell
Alexander Maximov, Martin Hell
Time-Specific Signatures
Masahito Ishizaka, Shinsaku Kiyomoto
Masahito Ishizaka, Shinsaku Kiyomoto
Traceable Constant-Size Multi-Authority Credentials
Chloé Hébant, David Pointcheval
Chloé Hébant, David Pointcheval
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel
Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin
Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin
Proximity Gaps for Reed-Solomon Codes
Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf
Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation
Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl
Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl
Somewhere Statistically Binding Commitment Schemes with Applications
Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim
Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim
Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things''
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
End-to-End Verifiable E-Voting Trial for Polling Station Voting
Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Liu
Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Liu
NIZK from SNARG
Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa
Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
Yuncong Hu, Sam Kumar, Raluca Ada Popa
Yuncong Hu, Sam Kumar, Raluca Ada Popa
A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes
Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat
Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices
Ward Beullens, Shuichi Katsumata, Federico Pintore
Ward Beullens, Shuichi Katsumata, Federico Pintore
Correlation distribution analysis of a two-round key-alternating block cipher
Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen
Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen
ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing
Ignacio Cascudo, Bernardo David
Ignacio Cascudo, Bernardo David
About Blockchain Interoperability
Pascal Lafourcade, Marius Lombard-Platet
Pascal Lafourcade, Marius Lombard-Platet
The Ritva Blockchain: Enabling Confidential Transactions at Scale
Henri Aare, Peter Vitols
Henri Aare, Peter Vitols
Overview of Polkadot and its Design Considerations
Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinc Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood
Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinc Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood
Grover on SPECK: Quantum Resource Estimates
Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo
Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo
Constructions for Quantum Indistinguishability Obfuscation
Anne Broadbent, Raza Ali Kazmi
Anne Broadbent, Raza Ali Kazmi
Delay Encryption
Jeffrey Burdges, Luca De Feo
Jeffrey Burdges, Luca De Feo
DABANGG: Time for Fearless Flush based Cache Attacks
Anish Saxena, Biswabandan Panda
Anish Saxena, Biswabandan Panda
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
Erik-Oliver Blass, Florian Kerschbaum
Erik-Oliver Blass, Florian Kerschbaum
Two-Round Oblivious Linear Evaluation from Learning with Errors
Pedro Branco, Nico Döttling, Paulo Mateus
Pedro Branco, Nico Döttling, Paulo Mateus
SILVER - Statistical Independence and Leakage Verification
David Knichel, Pascal Sasdrich, Amir Moradi
David Knichel, Pascal Sasdrich, Amir Moradi
Improved torsion-point attacks on SIDH variants
Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
Proposing an MILP-based Method for the Experimental Verification of Difference Trails
Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri
Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri
Simultaneous Diagonalization of Incomplete Matrices and Applications
Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese
Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy
Zhiguo Wan, Xiaotong Liu
Zhiguo Wan, Xiaotong Liu
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
Vivek Arte, Mihir Bellare
Vivek Arte, Mihir Bellare
A post-quantum key exchange protocol from the intersection of quadric surfaces
Daniele Di Tullio, Manoj Gyawali
Daniele Di Tullio, Manoj Gyawali
Attacking Zcash For Fun And Profit
Duke Leto, The Hush Developers
Duke Leto, The Hush Developers
Game theoretical framework for analyzing Blockchains Robustness
Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci
Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci
Probability theory and public-key cryptography
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
RSA for poor men: a cryptosystem based on probable primes to base 2 numbers
Marek Wójtowicz
Marek Wójtowicz
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim
Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim
The Direction of Updatable Encryption does not Matter Much
Yao Jiang
Yao Jiang
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Junbin Fang, Dominique Unruh, Jun Yan, Dehua Zhou
Junbin Fang, Dominique Unruh, Jun Yan, Dehua Zhou
Private Identity Agreement for Private Set Functionalities
Ben Kreuter, Sarvar Patel, Ben Terner
Ben Kreuter, Sarvar Patel, Ben Terner
Security Analysis of NIST CTR-DRBG
Viet Tung Hoang, Yaobin Shen
Viet Tung Hoang, Yaobin Shen
Broadcast Secret-Sharing, Bounds and Applications
Ivan Damgård, Kasper Green Larsen, Sophia Yakoubov
Ivan Damgård, Kasper Green Larsen, Sophia Yakoubov
New Techniques in Replica Encodings with Client Setup
Rachit Garg, George Lu, Brent Waters
Rachit Garg, George Lu, Brent Waters
Master-Key KDM-Secure IBE from Pairings
Sanjam Garg, Romain Gay, Mohammad Hajiabadi
Sanjam Garg, Romain Gay, Mohammad Hajiabadi
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
Lattice-Based E-Cash, Revisited
Amit Deo, Benoit Libert, Khoa Nguyen, Olivier Sanders
Amit Deo, Benoit Libert, Khoa Nguyen, Olivier Sanders
SiGamal: A supersingular isogeny-based PKE and its application to a PRF
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
Key Assignment Schemes with Authenticated Encryption, revisited
Jeroen Pijnenburg, Bertram Poettering
Jeroen Pijnenburg, Bertram Poettering
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA
Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Stronger Multilinear Maps from Indistinguishability Obfuscation
Navid Alamati, Hart Montgomery, Sikhar Patranabis
Navid Alamati, Hart Montgomery, Sikhar Patranabis
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers
Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl
Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits
Fatih Balli, Andrea Caforio, Subhadeep Banik
Fatih Balli, Andrea Caforio, Subhadeep Banik
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio, Fatih Balli, Subhadeep Banik
Andrea Caforio, Fatih Balli, Subhadeep Banik
Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs
Navid Alamati, Hart Montgomery, Sikhar Patranabis
Navid Alamati, Hart Montgomery, Sikhar Patranabis
LUSA: the HPC library for lattice-based cryptanalysis
Artur Mariano
Artur Mariano
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions
T-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak
T-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe, Marc Gourjon, Benjamin Gregoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
Gilles Barthe, Marc Gourjon, Benjamin Gregoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
CENCPP* - Beyond-birthday-secure Encryption from Public Permutations
Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi
Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi
Everything is a Race and Nakamoto Always Wins
Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
Multi-Party Threshold Private Set Intersection with Sublinear Communication
Saikrishna Badrinarayanan, Peihan Miao, Srinivasan Raghuraman, Peter Rindal
Saikrishna Badrinarayanan, Peihan Miao, Srinivasan Raghuraman, Peter Rindal
Private Matching for Compute
Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin
Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin
Cryptanalysis of Au et al. Dynamic Universal Accumulator
Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto
Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto
Bitstream Modification of Trivium
Kalle Ngo, Elena Dubrova, Michail Moraitis
Kalle Ngo, Elena Dubrova, Michail Moraitis
Relationships between quantum IND-CPA notions
Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Tabia, Dominique Unruh
Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Tabia, Dominique Unruh
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption
Masahito Ishizaka, Shinsaku Kiyomoto
Masahito Ishizaka, Shinsaku Kiyomoto
LESS is More: Code-Based Signatures without Syndromes
Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
Alt-Coin Traceability
Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu
Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version)
Fukang Liu, Takanori Isobe, Willi Meier
Fukang Liu, Takanori Isobe, Willi Meier
Expected Constant Round Byzantine Broadcast under Dishonest Majority
Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity
Mykhailo Kasianchuk, Mikolaj Karpinski, Roman Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko
Mykhailo Kasianchuk, Mikolaj Karpinski, Roman Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
ZaHyun Koo, Jong-Seon No, Young-Sik Kim
ZaHyun Koo, Jong-Seon No, Young-Sik Kim
MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System
Syh-Yuan Tan, Thomas Gross
Syh-Yuan Tan, Thomas Gross
Component-Based Comparison of Privacy-First Exposure Notification Protocols
Ellie Daw
Ellie Daw
Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi
Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi
vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs
Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh
Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh
A New Targeted Password Guessing Model
Xie Zhijie, Zhang Min, Yin Anqi, Li Zhenhan
Xie Zhijie, Zhang Min, Yin Anqi, Li Zhenhan
Risk and Architecture factors in Digital Exposure Notification
Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont
Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum, Eliran Kachlon, Arpita Patra
Benny Applebaum, Eliran Kachlon, Arpita Patra
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation
Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt
Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt
BitFund: A Benevolent Blockchain Funding Network
Darrow R Hartman
Darrow R Hartman
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
Inner-Product Functional Encryption with Fine-Grained Access Control
Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
How Low Can We Go?
Yuval Ishai
Yuval Ishai
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
Sanjit Chatterjee, R. Kabaleeshwaran
Sanjit Chatterjee, R. Kabaleeshwaran
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization
Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
Quantifying the Security Cost of Migrating Protocols to Practice
Christopher Patton, Thomas Shrimpton
Christopher Patton, Thomas Shrimpton
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin
Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers (Extended Version)
Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong
Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less
Dušan Božilov
Dušan Božilov
QA-NIZK Arguments of Same Opening for Bilateral Commitments
Carla Ràfols, Javier Silva
Carla Ràfols, Javier Silva
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
Tomer Ashur, Siemen Dhooghe
Tomer Ashur, Siemen Dhooghe
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu, Qi Wang, Siu-Ming Yiu
Yi Liu, Qi Wang, Siu-Ming Yiu
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain
Auqib Hamid Lone, Roohie Naaz
Auqib Hamid Lone, Roohie Naaz
Homomorphic Computation in Reed-Muller Codes
Jinkyu Cho, Young-Sik Kim, Jong-Seon No
Jinkyu Cho, Young-Sik Kim, Jong-Seon No
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
Secure large-scale genome-wide association studies using homomorphic encryption
Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser
Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim
Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
Fukang Liu, Takanori Isobe, Willi Meier
Fukang Liu, Takanori Isobe, Willi Meier
Zerojoin: Combining Zerocoin and CoinJoin
Alexander Chepurnoy, Amitabh Saxena
Alexander Chepurnoy, Amitabh Saxena
PIVOT: PrIVate and effective cOntact Tracing
Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa
Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa
BSPL: Balanced Static Power Logic
Bijan Fadaeinia, Thorben Moos, Amir Moradi
Bijan Fadaeinia, Thorben Moos, Amir Moradi
On the sensitivity of some APN permutations to swapping points
Lilya Budaghyan, Nikolay Kaleyski, Constanza Riera, Pantelimon Stanica
Lilya Budaghyan, Nikolay Kaleyski, Constanza Riera, Pantelimon Stanica
Kerckhoffs' Legacy
Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache
Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache
Splitting Payments Locally While Routing Interdimensionally
Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos
Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos
Bitcoin-Compatible Virtual Channels
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT
Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang
Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang
High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function
Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
Higher Order Differential Attack against Full-Round BIG
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
Ruiyu Zhu, Changchang Ding, Yan Huang
Ruiyu Zhu, Changchang Ding, Yan Huang
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
Blockchain Stealth Address Schemes
Gary Yu
Gary Yu
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer
Kai Hu, Qingju Wang, Meiqin Wang
Kai Hu, Qingju Wang, Meiqin Wang
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
Xin An, Kai Hu, Meiqin Wang
Xin An, Kai Hu, Meiqin Wang
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
Ran Canetti, Pratik Sarkar, Xiao Wang
Ran Canetti, Pratik Sarkar, Xiao Wang
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
Kachina - Foundations of Private Smart Contracts
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging
Benjamin Dowling, Britta Hale
Benjamin Dowling, Britta Hale
One Round Threshold ECDSA with Identifiable Abort
Rosario Gennaro, Steven Goldfeder
Rosario Gennaro, Steven Goldfeder
On the Concrete Security of LWE with Small Secret
Hao Chen, Lynn Chua, Kristin Lauter, Yongsoo Song
Hao Chen, Lynn Chua, Kristin Lauter, Yongsoo Song
Rotational Cryptanalysis on MAC Algorithm Chaskey
Liliya Kraleva, Tomer Ashur, Vincent Rijmen
Liliya Kraleva, Tomer Ashur, Vincent Rijmen
TARDIS: A Foundation of Time-Lock Puzzles in UC
Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner
Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions
Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
Post-quantum TLS without handshake signatures
Peter Schwabe, Douglas Stebila, Thom Wiggers
Peter Schwabe, Douglas Stebila, Thom Wiggers
Anonymous Lottery in the Proof-of-Stake Setting
Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou
Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou
Promise: Leveraging Future Gains for Collateral Reduction
Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin
Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin
Centralized or Decentralized? The Contact Tracing Dilemma
Serge Vaudenay
Serge Vaudenay
Determining the Multiplicative Complexity of Boolean Functions using SAT
Mathias Soeken
Mathias Soeken
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs
Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen
Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo
Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo
Aggregatable Subvector Commitments for Stateless Cryptocurrencies
Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich
Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography
Robert Dryło, Tomasz Kijko, Michał Wroński
Robert Dryło, Tomasz Kijko, Michał Wroński
Account Management in Proof of Stake Ledgers
Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
Efficient Signatures on Randomizable Ciphertexts
Balthazar Bauer, Georg Fuchsbauer
Balthazar Bauer, Georg Fuchsbauer
Generalized Matsui Algorithm 1 with application for the full DES
Tomer Ashur, Raluca Posteuca, Danilo Šijačić, Stef D’haeseleer
Tomer Ashur, Raluca Posteuca, Danilo Šijačić, Stef D’haeseleer
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
MP-SPDZ: A Versatile Framework for Multi-Party Computation
Marcel Keller
Marcel Keller
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation
Yarkın Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar
Yarkın Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar
Optimally-secure Coin-tossing against a Byzantine Adversary
Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler
Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler
Practical Product Proofs for Lattice Commitments
Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
Mordechai Guri
Mordechai Guri
On a hybrid approach to solve small secret LWE
Thomas Espitau, Antoine Joux, Natalia Kharchenko
Thomas Espitau, Antoine Joux, Natalia Kharchenko
On the Deployment of curve based cryptography for the Internet of Things
Michael Scott
Michael Scott
E-cclesia: Universally Composable Self-Tallying Elections
Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias, Léo Ackermann, Pavlos Georgiou
Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias, Léo Ackermann, Pavlos Georgiou
Glimpses are Forever in RC4 amidst the Spectre of Biases
Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
JaxNet: Scalable Blockchain Network
Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger
Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM
Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti
Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti
BBB Secure Nonce Based MAC Using Public Permutations
Avijit Dutta, Mridul Nandi
Avijit Dutta, Mridul Nandi
Augmenting Leakage Detection using Bootstrapping
Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont
Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont
Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)
Victoria Vysotskaya
Victoria Vysotskaya
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe
Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe
Storing and Retrieving Secrets on a Blockchain
Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song
Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
Aaron Hutchinson, Koray Karabina
Aaron Hutchinson, Koray Karabina
Applying Blockchain Layer2 Technology to Mass E-Commerce
Sijia Zhao, Donal O’Mahony
Sijia Zhao, Donal O’Mahony
Fast Threshold ECDSA with Honest Majority
Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård
Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
Proof-Carrying Data from Accumulation Schemes
Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner
Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner
Threshold ECDSA for Decentralized Asset Custody
Adam Gągol, Jędrzej Kula, Damian Straszak, Michał Świętek
Adam Gągol, Jędrzej Kula, Damian Straszak, Michał Świętek
Collusion-Preserving Computation without a Mediator
Michele Ciampi, Yun Lu, Vassilis Zikas
Michele Ciampi, Yun Lu, Vassilis Zikas
Linear Generalized ElGamal Encryption Scheme
Demba Sow, Léo Robert, Pascal Lafourcade
Demba Sow, Léo Robert, Pascal Lafourcade
Disperse rotation operator DRT and use in some stream ciphers
Kim Yong-Jin, Yon Yong-Ho, Jong Yu-Jin, Li Ok-Chol
Kim Yong-Jin, Yon Yong-Ho, Jong Yu-Jin, Li Ok-Chol
Improved Black-Box Constructions of Composable Secure Computation
Rohit Chatterjee, Xiao Liang, Omkant Pandey
Rohit Chatterjee, Xiao Liang, Omkant Pandey
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti
Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti
UC Non-Interactive, Proactive, Threshold ECDSA
Ran Canetti, Nikolaos Makriyannis, Udi Peled
Ran Canetti, Nikolaos Makriyannis, Udi Peled
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
Hilder Vitor Lima Pereira
Hilder Vitor Lima Pereira
SoK: Techniques for Verifiable Mix Nets
Thomas Haines, Johannes Mueller
Thomas Haines, Johannes Mueller
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective
Fraunhofer AISEC
Fraunhofer AISEC
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption
Yongwoo Lee, Joonwoo Lee, Young-Sik Kim, Jong-Seon No
Yongwoo Lee, Joonwoo Lee, Young-Sik Kim, Jong-Seon No
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
Edwards curve points counting method and supersingular Edwards and Montgomery curves
Ruslan V. Skuratovskii
Ruslan V. Skuratovskii
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz
Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz
On Ideal and Weakly-Ideal Access Structures
Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
A Trace Based $GF(2^n)$ Inversion Algorithm
Haining Fan
Haining Fan
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography
James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher K. Anand
James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher K. Anand
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation
Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF
Tapas Pal, Ratna Dutta
Tapas Pal, Ratna Dutta
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols
Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
Essam Ghadafi
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews
Zachary Zaccagni, Ram Dantu
Zachary Zaccagni, Ram Dantu
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery, Mahdi Sedaghat
Karim Baghery, Mahdi Sedaghat
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
Ashutosh Kumar, Raghu Meka, David Zuckerman
Ashutosh Kumar, Raghu Meka, David Zuckerman
Bracing A Transaction DAG with A Backbone Chain
Shuyang Tang
Shuyang Tang
Interpose PUF can be PAC Learned
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stoettinger
Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stoettinger
Dedicated Security Chips in the Age of Secure Enclaves
Kari Kostiainen, Aritra Dhar, Srdjan Capkun
Kari Kostiainen, Aritra Dhar, Srdjan Capkun
Distributed Auditing Proofs of Liabilities
Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko
Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang
Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
Domain-Oriented Masked Instruction Set Architecture for RISC-V
Pantea Kiaei, Patrick Schaumont
Pantea Kiaei, Patrick Schaumont
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin
Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi
Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
Ido Shahaf, Or Ordentlich, Gil Segev
Ido Shahaf, Or Ordentlich, Gil Segev
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
Jean-Sébastien Coron, Agnese Gini
Jean-Sébastien Coron, Agnese Gini
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
Marloes Venema, Greg Alpár
Marloes Venema, Greg Alpár
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations
Debdeep Mukhopadhyay
Debdeep Mukhopadhyay
On the Optimality of Optimistic Responsiveness
Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha
Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately
Ahmad Almorabea
Ahmad Almorabea
General Congestion Attack on HTLC-Based Payment Channel Networks
Zhichun Lu, Runchao Han, Jiangshan Yu
Zhichun Lu, Runchao Han, Jiangshan Yu
Cryptanalysis of LEDAcrypt
Daniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
Daniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification
Thomas Pornin
Thomas Pornin
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay
F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay
Almost Public Quantum Coins
Amit Behera, Or Sattath
Amit Behera, Or Sattath
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh
Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond
Kristian L. McDonald
Kristian L. McDonald
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing
Kristian L. McDonald
Kristian L. McDonald
Partial Secret Sharing Schemes
Amir Jafari, Shahram Khazaei
Amir Jafari, Shahram Khazaei
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin Lauter
Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin Lauter
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
On Pseudorandom Encodings
Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai
Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai
A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements
Satō Shinichi
Satō Shinichi
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
Fine-Grained Cryptography: A New Frontier?
Alon Rosen
Alon Rosen
Modeling for Three-Subset Division Property without Unknown Subset
Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang
Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang
Sublattice Attack on Poly-LWE with Wide Error Distributions
Hao Chen
Hao Chen
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
Fast hybrid Karatsuba multiplier for Type II pentanomials
Yin Li, Yu Zhang, Wei He
Yin Li, Yu Zhang, Wei He
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
Mike Hamburg
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
Houssem Maghrebi
Houssem Maghrebi
WAGE: An Authenticated Encryption with a Twist
Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit
Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy, Andrea Basso
Sujoy Sinha Roy, Andrea Basso
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays
Martin Westerkamp, Jacob Eberhardt
Martin Westerkamp, Jacob Eberhardt
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
x-only point addition formula and faster compressed SIKE
Geovandro Pereira, Javad Doliskani, David Jao
Geovandro Pereira, Javad Doliskani, David Jao
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures
Aram Jivanyan, Tigran Mamikonyan
Aram Jivanyan, Tigran Mamikonyan
Mathematics and Cryptography: A Marriage of Convenience?
Alice Silverberg
Alice Silverberg
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.
Yaron Gvili
Yaron Gvili
Improving the Performance of the Picnic Signature Scheme
Daniel Kales, Greg Zaverucha
Daniel Kales, Greg Zaverucha
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
Qiang Tang
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
Low-gate Quantum Golden Collision Finding
Samuel Jaques, André Schrottenloher
Samuel Jaques, André Schrottenloher
On One-way Functions and Kolmogorov Complexity
Yanyi Liu, Rafael Pass
Yanyi Liu, Rafael Pass
Pattern Matching on Encrypted Data
Anis Bkakria, Nora Cuppens, Frédéric Cuppens
Anis Bkakria, Nora Cuppens, Frédéric Cuppens
Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture
Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
Practical Card-Based Protocol for Three-Input Majority
Kenji Yasunaga
Kenji Yasunaga
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang
Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak
Krzysztof Pietrzak
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures
Mihir Bellare, Wei Dai
Mihir Bellare, Wei Dai
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE
Shweta Agrawal, Alice Pellet-Mary
Shweta Agrawal, Alice Pellet-Mary
Semi-Quantum Money
Roy Radian, Or Sattath
Roy Radian, Or Sattath
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin, Matthieu Rivain, Junwei Wang
Louis Goubin, Matthieu Rivain, Junwei Wang
Fixslicing: A New GIFT Representation
Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
Secure Two-Party Computation in a Quantum World
Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh
Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
Loïs Huguenin-Dumittan, Serge Vaudenay
Loïs Huguenin-Dumittan, Serge Vaudenay
Speed up over the Rainbow
Nir Drucker, Shay Gueron
Nir Drucker, Shay Gueron
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection
Aydin Abadi, Sotirios Terzis, Changyu Dong
Aydin Abadi, Sotirios Terzis, Changyu Dong
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience
Atsuki Momose, Jason Paul Cruz, Yuichi Kaji
Atsuki Momose, Jason Paul Cruz, Yuichi Kaji
Ordinos: A Verifiable Tally-Hiding E-Voting System
Ralf Kuesters, Julian Liedtke, Johannes Mueller, Daniel Rausch, Andreas Vogt
Ralf Kuesters, Julian Liedtke, Johannes Mueller, Daniel Rausch, Andreas Vogt
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards
Tassos Dimitriou
Tassos Dimitriou
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
David Derler, Kai Samelin, and Daniel Slamanig
David Derler, Kai Samelin, and Daniel Slamanig
A Note on Low Order Assumptions in RSA groups
István András Seres, Péter Burcsi
István András Seres, Péter Burcsi
Mining for Privacy: How to Bootstrap a Snarky Blockchain
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis
Jeroen Delvaux
Jeroen Delvaux
Analysis of DP3T
Serge Vaudenay
Serge Vaudenay
CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures
Samuel Brack, Leonie Reichert, Björn Scheuermann
Samuel Brack, Leonie Reichert, Björn Scheuermann
Classification of 4-bit S-boxes for BOGI-permutation
Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing
Donggeun Kwon, HeeSeok Kim, Seokhie Hong
Donggeun Kwon, HeeSeok Kim, Seokhie Hong
Cryptography from Information Loss
Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
Candidate iO from Homomorphic Encryption Schemes
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
LevioSA: Lightweight Secure Arithmetic Computation
Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
An argument on the security of LRBC, a recently proposed lightweight block cipher
Sadegh Sadeghi, Nasour Bagheri
Sadegh Sadeghi, Nasour Bagheri
Optimized CSIDH Implementation Using a 2-torsion Point
Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
A French cipher from the late 19th century
Rémi Géraud-Stewart, David Naccache
Rémi Géraud-Stewart, David Naccache
A Unary Cipher with Advantages over the Vernam Cipher
Gideon Samid
Gideon Samid
Fast 4 way vectorized ladder for the complete set of Montgomery curves
Huseyin Hisil, Berkan Egrice, Mert Yassi
Huseyin Hisil, Berkan Egrice, Mert Yassi
Low-complexity and Reliable Transforms for Physical Unclonable Functions
Onur Gunlu, Rafael F. Schaefer
Onur Gunlu, Rafael F. Schaefer
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
Ralf Kuesters, Daniel Rausch, Mike Simon
Ralf Kuesters, Daniel Rausch, Mike Simon
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
A ”Final” Security Bug
Nguyen Thoi Minh Quan
Nguyen Thoi Minh Quan
Parallel strategies for SIDH: Towards computing SIDH twice as fast
Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
Proof-of-Reputation Blockchain with Nakamoto Fallback
Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas
Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory
Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopdhyay
Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopdhyay
Post-quantum WireGuard
Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Fiona Johanna Weber, and Philip R. Zimmermann
Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Fiona Johanna Weber, and Philip R. Zimmermann
Efficient 4-way Vectorizations of the Montgomery Ladder
Kaushik Nath, Palash Sarkar
Kaushik Nath, Palash Sarkar
Oblivious tight compaction in O(n) time with smaller constant
Samuel Dittmer, Rafail Ostrovsky
Samuel Dittmer, Rafail Ostrovsky
On the privacy of a code-based single-server computational PIR scheme
Sarah Bordage, Julien Lavauzelle
Sarah Bordage, Julien Lavauzelle
Privacy-Preserving Contact Tracing of COVID-19 Patients
Leonie Reichert, Samuel Brack, Björn Scheuermann
Leonie Reichert, Samuel Brack, Björn Scheuermann
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, abhi shelat, Muthu Venkitasubramaniam, Ruihan Wang
Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, abhi shelat, Muthu Venkitasubramaniam, Ruihan Wang
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
Huanyu Wang, Elena Dubrova
Huanyu Wang, Elena Dubrova
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions
Claude Carlet
Claude Carlet
Single-Trace Attacks on Keccak
Matthias J. Kannwischer, Peter Pessl, Robert Primas
Matthias J. Kannwischer, Peter Pessl, Robert Primas
Multiparty Generation of an RSA Modulus
Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, abhi shelat
Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, abhi shelat
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel, Thorben Moos, Amir Moradi
David Knichel, Thorben Moos, Amir Moradi
Defeating NewHope with a Single Trace
Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden
Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Marcel Tiepelt and Jan-Pieter D'Anvers
Marcel Tiepelt and Jan-Pieter D'Anvers
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection
Hangwei Lu, Dhwani Mehta, Olivia Paradis, Navid Asadizanjani, Mark Tehranipoor, Damon L. Woodard
Hangwei Lu, Dhwani Mehta, Olivia Paradis, Navid Asadizanjani, Mark Tehranipoor, Damon L. Woodard
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
Behzad Abdolmaleki, Daniel Slamanig
Behzad Abdolmaleki, Daniel Slamanig
On equivalence between known polynomial APN functions and power APN functions
Qianhong Wan, Longjiang Qu, Chao Li
Qianhong Wan, Longjiang Qu, Chao Li
Another Look at CBC Casper Consensus Protocol
Yongge Wang
Yongge Wang
How Not to Create an Isogeny-Based PAKE
Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin
Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
Quasigroups and Substitution Permutation Networks: A Failed Experiment
George Teseleanu
George Teseleanu
Efficient MPC with a Mixed Adversary
Martin Hirt, Marta Mularczyk
Martin Hirt, Marta Mularczyk
Permissionless Consensus in the Resource Model
Benjamin Terner
Benjamin Terner
A Generalization of the ElGamal public-key cryptosystem
Rajitha Ranasinghe, Pabasara Athukorala
Rajitha Ranasinghe, Pabasara Athukorala
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.22)
Robert A. Threlfall
Robert A. Threlfall
Coda: Decentralized Cryptocurrency at Scale
Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro
Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
Youssef El Housni, Aurore Guillevic
Youssef El Housni, Aurore Guillevic
New Multi-bit Differentials to Improve Attacks Against ChaCha
Murilo Coutinho, T. C. Souza Neto
Murilo Coutinho, T. C. Souza Neto
Differential Power Analysis on (Non-)Linear Feedback Shift Registers
Siang Meng Sim
Siang Meng Sim
Constructing hidden order groups using genus three Jacobians
Steve Thakur
Steve Thakur
Some Low Round Zero Knowledge Protocols
Hongda Li, Peifang Ni, Dongxue Pan
Hongda Li, Peifang Ni, Dongxue Pan
Algebraic Attacks on Round-Reduced Keccak/Xoodoo
Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version
Fengrong Zhangand, Nastja Cepak, Enes Pasalic, Yongzhuang Wei
Fengrong Zhangand, Nastja Cepak, Enes Pasalic, Yongzhuang Wei
Anchoring the Value of Cryptocurrency
Yibin Xu, Yangyu Huang, Jianhua Shao
Yibin Xu, Yangyu Huang, Jianhua Shao
BSC: A Bitcoin Smart Contract Implementation
Hiro Midas
Hiro Midas
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
Estuardo Alpirez Bock, Alexander Treff
Estuardo Alpirez Bock, Alexander Treff
Faster computation of isogenies of large prime degree
Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith
Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith
Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir, Onur Gunlu, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci
Efe Bozkir, Onur Gunlu, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics
George Teseleanu
George Teseleanu
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl
Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
Gimli Encryption in 715.9 psec
Santosh Ghosh, Michael Kounavis, Sergej Deutsch
Santosh Ghosh, Michael Kounavis, Sergej Deutsch
An n/2 byzantine node tolerated blockchain sharding approach
Yibin Xu, Yangyu Huang
Yibin Xu, Yangyu Huang
4-Uniform Permutations with Null Nonlinearity
Christof Beierle, Gregor Leander
Christof Beierle, Gregor Leander
A Simpler and Modular Construction of Linkable Ring Signature
Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
Implementation Study of Two Verifiable Delay Functions
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
The CTR mode with encrypted nonces and its extension to AE
Sergey Agievich
Sergey Agievich
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
Gil Segev, Ido Shahaf
Gil Segev, Ido Shahaf
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
Weight-Based Nakamoto-Style Blockchains
Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
On the design of stream ciphers with Cellular Automata having radius = 2
Anita John, Rohit Lakra, Jimmy Jose
Anita John, Rohit Lakra, Jimmy Jose
An upper bound on the decryption failure rate of static-key NewHope
John M. Schanck
John M. Schanck
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts
Robert Muth, Florian Tschorsch
Robert Muth, Florian Tschorsch
Defeating CAS-Unlock
Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, Domenic Forte
Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, Domenic Forte
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution
Andrew Loveless, Ronald Dreslinski, Baris Kasikci
Andrew Loveless, Ronald Dreslinski, Baris Kasikci
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism
Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
Universally Composable Relaxed Password Authenticated Key Exchange
Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu
Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu
Secure k-ish nearest neighbors classifier
Hayim Shaul, Dan Feldman, Daniela Rus
Hayim Shaul, Dan Feldman, Daniela Rus
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL
Huijia Lin, Ji Luo
Huijia Lin, Ji Luo
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
Archisman Ghosh, Debayan Das, Shreyas Sen
Archisman Ghosh, Debayan Das, Shreyas Sen
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
Rishab Goyal, Sam Kim, Brent Waters, David J. Wu
Rishab Goyal, Sam Kim, Brent Waters, David J. Wu
plookup: A simplified polynomial protocol for lookup tables
Ariel Gabizon, Zachary J. Williamson
Ariel Gabizon, Zachary J. Williamson
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi
Security analysis of SPAKE2+
Victor Shoup
Victor Shoup
Arcturus: efficient proofs for confidential transactions
Sarang Noether
Sarang Noether
A Blockchain Traceable Scheme with Oversight Function
Tianjun Ma, Haixia Xu, Peili Li
Tianjun Ma, Haixia Xu, Peili Li
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier
Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier
Cryptanalysis Results on Spook
Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
Post-Quantum TLS on Embedded Systems
Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider
Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider
Handling vectorial functions by means of their graph indicators
Claude Carlet
Claude Carlet
Leakage Assessment in Fault Attacks: A Deep Learning Perspective
Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta
Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada
Multiparty Homomorphic Encryption from Ring-Learning-With-Errors
Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, Jean-Pierre Hubaux
Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, Jean-Pierre Hubaux
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei
Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers
Thomas Kaeding
Thomas Kaeding
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext
Thomas Kaeding
Thomas Kaeding
Secure Multiparty Computation (MPC)
Yehuda Lindell
Yehuda Lindell
Hydra: Fast Isomorphic State Channels
Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell
Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell
Fast polynomial inversion for post quantum QC-MDPC cryptography
Nir Drucker, Shay Gueron, Dusan Kostic
Nir Drucker, Shay Gueron, Dusan Kostic
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
Multidimensional Database Reconstruction from Range Query Access Patterns
Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern
Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern
Generalized Isotopic Shift Construction for APN Functions
Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa
Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa
Public-Key Generation with Verifiable Randomness
Olivier Blazy, Patrick Towa, Damien Vergnaud
Olivier Blazy, Patrick Towa, Damien Vergnaud
Many-out-of-Many Proofs and Applications to Anonymous Zether
Benjamin E. Diamond
Benjamin E. Diamond
LWE with Side Information: Attacks and Concrete Security Estimation
Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
Unforgeability in the quantum world
Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi
Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds
Reham Almukhlifi, Poorvi Vora
Reham Almukhlifi, Poorvi Vora
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves
Jonathan Lee
Jonathan Lee
Secure Key-Alternating Feistel Ciphers Without Key Schedule
Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai
Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai
Private resource allocators and their applications
Sebastian Angel, Sampath Kannan, Zachary Ratliff
Sebastian Angel, Sampath Kannan, Zachary Ratliff
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Geoffroy Couteau, Dominik Hartmann
Geoffroy Couteau, Dominik Hartmann
Improved Security Bounds for Generalized Feistel Networks
Yaobin Shen, Chun Guo, Lei Wang
Yaobin Shen, Chun Guo, Lei Wang
Database Reconstruction Attacks in Two Dimensions
Evangelia Anna Markatou, Roberto Tamassia
Evangelia Anna Markatou, Roberto Tamassia
CryptoWills: How to Bequeath Cryptoassets
István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari
István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don, Serge Fehr, Christian Majenz
Jelle Don, Serge Fehr, Christian Majenz
Privacy-friendly Monero transaction signing on a hardware wallet, extended version
Dusan Klinec Vashek Matyas
Dusan Klinec Vashek Matyas
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Juliane Krämer, Patrick Struck
Juliane Krämer, Patrick Struck
Impact of System-on-Chip Integration of AEAD Ciphers
Shashank Raghuraman, Leyla Nazhandali
Shashank Raghuraman, Leyla Nazhandali
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs
Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
How Does Nakamoto Set His Clock? Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil Dutt
Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil Dutt
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
An Optimal Relational Database Encryption Scheme
Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
On the Fast Algebraic Immunity of Threshold Functions
Pierrick Méaux
Pierrick Méaux
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption
Keita Arimitsu, Kazuki Otsuka
Keita Arimitsu, Kazuki Otsuka
Signatures from Sequential-OR Proofs
Marc Fischlin, Patrick Harasser, Christian Janson
Marc Fischlin, Patrick Harasser, Christian Janson
Practical Predicate Encryption for Inner Product
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
Order-Fairness for Byzantine Consensus
Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels
Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
Differential Power Analysis of the Picnic Signature Scheme
Tim Gellersen, Okan Seker, Thomas Eisenbarth
Tim Gellersen, Okan Seker, Thomas Eisenbarth
Quantum Indistinguishability for Public Key Encryption
Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu
Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
Jihoon Kwon, Byeonghak Lee, Jooyoung Lee, Dukjae Moon
Jihoon Kwon, Byeonghak Lee, Jooyoung Lee, Dukjae Moon
A Note on the Ending Elliptic Curve in SIDH
Christopher Leonardi
Christopher Leonardi
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices
Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
Lattice-based (Partially) Blind Signature without Restart
Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations
Zvika Brakerski, Venkata Koppula, Tamer Mour
Zvika Brakerski, Venkata Koppula, Tamer Mour
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
Onur Gunlu, Rafael F. Schaefer, H. Vincent Poor
Onur Gunlu, Rafael F. Schaefer, H. Vincent Poor
Statistical ZAPR Arguments from Bilinear Maps
Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
Novel Deception Techniques for Malware Detection on Industrial Control Systems
Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima
Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing
Hemanta K. Maji, Mingyuan Wang
Hemanta K. Maji, Mingyuan Wang
Secure Non-interactive Simulation: Feasibility & Rate
Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
Communication Lower Bounds for Perfect Maliciously Secure MPC
Ivan Damgård, Nikolaj I. Schwartzbach
Ivan Damgård, Nikolaj I. Schwartzbach
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations
Ehsan Aerabi, Athanasios Papadimitriou, David Hely
Ehsan Aerabi, Athanasios Papadimitriou, David Hely
CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
Ehsan Aerabi, Cyril Bresch, David Hély, Athanasios Papadimitriou, Mahdi Fazeli
Ehsan Aerabi, Cyril Bresch, David Hély, Athanasios Papadimitriou, Mahdi Fazeli
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast
Ittai Abraham, Benny Pinkas, Avishay Yanai
Ittai Abraham, Benny Pinkas, Avishay Yanai
Crooked Indifferentiability Revisited
Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri
Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
Jing Tian, Jun Lin, Zhongfeng Wang
Jing Tian, Jun Lin, Zhongfeng Wang
New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol
Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
An Analysis of Hybrid Public Key Encryption
Benjamin Lipp
Benjamin Lipp
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng, Jiachen Shen, Zhenfu Cao
Zhihao Zheng, Jiachen Shen, Zhenfu Cao
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
Mihir Bellare, Hannah Davis, Felix Günther
Mihir Bellare, Hannah Davis, Felix Günther
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
T-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi
T-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi
Viktoria: A new Paradigm for Hash Functions
Edimar Veríssimo
Edimar Veríssimo
Efficient ECM factorization in parallel with the Lyness map
Andrew Hone
Andrew Hone
On Security Notions for Encryption in a Quantum World
Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu
Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21
Mridul Nandi
Mridul Nandi
Statistical Zaps and New Oblivious Transfer Protocols
Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol
Ruslan V. Skuratovskii, Aled Williams
Ruslan V. Skuratovskii, Aled Williams
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus
Sam Kim
Sam Kim
Combiners for AEAD
Bertram Poettering, Paul Rösler
Bertram Poettering, Paul Rösler
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
Nuttapong Attrapadung, Junichi Tomida
Nuttapong Attrapadung, Junichi Tomida
Lattice analysis on MiNTRU problem
Changmin Lee, Alexandre Wallet
Changmin Lee, Alexandre Wallet
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
Itai Dinur
Itai Dinur
Optimal Broadcast Encryption from Pairings and LWE
Shweta Agrawal, Shota Yamada
Shweta Agrawal, Shota Yamada
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
Yindong Chen, Limin Lin, Chuliang Wei
Yindong Chen, Limin Lin, Chuliang Wei
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
Meher Krishna Duggirala, Ravi Duggirala, Krishna Subba Rao Pulugurtha
Meher Krishna Duggirala, Ravi Duggirala, Krishna Subba Rao Pulugurtha
Generic-Group Delay Functions Require Hidden-Order Groups
Lior Rotem, Gil Segev, Ido Shahaf
Lior Rotem, Gil Segev, Ido Shahaf
Security under Message-Derived Keys: Signcryption in iMessage
Mihir Bellare, Igors Stepanovs
Mihir Bellare, Igors Stepanovs
Compact NIZKs from Standard Assumptions on Bilinear Maps
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Improving Speed and Security in Updatable Encryption Schemes
Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih
Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih
Multiparty Reusable Non-Interactive Secure Computation
Fabrice Benhamouda, Huijia Lin
Fabrice Benhamouda, Huijia Lin
Remote Side-Channel Attacks on Anonymous Transactions
Florian Tramèr, Dan Boneh, Kenneth G. Paterson
Florian Tramèr, Dan Boneh, Kenneth G. Paterson
Multi-Client Functional Encryption for Separable Functions
Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner
Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
Ehsan Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely
Ehsan Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely
SynFi: Automatic Synthetic Fingerprint Generation
M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar
M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti
Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Megumi Ando, Anna Lysyanskaya
Megumi Ando, Anna Lysyanskaya
Thresholdizing HashEdDSA: MPC to the Rescue
Charlotte Bonte, Nigel P. Smart, Titouan Tanguy
Charlotte Bonte, Nigel P. Smart, Titouan Tanguy
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
Akinori Hosoyamada, Yu Sasaki
Akinori Hosoyamada, Yu Sasaki
Isogenies of certain abelian varieties over finite fields with p-ranks zero
Steve Thakur
Steve Thakur
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
Adaptive Simulation Security for Inner Product Functional Encryption
Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
Random Integer Lattice Generation via HNF
Gengran Hu, Lin You, Liqin Hu, Hui Wang
Gengran Hu, Lin You, Liqin Hu, Hui Wang
(Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge
Carsten Baum, Bernardo David, Rafael Dowsley
Carsten Baum, Bernardo David, Rafael Dowsley
A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
SodsBC: A Post-quantum by Design Asynchronous Blockchain Framework
Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang
Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang
Cryptographic Reverse Firewalls for Interactive Proof Systems
Chaya Ganesh, Bernardo Magri, Daniele Venturi
Chaya Ganesh, Bernardo Magri, Daniele Venturi
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
Thang Hoang, Jorge Guajardo, Attila A. Yavuz
Thang Hoang, Jorge Guajardo, Attila A. Yavuz
Strong Anti-SAT: Secure and Effective Logic Locking
Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
A Survey on Neural Trojans
Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava
Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava
Leakage and Tamper Resilient Permutation-Based Cryptography
Christoph Dobraunig, Bart Mennink, Robert Primas
Christoph Dobraunig, Bart Mennink, Robert Primas
Improvement on a Masked White-box Cryptographic Implementation
Seungkwang Lee, Myungchul Kim
Seungkwang Lee, Myungchul Kim
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
Dynamic Decentralized Functional Encryption
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
Trustless unknown-order groups
Samuel Dobson, Steven D. Galbraith, Benjamin Smith
Samuel Dobson, Steven D. Galbraith, Benjamin Smith
Replicated state machines without replicated execution
Jonathan Lee, Kirill Nikitin, Srinath Setty
Jonathan Lee, Kirill Nikitin, Srinath Setty
Adaptively Secure ABE for DFA from k-Lin and More
Junqing Gong, Hoeteck Wee
Junqing Gong, Hoeteck Wee
PSI from PaXoS: Fast, Malicious Private Set Intersection
Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
Certificateless Homomorphic Signature Scheme for Network Coding
Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian
Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
Zvika Brakerski, Vinod Vaikuntanathan
Zvika Brakerski, Vinod Vaikuntanathan
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
Assimakis Kattis, Joseph Bonneau
Assimakis Kattis, Joseph Bonneau
Guaranteed Output Delivery Comes Free in Honest Majority MPC
Vipul Goyal, Yifan Song, Chenzhi Zhu
Vipul Goyal, Yifan Song, Chenzhi Zhu
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart
Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart
Bitcoin Crypto–Bounties for Quantum Capable Adversaries
Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt
Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert
Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert
Fair and Decentralized Exchange of Digital Goods
Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein
Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein
A note on secure multiparty computation via higher residue symbols
Ignacio Cascudo, Reto Schnyder
Ignacio Cascudo, Reto Schnyder
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi
Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi
Multi-key Fully-Homomorphic Encryption in the Plain Model
Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, Giulio Malavolta
Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, Giulio Malavolta
Mind the Middle Layer: The HADES Design Strategy Revisited
Nathan Keller, Asaf Rosemarin
Nathan Keller, Asaf Rosemarin
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
Santosh Ghosh, Luis S Kida, Soham Jayesh Desai, Reshma Lal
Santosh Ghosh, Luis S Kida, Soham Jayesh Desai, Reshma Lal
Revisiting (R)CCA Security and Replay Protection
Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito
Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, Siavash Riahi
Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, Siavash Riahi
On Selective-Opening Security of Deterministic Primitives
Mohammad Zaheri, Adam O'Neill
Mohammad Zaheri, Adam O'Neill
Securing Proof-of-Work Ledgers via Checkpointing
Dimitris Karakostas, Aggelos Kiayias
Dimitris Karakostas, Aggelos Kiayias
Qubit-based Unclonable Encryption with Key Recycling
Daan Leermakers, Boris Skoric
Daan Leermakers, Boris Skoric
High Performance Logistic Regression for Privacy-Preserving Genome Analysis
Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki
Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki
Reusable Two-Round MPC from DDH
James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee
James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin
Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen
Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Jinhyun So, Basak Guler, A. Salman Avestimehr
Jinhyun So, Basak Guler, A. Salman Avestimehr
Non Atomic Payment Splitting in Channel Networks
Stefan Dziembowski, Paweł Kędzior
Stefan Dziembowski, Paweł Kędzior
Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
Aron Gohr, Sven Jacob, Werner Schindler
Aron Gohr, Sven Jacob, Werner Schindler
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
Alex Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte
Alex Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte
Impossibility Results for Lattice-Based Functional Encryption Schemes
Akin Ünal
Akin Ünal
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
Ignacio Cascudo, Jaron Skovsted Gundersen
Ignacio Cascudo, Jaron Skovsted Gundersen
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu
Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu
Solving Some Affine Equations over Finite Fields
Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee
Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
Jump index in T-functions for designing a new basic structure of stream ciphers
Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi
Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi
Multi-Source Non-Malleable Extractors and Applications
Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu
Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler
Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu
Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu
Combiners for Functional Encryption, Unconditionally
Aayush Jain, Nathan Manohar, Amit Sahai
Aayush Jain, Nathan Manohar, Amit Sahai
Constructing Secure Multi-Party Computation with Identifiable Abort
Nicholas Brandt, Sven Maier, Tobias Müller, and Jörn Müller-Quade
Nicholas Brandt, Sven Maier, Tobias Müller, and Jörn Müller-Quade
Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
Thomas Attema, Ronald Cramer
Thomas Attema, Ronald Cramer
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory -- extended version
Wouter Castryck, Jana Sotáková, Frederik Vercauteren
Wouter Castryck, Jana Sotáková, Frederik Vercauteren
On the Security of NTS-KEM in the Quantum Random Oracle Model
Varun Maram
Varun Maram
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo
Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo
Determining the Core Primitive for Optimally Secure Ratcheting
Fatih Balli, Paul Rösler, Serge Vaudenay
Fatih Balli, Paul Rösler, Serge Vaudenay
Non-Malleability against Polynomial Tampering
Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
Roman Langrehr, Jiaxin Pan
Roman Langrehr, Jiaxin Pan
Self-Secured PUF: Protecting the Loop PUF by Masking
Lars Tebelmann, Jean-Luc Danger, Michael Pehl
Lars Tebelmann, Jean-Luc Danger, Michael Pehl
Double-Base Chains for Scalar Multiplications on Elliptic Curves
Wei Yu, Saud Al Musa, Bao Li
Wei Yu, Saud Al Musa, Bao Li
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li
Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li
TARDIGRADE: An Atomic Broadcast Protocol for Arbitrary Network Conditions
Erica Blum, Jonathan Katz, Julian Loss
Erica Blum, Jonathan Katz, Julian Loss
Deterministic-Prover Zero-Knowledge Proofs
Hila Dahari, Yehuda Lindell
Hila Dahari, Yehuda Lindell
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang
Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Carmit Hazay, abhi shelat, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, abhi shelat, Muthuramakrishnan Venkitasubramaniam
Smart Contract Derivatives
Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
Consistency for Functional Encryption
Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner
Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
David Heath, Vladimir Kolesnikov
David Heath, Vladimir Kolesnikov
Threshold Ring Signatures: New Definitions and Post-Quantum Security
Abida Haque, Alessandra Scafuro
Abida Haque, Alessandra Scafuro
Malicious Security Comes Free in Honest-Majority MPC
Vipul Goyal, Yifan Song
Vipul Goyal, Yifan Song
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
Souradyuti Paul, Ananya Shrivastava
Souradyuti Paul, Ananya Shrivastava
Boosting Verifiable Computation on Encrypted Data
Dario Fiore, Anca Nitulescu, David Pointcheval
Dario Fiore, Anca Nitulescu, David Pointcheval
Coin Tossing with Lazy Defense: Hardness of Computation Results
Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
Breaking the $O(\sqrt n)$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party
Elette Boyle, Ran Cohen, and Aarushi Goel
Elette Boyle, Ran Cohen, and Aarushi Goel
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Juliane Krämer, Patrick Struck
Juliane Krämer, Patrick Struck
LegRoast: Efficient post-quantum signatures from the Legendre PRF
Ward Beullens and Cyprien Delpech de Saint Guilhem
Ward Beullens and Cyprien Delpech de Saint Guilhem
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
Public-Key Puncturable Encryption: Modular and Compact Constructions
Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph Liu, Dawu Gu
Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph Liu, Dawu Gu
Oblivious Parallel Tight Compaction
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Alberto Garoffolo, Dmytro Kaidalov, and Roman Oliynykov
Alberto Garoffolo, Dmytro Kaidalov, and Roman Oliynykov
Verifiable Inner Product Encryption Scheme
Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen, Ilia Iliashenko, Kim Laine
Hao Chen, Ilia Iliashenko, Kim Laine
The randomized slicer for CVPP: sharper, faster, smaller, batchier
Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden
Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden
Hardness of LWE on General Entropic Distributions
Zvika Brakerski, Nico Döttling
Zvika Brakerski, Nico Döttling
InfoCommit: Information-Theoretic Polynomial Commitment and Verification
Saeid Sahraei, Salman Avestimehr
Saeid Sahraei, Salman Avestimehr
Efficient BIKE Hardware Design with Constant-Time Decoder
Andrew Reinders, Rafael Misoczki, Santosh Ghosh, Manoj Sastry
Andrew Reinders, Rafael Misoczki, Santosh Ghosh, Manoj Sastry
Separating Two-Round Secure Computation from Oblivious Transfer
Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Xavier Boyen, Thomas Haines, Johannes Mueller
Xavier Boyen, Thomas Haines, Johannes Mueller
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou
Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thome
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thome
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl, Michael Tempelmeier
Patrick Karl, Michael Tempelmeier
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti, Pratik Sarkar, Xiao Wang
Ran Canetti, Pratik Sarkar, Xiao Wang
Fixing the Achilles Heel of E-Voting: The Bulletin Board
Lucca Hirschi, Lara Schmid, David Basin
Lucca Hirschi, Lara Schmid, David Basin
Practical Forgeries for ORANGE
Christoph Dobraunig, Florian Mendel, Bart Mennink
Christoph Dobraunig, Florian Mendel, Bart Mennink
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry
Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry
Relaxed freshness in component authentication
Frank Schuhmacher
Frank Schuhmacher
MCU intrinsic group features for component authentication
Frank Schuhmacher
Frank Schuhmacher
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier
Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
Boxin Zhao, Xiaoyang Dong, Keting Jia
Boxin Zhao, Xiaoyang Dong, Keting Jia
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
Haibat Khan, Keith M. Martin
Haibat Khan, Keith M. Martin
A direct proof of APN-ness of the Kasami functions
Claude Carlet, Kwang Ho Kim, Sihem Mesnager
Claude Carlet, Kwang Ho Kim, Sihem Mesnager
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson
Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson
Improved key recovery on the Legendre PRF
Novak Kaluđerović, Thorsten Kleinjung, Dusan Kostic
Novak Kaluđerović, Thorsten Kleinjung, Dusan Kostic
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
Stanislav S. Malakhov
Stanislav S. Malakhov
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong
David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang
Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
Michael Davidson, Tyler Diamond
Michael Davidson, Tyler Diamond
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
Romain Gay
Romain Gay
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
Daniel Jost, Ueli Maurer
Daniel Jost, Ueli Maurer
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
Jonathan Takeshita, Matthew Schoenbauer, Ryan Karl, Taeho Jung
Jonathan Takeshita, Matthew Schoenbauer, Ryan Karl, Taeho Jung
Witness Maps and Applications
Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
The MILP-Aided Conditional Differential Attack and Its Application to Trivium
Chen-Dong Ye, Tian Tian, Fan-Yang Zeng
Chen-Dong Ye, Tian Tian, Fan-Yang Zeng
Streamlet: Textbook Streamlined Blockchains
Benjamin Y Chan, Elaine Shi
Benjamin Y Chan, Elaine Shi
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
Elaine Shi
Elaine Shi
Bootstrapping in FHEW-like Cryptosystems
Daniele Micciancio and Yuriy Polyakov
Daniele Micciancio and Yuriy Polyakov
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici
Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici
Bandwidth-efficient threshold EC-DSA
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
Metal: A Metadata-Hiding File-Sharing System
Weikeng Chen, Raluca Ada Popa
Weikeng Chen, Raluca Ada Popa
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
Efficient polynomial commitment schemes for multiple points and polynomials
Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
Better Secret-Sharing via Robust Conditional Disclosure of Secrets
Benny Applebaum, Amos Beimel, Oded Nir, and Naty Peter
Benny Applebaum, Amos Beimel, Oded Nir, and Naty Peter
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
Kentaro Tamura, Yutaka Shikano
Kentaro Tamura, Yutaka Shikano
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken
Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken
Wyner-Ziv reconciliation for key exchange based on Ring-LWE
Charbel Saliba, Laura Luzzi, Cong Ling
Charbel Saliba, Laura Luzzi, Cong Ling
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
Rishiraj Bhattacharyya
Rishiraj Bhattacharyya
Rolling up sleeves when subversion's in a field?
Daniel R. L. Brown
Daniel R. L. Brown
Anonymous Symmetric-Key Communication
Fabio Banfi, Ueli Maurer
Fabio Banfi, Ueli Maurer
Anonymous Tokens with Private Metadata Bit
Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova
Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova
Post-Quantum Authentication in TLS 1.3: A Performance Study
Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis
Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Thomas Agrikola, Dennis Hofheinz, Julia Kastner
Thomas Agrikola, Dennis Hofheinz, Julia Kastner
RSA and redactable blockchains
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
Further Clarification on Mantin's Digraph Repetition Bias in RC4
Pranab Chakraborty, Subhamoy Maitra
Pranab Chakraborty, Subhamoy Maitra
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
Taylor R Campbell
Taylor R Campbell
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno
Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno
A Performant, Misuse-Resistant API for Primality Testing
Jake Massimo, Kenneth G. Paterson
Jake Massimo, Kenneth G. Paterson
Dual System in Lattice: Fully Secure ABE from LWE Assumption
Geng Wang, Ming Wan, Zhen Liu, Dawu Gu
Geng Wang, Ming Wan, Zhen Liu, Dawu Gu
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet, Simon Montoya, Guenael Renault
Aurelien Greuet, Simon Montoya, Guenael Renault
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
Simple Schnorr Signature with Pedersen Commitment as Key
Gary Yu
Gary Yu
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio, Maria Isabel Gonzalez Vasco, Claudio Soriente, Hien Thi Thu Truong
Antonio Faonio, Maria Isabel Gonzalez Vasco, Claudio Soriente, Hien Thi Thu Truong
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
Satō Shinichi
Satō Shinichi
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
Guilherme Perin, Ileana Buhan, Stjepan Picek
Guilherme Perin, Ileana Buhan, Stjepan Picek
On the smoothing parameter and last minimum of random orthogonal lattices
Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
AKCN-E8: Compact and Flexible KEM from Ideal Lattice
Zhengzhong JIn, Yunlei Zhao
Zhengzhong JIn, Yunlei Zhao
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya, Billy Bob Brumley
Alejandro Cabrera Aldaya, Billy Bob Brumley
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
Yasuhiko Ikematsu, Shuhei Nakamura
Yasuhiko Ikematsu, Shuhei Nakamura
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
Changshe Ma, Yiping Gu, Hongfei Li
Changshe Ma, Yiping Gu, Hongfei Li
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
On Analysis of Lightweight Stream Ciphers with Keyed Update
Orhun Kara, Muhammed F. Esgin
Orhun Kara, Muhammed F. Esgin
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
Haibat Khan, Benjamin Dowling, Keith M. Martin
Haibat Khan, Benjamin Dowling, Keith M. Martin
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
Alexander Chepurnoy, Amitabh Saxena
Alexander Chepurnoy, Amitabh Saxena
Zone Encryption with Anonymous Authentication for V2V Communication
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra, Ajith Suresh
Arpita Patra, Ajith Suresh
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
Aggelos Kiayias, Saad Quader, Alexander Russell
Aggelos Kiayias, Saad Quader, Alexander Russell
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard
Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard
Bitstream Modification Attack on SNOW 3G
Michail Moraitis, Elena Dubrova
Michail Moraitis, Elena Dubrova
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
Matthias Fitzi, Peter Gaži, Aggelos Kiayias, Alexander Russell
Matthias Fitzi, Peter Gaži, Aggelos Kiayias, Alexander Russell
Analysis on Aigis-Enc: asymmetrical and symmetrical
Yupu Hu, Siyue Dong, Xingting Dong
Yupu Hu, Siyue Dong, Xingting Dong
Constant-round Dynamic Group Key Exchange from RLWE Assumption
Rakyong Choi, Dongyeon Hong, Kwangjo Kim
Rakyong Choi, Dongyeon Hong, Kwangjo Kim
SkyEye: A Traceable Scheme for Blockchain
Tianjun Ma, Haixia Xu, Peili Li
Tianjun Ma, Haixia Xu, Peili Li
Scalable Open-Vote Network on Ethereum
Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef
Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef
A New Approach for the Implementation of Binary Matrices Using SLP Applications
Mahdi Sajadieh, Mohsen Mousavi
Mahdi Sajadieh, Mohsen Mousavi
Locally Decodable Codes with Randomized Encoding
Kuan Cheng, Xin Li, Yu Zheng
Kuan Cheng, Xin Li, Yu Zheng
K-Cipher: A Low Latency, Bit Length Parameterizable Cipher
Michael Kounavis, Sergej Deutsch, Santosh Ghosh, David Durham
Michael Kounavis, Sergej Deutsch, Santosh Ghosh, David Durham
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich
Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich
Verified Security of BLT Signature Scheme
Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja
Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja
On Roots Factorization for PQC Algorithms
Alexander Maximov
Alexander Maximov
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
Wen Wang, Marc Stöttinger
Wen Wang, Marc Stöttinger
Single Secret Leader Election
Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco
Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco
The Arwen Trading Protocols (Full Version)
Ethan Heilman, Sebastien Lipmann, Sharon Goldberg
Ethan Heilman, Sebastien Lipmann, Sharon Goldberg
Threshold Multi-Signature with an Offline Recovery Party
Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
eSIDH: the revenge of the SIDH
Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu
Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
Suhyeon Lee, Seungjoo Kim
Suhyeon Lee, Seungjoo Kim
Triptych: logarithmic-sized linkable ring signatures with applications
Sarang Noether, Brandon Goodell
Sarang Noether, Brandon Goodell
Biometric-Authenticated Searchable Encryption
Daniel Gardham, Mark Manulis, Constantin Cătălin Drăgan
Daniel Gardham, Mark Manulis, Constantin Cătălin Drăgan
Short Threshold Dynamic Group Signatures
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Gaëtan Leurent, Thomas Peyrin
Gaëtan Leurent, Thomas Peyrin
On the Cryptographic Hardness of Local Search
Nir Bitansky, Idan Gerichter
Nir Bitansky, Idan Gerichter
Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard
Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard
Towards Vehicular Digital Forensics from Decentralized Trust: An Accountable, Privacy-preservation, and Secure Realization
Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
Faster point compression for elliptic curves of $j$-invariant $0$
Dmitrii Koshelev
Dmitrii Koshelev
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
Thomas Pornin
Thomas Pornin
Secret Sharing Schemes for Ports of Matroids of Rank 3
Oriol Farràs
Oriol Farràs
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
André Chailloux, Thomas Debris-Alazard
André Chailloux, Thomas Debris-Alazard
Lai-Massey Scheme Revisited
M. R. Mirzaee Shamsabad, S. M. Dehnavi
M. R. Mirzaee Shamsabad, S. M. Dehnavi
BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang
On a Conjecture of O'Donnell
Qichun Wang
Qichun Wang
Elliptic Curves of Nearly Prime Order
Manoj Gyawali, Daniele Di Tullio
Manoj Gyawali, Daniele Di Tullio
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Roenne, Peter Y. A. Ryan
Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Roenne, Peter Y. A. Ryan
Supersingular Isogeny-Based Designated Verifier Blind Signature
Rajeev Anand Sahu, Agnese Gini, Ankan Pal
Rajeev Anand Sahu, Agnese Gini, Ankan Pal
Analysis of Modified Shell Sort for Fully Homomorphic Encryption
Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
Improved on Identity-based quantum signature based on Bell states
Chang-Bin Wang, Shu-Mei Hsu, Hsiang Chang, Jue-Sam Chou
Chang-Bin Wang, Shu-Mei Hsu, Hsiang Chang, Jue-Sam Chou
Tight Security of Cascaded LRW2
Ashwin Jha, Mridul Nandi
Ashwin Jha, Mridul Nandi
Scaling Verifiable Computation Using Efficient Set Accumulators
Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh
Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh
Solving $X^{q+1}+X+a=0$ over Finite Fields
Kwang Ho Kim, Junyop Choe, Sihem Mesnager
Kwang Ho Kim, Junyop Choe, Sihem Mesnager
Too Much Crypto
Jean-Philippe Aumasson
Jean-Philippe Aumasson
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9
Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li
Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
Fine-Grained Cryptography Revisited
Shohei Egashira, Yuyu Wang, Keisuke Tanaka
Shohei Egashira, Yuyu Wang, Keisuke Tanaka
SNR-Centric Power Trace Extractors for Side-Channel Attacks
Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang
Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations
Ramiro Martínez, Paz Morillo
Ramiro Martínez, Paz Morillo
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki
Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki
Force-Locking Attack on Sync Hotstuff
Atsuki Momose, Jason Paul Cruz
Atsuki Momose, Jason Paul Cruz
Communication--Computation Trade-offs in PIR
Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo
Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song
Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song
On metric regularity of Reed-Muller codes
Alexey Oblaukhov
Alexey Oblaukhov
Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves
Fouazou Lontouo Perez Broon, Emmanuel Fouotsa
Fouazou Lontouo Perez Broon, Emmanuel Fouotsa
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups
Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
Leakage Detection with Kolmogorov-Smirnov Test
Xinping Zhou, Kexin Qiao, Changhai Ou
Xinping Zhou, Kexin Qiao, Changhai Ou
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis
Daan van der Valk, Stjepan Picek, Shivam Bhasin
Daan van der Valk, Stjepan Picek, Shivam Bhasin
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis
Leo Weissbart
Leo Weissbart
On the Security of Sponge-type Authenticated Encryption Modes
Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu, Stjepan Picek
Lichao Wu, Stjepan Picek
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
Efficient Fully Secure Leakage-Deterring Encryption
Jan Camenisch, Maria Dubovitskaya, Patrick Towa
Jan Camenisch, Maria Dubovitskaya, Patrick Towa
A Privacy-Enhancing Framework for Internet of Things Services
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server
Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures
Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption
Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies
Andrew M. K. Nassief
Andrew M. K. Nassief
A Note on the Instantiability of the Quantum Random Oracle
Edward Eaton, Fang Song
Edward Eaton, Fang Song
An optimist's Poisson model of cryptanalysis
Daniel R. L. Brown
Daniel R. L. Brown
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation
Amin Rezaei, Yuanqi Shen, Hai Zhou
Amin Rezaei, Yuanqi Shen, Hai Zhou
Privacy-preserving greater-than integer comparison without binary decomposition
Sigurd Eskeland
Sigurd Eskeland
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP
Morteza Adeli, Nasour Bagheri
Morteza Adeli, Nasour Bagheri
Byzantine Fault Tolerance in Partially Synchronous Networks
Yongge Wang
Yongge Wang
Side Channel Information Set Decoding using Iterative Chunking
Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery
Moni Naor, Lior Rotem, Gil Segev
Moni Naor, Lior Rotem, Gil Segev
Fast and Secure Updatable Encryption
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
ModFalcon: compact signatures based on module NTRU lattices
Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, and Keita Xagawa
Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, and Keita Xagawa
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance
Yanyan Liu, Yiru Sun
Yanyan Liu, Yiru Sun
Practical Relativistic Zero-Knowledge for NP
Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang
Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang
Saber on ESP32
Bin Wang, Xiaozhuo Gu, Yingshan Yang
Bin Wang, Xiaozhuo Gu, Yingshan Yang
Leakage-Resilient Lattice-Based Partially Blind Signatures
D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, G. Stephanides
D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, G. Stephanides
Tight bound on NewHope failure probability
Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca
Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca
Extractors for Adversarial Sources via Extremal Hypergraphs
Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL
David Butler, David Aspinall, Adria Gascon
David Butler, David Aspinall, Adria Gascon
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
Benchmarking Post-Quantum Cryptography in TLS
Christian Paquin, Douglas Stebila, Goutam Tamvada
Christian Paquin, Douglas Stebila, Goutam Tamvada
Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet, Pierrick Méaux
Claude Carlet, Pierrick Méaux
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
Compact Storage of Superblocks for NIPoPoW Applications
Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist
Abhrajit Sengupta, Ozgur Sinanoglu
Abhrajit Sengupta, Ozgur Sinanoglu
Server-Aided Revocable Identity-Based Encryption Revisited
Fei Meng
Fei Meng
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications
Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce
Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems
Sarah Azouvi, George Danezis, Valeria Nikolaenko
Sarah Azouvi, George Danezis, Valeria Nikolaenko
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan
S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers
Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang
Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang
Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme
Fei Meng, Mingqiang Wang
Fei Meng, Mingqiang Wang
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond
Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
Confidential Assets on MimbleWimble
Yi Zheng, Howard Ye, Patrick Dai, Tongcheng Sun, Vladislav Gelfer
Yi Zheng, Howard Ye, Patrick Dai, Tongcheng Sun, Vladislav Gelfer
About Low DFR for QC-MDPC Decoding
Nicolas Sendrier, Valentin Vasseur
Nicolas Sendrier, Valentin Vasseur
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction
Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk
Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
Diana Maimut, George Teseleanu
Diana Maimut, George Teseleanu
Cross-Chain Communication Using Receipts
Arasu Arun, C. Pandu Rangan
Arasu Arun, C. Pandu Rangan
On the Impossibility of Probabilistic Proofs in Relativized Worlds
Alessandro Chiesa, Siqi Liu
Alessandro Chiesa, Siqi Liu
Secret Sharing Schemes : A Fine Grained Analysis
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
$AC^0$ Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes
Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha
Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha
On asymptotically optimal tests for random number generators
Boris Ryabko
Boris Ryabko
HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT
Zhiguo Wan, Wei Liu, Hui Cui
Zhiguo Wan, Wei Liu, Hui Cui
Efficient Side-Channel Secure Message Authentication with Better Bounds
Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
QC-MDPC decoders with several shades of gray
Nir Drucker, Shay Gueron, Dusan Kostic
Nir Drucker, Shay Gueron, Dusan Kostic
IPDL: A Probabilistic Dataflow Logic for Cryptography
Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova
Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations
Nicky Mouha, Christopher Celi
Nicky Mouha, Christopher Celi
A Non-Interactive Shuffle Argument With Low Trust Assumptions
Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac
Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac
Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks
Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi B. Tahoori
Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi B. Tahoori
Designated-ciphertext Searchable Encryption
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo
CSIDH on Other Form of Elliptic Curves
Xuejun Fan, Song Tian, Bao Li, Xiu Xu
Xuejun Fan, Song Tian, Bao Li, Xiu Xu
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption
Melissa Chase, Trevor Perrin, Greg Zaverucha
Melissa Chase, Trevor Perrin, Greg Zaverucha
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
Hossein Arabnezhad-Khanoki, Babak Sadeghiyan
Hossein Arabnezhad-Khanoki, Babak Sadeghiyan
A New Encryption Scheme Based On Subset Identifying Problem
Muhammad Rezal Kamel Ariffin
Muhammad Rezal Kamel Ariffin
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions
Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism
Augustin P. Sarr
Augustin P. Sarr
Isochronous Gaussian Sampling: From Inception to Implementation
James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
Withdrawn
Withdrawn
Withdrawn
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
The group of automorphisms of the set of self-dual bent functions
Aleksandr Kutsenko
Aleksandr Kutsenko
Incrementally Verifiable Computation via Incremental PCPs
Moni Naor, Omer Paneth, Guy N. Rothblum
Moni Naor, Omer Paneth, Guy N. Rothblum
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting
Tassos Dimtiriou
Tassos Dimtiriou
Revisiting Higher-Order Computational Attacks against White-Box Implementations
Houssem Maghrebi, Davide Alessio
Houssem Maghrebi, Davide Alessio
CSIDH on the surface
Wouter Castryck, Thomas Decru
Wouter Castryck, Thomas Decru
No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS
Ingo Braun, Fabio Campos, Steffen Reith, Marc Stöttinger
Ingo Braun, Fabio Campos, Steffen Reith, Marc Stöttinger
Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations
Vincent HERBERT
Vincent HERBERT
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
RedShift: Transparent SNARKs from List Polynomial Commitments
Assimakis Kattis, Konstantin Panarin, Alexander Vlasov
Assimakis Kattis, Konstantin Panarin, Alexander Vlasov
(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes
Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia
Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework
Xiaoxia Jiang, Youliang Tian
Xiaoxia Jiang, Youliang Tian
How to compartment secrets
Gaëlle Candel, Rémi Géraud-Stewart, David Naccache
Gaëlle Candel, Rémi Géraud-Stewart, David Naccache
A note on the multivariate cryptosystem based on a linear code
Yasufumi Hashimoto
Yasufumi Hashimoto
McTiny: fast high-confidence post-quantum key erasure for tiny network servers
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Voltage-based Covert Channels using FPGAs
Dennis R. E. Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, Mehdi B. Tahoori
Dennis R. E. Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, Mehdi B. Tahoori
SoK: Computer-Aided Cryptography
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
Decryption failure is more likely after success
Nina Bindel, John M. Schanck
Nina Bindel, John M. Schanck
Are These Pairing Elements Correct? Automated Verification and Applications
Susan Hohenberger, Satyanarayana Vusirikala
Susan Hohenberger, Satyanarayana Vusirikala
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Generic Attack on Iterated Tweakable FX Constructions
Ferdinand Sibleyras
Ferdinand Sibleyras
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code
Jayashree Dey, Ratna Dutta
Jayashree Dey, Ratna Dutta
The supersingular isogeny problem in genus 2 and beyond
Craig Costello, Benjamin Smith
Craig Costello, Benjamin Smith
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version)
Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, Halimah Badioze Zaman
Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, Halimah Badioze Zaman
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations
Keita Emura, Shuichi Katsumata, Yohei Watanabe
Keita Emura, Shuichi Katsumata, Yohei Watanabe
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
On the Power of Multiple Anonymous Messages
Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker
Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions
Kaisa Nyberg
Kaisa Nyberg
Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs
Elif Bilge Kavun, Nele Mentens, Jo Vliegen, Tolga Yalcin
Elif Bilge Kavun, Nele Mentens, Jo Vliegen, Tolga Yalcin
Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes
Christophe Clavier, Léo Reynaud
Christophe Clavier, Léo Reynaud
Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)
Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang
Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang
A Scalable Post-quantum Hash-Based Group Signature
Masoumeh Shafieinejad, Navid Nasr Esfahani
Masoumeh Shafieinejad, Navid Nasr Esfahani
Generic Constructions of RIBE via Subset Difference Method
Xuecheng Ma, Dongdai Lin
Xuecheng Ma, Dongdai Lin
New ideas to build noise-free homomorphic cryptosystems
Gérald Gavin, Sandrine Tainturier
Gérald Gavin, Sandrine Tainturier
Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey
Teik Guan Tan, Pawel Szalachowski, Jianying Zhou
Teik Guan Tan, Pawel Szalachowski, Jianying Zhou
A note on the cost of computing odd degree isogenies
Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
Analyzing the Linear Keystream Biases in AEGIS
Maria Eichlseder, Marcel Nageler, and Robert Primas
Maria Eichlseder, Marcel Nageler, and Robert Primas
A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level
Aurore Guillevic
Aurore Guillevic
A Subset Fault Analysis of ASCON
Priyanka Joshi, Bodhisatwa Mazumdar
Priyanka Joshi, Bodhisatwa Mazumdar
Impeccable Circuits II
Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi
Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi
Efficient FPGA Implementations of LowMC and Picnic
Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption
Keitaro Hashimoto, Wakaha Ogata, Toi Tomita
Keitaro Hashimoto, Wakaha Ogata, Toi Tomita
A Lattice-based Enhanced Privacy ID
Nada EL Kassem, Luis Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa
Nada EL Kassem, Luis Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh
Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh
Boolean Functions with Multiplicative Complexity 3 and 4
Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
Multi-Device for Signal
Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque
Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque
A Modern View on Forward Security
Colin Boyd, Kai Gellert
Colin Boyd, Kai Gellert
Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level
Kaushik Nath, Palash Sarkar
Kaushik Nath, Palash Sarkar
Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
Daniele Cozzo, Nigel P. smart
Daniele Cozzo, Nigel P. smart
Universal Forgery Attack against GCM-RUP
Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
Traceable Inner Product Functional Encryption
Xuan Thanh Do, Duong Hieu Phan, David Pointcheval
Xuan Thanh Do, Duong Hieu Phan, David Pointcheval
Cryptanalysis of the Legendre PRF and generalizations
Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto
Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto
Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code
Daniel Smith-Tone, Cristina Tone
Daniel Smith-Tone, Cristina Tone
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang
Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang
Laconic Conditional Disclosure of Secrets and Applications
Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta
Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta
Spectral analysis of ZUC-256
Jing Yang, Thomas Johansson, Alexander Maximov
Jing Yang, Thomas Johansson, Alexander Maximov
Speeding Up OMD Instantiations in Hardware
Diana Maimut, Alexandru Stefan Mega
Diana Maimut, Alexandru Stefan Mega
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
Network Time with a Consensus on Clock
Handan Kilinc Alper
Handan Kilinc Alper
Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths
Sebati Ghosh, Palash Sarkar
Sebati Ghosh, Palash Sarkar
Privacy-Preserving Decentralised Singular Value Decomposition
Bowen Liu, Qiang Tang
Bowen Liu, Qiang Tang
Audita: A Blockchain-based Auditing Framework for Off-chain Storage
Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano
Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano
From Fairness to Full Security in Multiparty Computation
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Yue Qin, Chi Cheng, Jintai Ding
Yue Qin, Chi Cheng, Jintai Ding
Scalable Wildcarded Identity-Based Encryption
Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh
Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh
Succinct Non-Interactive Secure Computation
Andrew Morgan, Rafael Pass, Antigoni Polychroniadou
Andrew Morgan, Rafael Pass, Antigoni Polychroniadou
Secret Shared Shuffle
Melissa Chase, Esha Ghosh, Oxana Poburinnaya
Melissa Chase, Esha Ghosh, Oxana Poburinnaya
Extracting Randomness from Extractor-Dependent Sources
Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
Two-party Private Set Intersection with an Untrusted Third Party
Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
Offline Witness Encryption with Semi-Adaptive Security
Peter Chvojka, Tibor Jager, Saqib A. Kakvi
Peter Chvojka, Tibor Jager, Saqib A. Kakvi
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers
Neal Koblitz and Alfred Menezes
Neal Koblitz and Alfred Menezes
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Tibor Jager, David Niehues
Tibor Jager, David Niehues
Privacy-Preserving Distributed Machine Learning based on Secret Sharing
Ye Dong, Xiaojun Chen, Liyan Shen
Ye Dong, Xiaojun Chen, Liyan Shen
The Dark SIDH of Isogenies
Paul Bottinelli, Victoria de Quehen, Chris Leonardi, Anton Mosunov, Filip Pawlega, Milap Sheth
Paul Bottinelli, Victoria de Quehen, Chris Leonardi, Anton Mosunov, Filip Pawlega, Milap Sheth
SEAL: Sealed-Bid Auction Without Auctioneers
Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil G. Ray
Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil G. Ray
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil
OptiSwap: Fast Optimistic Fair Exchange
Lisa Eckey, Sebastian Faust, Benjamin Schlosser
Lisa Eckey, Sebastian Faust, Benjamin Schlosser
Drinfeld modules may not be for isogeny based cryptography
Antoine Joux, Anand Kumar Narayanan
Antoine Joux, Anand Kumar Narayanan
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain
Donghoon Chang, Munawar Hasan, Pranav Jain
Donghoon Chang, Munawar Hasan, Pranav Jain
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
Avijit Dutta, Mridul Nandi
Avijit Dutta, Mridul Nandi
Secure Quantum Extraction Protocols
Prabhanjan Ananth, Rolando L. La Placa
Prabhanjan Ananth, Rolando L. La Placa
An Efficient Micropayment Channel on Ethereum
Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef
Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef
Supersingular isogeny key exchange for beginners
Craig Costello
Craig Costello
Homomorphic Encryption Random Beacon
Alisa Cherniaeva, Ilia Shirobokov, Omer Shlomovits
Alisa Cherniaeva, Ilia Shirobokov, Omer Shlomovits
Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version)
Mingjiang Huang, Liming Wang
Mingjiang Huang, Liming Wang
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version)
Mingjiang Huang, Liming Wang
Mingjiang Huang, Liming Wang
Reverse Firewalls for Actively Secure MPCs
Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
Binary Kummer Line
Sabyasachi Karati
Sabyasachi Karati
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search
Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang
Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang
On Oblivious Amplification of Coin-Tossing Protocols
Nir Bitansky, Nathan Geier
Nir Bitansky, Nathan Geier
Cryptographic Fault Diagnosis using VerFI
Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments
Jiwon Lee, Jihye Kim, Hyunok Oh
Jiwon Lee, Jihye Kim, Hyunok Oh
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism
Sujoy Sinha Roy
Sujoy Sinha Roy
A Novel CCA Attack using Decryption Errors against LAC
Qian Guo, Thomas Johansson, Jing Yang
Qian Guo, Thomas Johansson, Jing Yang
ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption
Liang Zhang, Haibin Kan, Zening Chen, Ziqi Mao, Jinjie Gao
Liang Zhang, Haibin Kan, Zening Chen, Ziqi Mao, Jinjie Gao
A Valid Blockchain-based Data Trading Ecosystem
Taotao li, Dequan li
Taotao li, Dequan li
Privacy-Preserving Computation over Genetic Data: HLA Matching and so on
Jinming Cui, Huaping Li, Meng Yang
Jinming Cui, Huaping Li, Meng Yang
Reduction Modulo $2^{448}-2^{224}-1$
Kaushik Nath, Palash Sarkar
Kaushik Nath, Palash Sarkar
A simpler construction of traceable and linkable ring signature scheme
Wulu Li
Wulu Li
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation
Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
Modular lattice signatures, revisited
Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
Actively Secure Setup for SPDZ
Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Frederik Vercauteren, Tim Wood
Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Frederik Vercauteren, Tim Wood
A constant-rate non-malleable code in the split-state model.
Divesh Aggarwal, Maciej Obremski
Divesh Aggarwal, Maciej Obremski
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Mark Abspoel, Anders Dalskov, Daniel Escudero, Ariel Nof
Mark Abspoel, Anders Dalskov, Daniel Escudero, Ariel Nof
Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors
Hamid Nejatollahi, Sina Shahhosseini, Rosario Cammarota, Nikil Dutt
Hamid Nejatollahi, Sina Shahhosseini, Rosario Cammarota, Nikil Dutt
FastSwap: Concretely Efficient Contingent Payments for Complex Predicates
Mathias Hall-Andersen
Mathias Hall-Andersen
A trip between creation and destruction of non-commutative public key exchange protocols
Borja Gómez
Borja Gómez
Hashing to elliptic curves of $j$-invariant $1728$
Dmitrii Koshelev
Dmitrii Koshelev
LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR
Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
SÉTA: Supersingular Encryption from Torsion Attacks
Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
Trapdoor DDH groups from pairings and isogenies
Péter Kutas, Christophe Petit, Javier Silva
Péter Kutas, Christophe Petit, Javier Silva
On constant-time QC-MDPC decoding with negligible failure rate
Nir Drucker, Shay Gueron, Dusan Kostic
Nir Drucker, Shay Gueron, Dusan Kostic
Threshold Schemes from Isogeny Assumptions
Luca De Feo, Michael Meyer
Luca De Feo, Michael Meyer
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains
Ambili K N, Jimmy Jose
Ambili K N, Jimmy Jose
Full-Round Differential Attack on DoT Block Cipher
Manoj Kumar
Manoj Kumar
Shorter QA-NIZK and SPS with Tighter Security
Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang
Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang
Breaking the Hidden Irreducible Polynomials Scheme
Christian Eder
Christian Eder
Privacy-Preserving Decision Tree Training and Prediction against Malicious Server
Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
Geoffroy Couteau, Bill Roscoe, Peter Ryan
Geoffroy Couteau, Bill Roscoe, Peter Ryan
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Post-quantum Zero Knowledge in Constant Rounds
Nir Bitansky, Omri Shmueli
Nir Bitansky, Omri Shmueli
An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric
Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Victor Mateu
Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Victor Mateu
Towards Quantum-Safe VPNs and Internet
Maran van Heesch, Niels van Adrichem, Thomas Attema, Thijs Veugen
Maran van Heesch, Niels van Adrichem, Thomas Attema, Thijs Veugen
Two PQ Signature Use-cases: Non-issues, challenges and potential solutions.
Panos Kampanakis, Dimitrios Sikeridis
Panos Kampanakis, Dimitrios Sikeridis
Updatable Oblivious Key Management for Storage Systems
Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
Rank-metric Encryption on Arm-Cortex M0
Ameirah al Abdouli, Emanuele Bellini, Florian Caullery, Marc Manzano, Victor Mateu
Ameirah al Abdouli, Emanuele Bellini, Florian Caullery, Marc Manzano, Victor Mateu
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj
Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj
The Niederreiter cryptosystem and Quasi-Cyclic codes
Upendra Kapshikar, Ayan Mahalanobis
Upendra Kapshikar, Ayan Mahalanobis
Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices
Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh
Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh
Repudiable Ring Signature: Stronger Security and Logarithmic-Size
Hao Lin, Mingqiang Wang
Hao Lin, Mingqiang Wang
On the Security of RSA-PSS in the Wild
Saqib A. Kakvi
Saqib A. Kakvi
Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size
Hao Lin, Mingqiang Wang
Hao Lin, Mingqiang Wang
Note on the noise growth of the RNS variants of the BFV scheme
Jean Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
Jean Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
WaterCarver: Anonymous Confidential Blockchain System based on Account Model
Jiajun Xin, Pei Huang, Lei Chen, Xin Lai, Xiao Zhang, Wulu Li, Yongcan Wang
Jiajun Xin, Pei Huang, Lei Chen, Xin Lai, Xiao Zhang, Wulu Li, Yongcan Wang
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era
Juan Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
Juan Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
Comments on Cryptographic Entropy Measurement
Anna Johnston
Anna Johnston
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran
Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran
On Round-By-Round Soundness and State Restoration Attacks
Justin Holmgren
Justin Holmgren
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie, Amir Moradi
Anita Aghaie, Amir Moradi
Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels
Kaushik Nath, Palash Sarkar
Kaushik Nath, Palash Sarkar
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper)
Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts
Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj
Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj
Permuted Puzzles and Cryptographic Hardness
Elette Boyle, Justin Holmgren, Mor Weiss
Elette Boyle, Justin Holmgren, Mor Weiss
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, and Dimitris Kolonelos
Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, and Dimitris Kolonelos
Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map
Jiseung Kim, Changmin Lee
Jiseung Kim, Changmin Lee
Probabilistic Properties of Modular Addition \\ (Extended abstract)
Victoria Vysotskaya
Victoria Vysotskaya
Simplifying Constructions and Assumptions for $i\mathcal{O}$
Aayush Jain, Huijia Lin, Amit Sahai
Aayush Jain, Huijia Lin, Amit Sahai
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits
Anca Nitulescu
Anca Nitulescu
The Price of Active Security in Cryptographic Protocols
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss
Related-key Attack on 5-Round Kuznyechik
Vitaly Kiryukhin
Vitaly Kiryukhin
A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis
Bastian Richter, David Knichel, Amir Moradi
Bastian Richter, David Knichel, Amir Moradi
A Note on Masking Generic Boolean Functions
Lauren De Meyer, Felix Wegener, Amir Moradi
Lauren De Meyer, Felix Wegener, Amir Moradi
A Note on Our Submission to Track 4 of iDASH 2019
Marcel Keller, Ke Sun
Marcel Keller, Ke Sun
Observations on the Quantum Circuit of the SBox of AES
Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong
Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong
A Note on a Static SIDH Protocol
Samuel Dobson, Trey Li, Lukas Zobernig
Samuel Dobson, Trey Li, Lukas Zobernig
On The Distinguishability of Ideal Ciphers
Roberto Avanzi, Yvo Desmedt
Roberto Avanzi, Yvo Desmedt
Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace
Jong-Yoen Park, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Yoo-Seung Won
Jong-Yoen Park, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Yoo-Seung Won
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain
Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim
Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim
Forward and Backward Private DSSE for Range Queries
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu
Computationally Modeling User-Mediated Authentication Protocols
Britta Hale
Britta Hale
Linear-Regression on Packed Encrypted Data in the Two-Server Model
Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini
Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini
QFactory: classically-instructed remote secret qubits preparation
Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack
Bo-Yeon Sim, Dong-Guk Han
Bo-Yeon Sim, Dong-Guk Han
Physical Cryptography
Mariana Costiuc, Diana Maimut, George Teseleanu
Mariana Costiuc, Diana Maimut, George Teseleanu
Efficient Homomorphic Comparison Methods with Optimal Complexity
Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim
Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts
Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung
Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice
Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications
Zhao Chunhuan, Zheng Zhongxiang, Wang Xiaoyun, Xu Guangwu
Zhao Chunhuan, Zheng Zhongxiang, Wang Xiaoyun, Xu Guangwu
Linear-Size Constant-Query IOPs for Delegating Computation
Eli Ben-Sasson, Alessandro Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, Nicholas Spooner
Eli Ben-Sasson, Alessandro Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, Nicholas Spooner
Transparent SNARKs from DARK Compilers
Benedikt Bünz, Ben Fisch, Alan Szepieniec
Benedikt Bünz, Ben Fisch, Alan Szepieniec
Guess what?! On the impossibility of unconditionally secure public-key encryption
Lorenz Panny
Lorenz Panny
Dynamic Searchable Encryption with Small Client Storage
Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou
Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou
Cube Cryptanalysis of Round-Reduced ACORN
Jingchun Yang, Meicheng Liu, Dongdai Lin
Jingchun Yang, Meicheng Liu, Dongdai Lin
Analysis of Nakamoto Consensus, Revisited
Jianyu Niu, Chen Feng, Hoang Dau, Yu-Chih Huang, Jingge Zhu
Jianyu Niu, Chen Feng, Hoang Dau, Yu-Chih Huang, Jingge Zhu
Practical Volume-Based Attacks on Encrypted Databases
Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa
Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
Sub-Linear Privacy-Preserving Near-Neighbor Search
M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar
M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar
Probabilistic Data Structures in Adversarial Environments
David Clayton, Christopher Patton, Thomas Shrimpton
David Clayton, Christopher Patton, Thomas Shrimpton
Side-channel Attacks on Blinded Scalar Multiplications Revisited
Thomas Roche, Laurent Imbert, Victor Lomné
Thomas Roche, Laurent Imbert, Victor Lomné
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper)
Nugier Cyrius, Adelin Remi, Migliore Vincent, Alata Eric
Nugier Cyrius, Adelin Remi, Migliore Vincent, Alata Eric
On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages
Abdur Rehman Raza, Khawir Mahmood, Muhammad Faisal Amjad, Haider Abbas, Mehreen Afzal
Abdur Rehman Raza, Khawir Mahmood, Muhammad Faisal Amjad, Haider Abbas, Mehreen Afzal
A Scalable Blockchain Based Digital Rights Management System
Ashutosh Dhar Dwivedi
Ashutosh Dhar Dwivedi
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, and Öznur Özkasap
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, and Öznur Özkasap
A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption
Farokhlagha Moazami, Masoumeh Safkhani
Farokhlagha Moazami, Masoumeh Safkhani
Exploring Lightweight Efficiency of ForkAES
Fatih Balli, Subhadeep Banik
Fatih Balli, Subhadeep Banik
Swap and Rotate: Lightweight linear layers for SPN-based blockciphers
Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay
Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay
Topology-Hiding Computation for Networks with Unknown Delays
Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
Adaptive Security of Practical Garbling Schemes
Zahra Jafargholi, Sabine Oechsner
Zahra Jafargholi, Sabine Oechsner
On collisions related to an ideal class of order 3 in CSIDH
Hiroshi Onuki, Tsuyoshi Takagi
Hiroshi Onuki, Tsuyoshi Takagi
Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective
Xenia Bogomolec, John Gregory Underhill, Stiepan Aurélien Kovac
Xenia Bogomolec, John Gregory Underhill, Stiepan Aurélien Kovac
Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications
Borja Gómez
Borja Gómez
High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography
Jing Tian, Zhe Liu, Jun Lin, Zhongfeng Wang, Binjing Li
Jing Tian, Zhe Liu, Jun Lin, Zhongfeng Wang, Binjing Li
Secure Multi-party Quantum Computation with a Dishonest Majority
Yfke Dulek, Alex Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner
Yfke Dulek, Alex Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner
Efficient simulation of random states and random unitaries
Gorjan Alagic, Christian Majenz, Alexander Russell
Gorjan Alagic, Christian Majenz, Alexander Russell
Authentication in Key-Exchange: Definitions, Relations and Composition
Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
Rational isogenies from irrational endomorphisms
Wouter Castryck, Lorenz Panny, Frederik Vercauteren
Wouter Castryck, Lorenz Panny, Frederik Vercauteren
Efficient Redactable Signature and Application to Anonymous Credentials
Olivier Sanders
Olivier Sanders
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields
Thomas Attema, Ronald Cramer, Chaoping Xing
Thomas Attema, Ronald Cramer, Chaoping Xing
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
Encrypted Databases: New Volume Attacks against Range Queries
Zichen Gui, Oliver Johnson, Bogdan Warinschi
Zichen Gui, Oliver Johnson, Bogdan Warinschi
Secret sharing and duality
Laszlo Csirmaz
Laszlo Csirmaz
Evaluating Octic Residue Symbols
Marc Joye
Marc Joye
Non-Malleable Commitments Using Goldreich-Levin List Decoding
Vipul Goyal, Silas Richelson
Vipul Goyal, Silas Richelson
Perfect Forward Security of SPAKE2
Michel Abdalla, Manuel Barbosa
Michel Abdalla, Manuel Barbosa
Security models for everlasting privacy
Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis
Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets
Daniel Berend, Dor Bitan, Shlomi Dolev
Daniel Berend, Dor Bitan, Shlomi Dolev
On the equivalence of authentication codes and robust (2,2)-threshold schemes
Maura B. Paterson, Douglas R. Stinson
Maura B. Paterson, Douglas R. Stinson
Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT
Fulei Ji, Wentao Zhang, Tianyou Ding
Fulei Ji, Wentao Zhang, Tianyou Ding
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
Improving Password Guessing via Representation Learning
Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti
Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs
Orr Dunkelman, Léo Perrin
Orr Dunkelman, Léo Perrin
Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences
Mahabir Prasad Jhanwar, Pratyush Ranjan Tiwari
Mahabir Prasad Jhanwar, Pratyush Ranjan Tiwari
Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL
David Butler, Andreas Lochbihler, David Aspinall, Adria Gascon
David Butler, Andreas Lochbihler, David Aspinall, Adria Gascon
A concrete instantiation of Bulletproof zero-knowledge proof
Andrey Jivsov
Andrey Jivsov
Broadcast-Optimal Two-Round MPC
Ran Cohen, Juan Garay, Vassilis Zikas
Ran Cohen, Juan Garay, Vassilis Zikas
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries
Serge Fehr, Chen Yuan
Serge Fehr, Chen Yuan
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi
Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Practical MP-LWE-based encryption balancing security-risk vs. efficiency
Ron Steinfeld, Amin Sakzad, Raymond K. Zhao
Ron Steinfeld, Amin Sakzad, Raymond K. Zhao
SoK: Sharding on Blockchain
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
Proofs for Inner Pairing Products and Applications
Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely
Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely
The Thirteenth Power Residue Symbol
Eric Brier, David Naccache
Eric Brier, David Naccache
Revisiting Leakage Abuse Attacks
Laura Blackstone, Seny Kamara, Tarik Moataz
Laura Blackstone, Seny Kamara, Tarik Moataz
Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography
Borja Gómez
Borja Gómez
Immunization against Complete Subversion without Random Oracles
Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi
Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi
Lever: Breaking the Shackles of Scalable On-chain Validation
Mingming Wang, Qianhong Wu
Mingming Wang, Qianhong Wu
Almost universal codes for MIMO wiretap channels
Laura Luzzi, Roope Vehkalahti, Cong Ling
Laura Luzzi, Roope Vehkalahti, Cong Ling
Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count
Iggy van Hoof
Iggy van Hoof
Semantically Secure Lattice Codes for Compound MIMO Channels
Antonio Campello, Cong Ling, Jean-Claude Belfiore
Antonio Campello, Cong Ling, Jean-Claude Belfiore
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu
Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
The complete cost of cofactor h=1
Peter Schwabe, Amber Sprenkels
Peter Schwabe, Amber Sprenkels
Fast verification of masking schemes in characteristic two
Nicolas Bordes, Pierre Karpman
Nicolas Bordes, Pierre Karpman
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version)
Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao
Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao
On the Difficulty of FSM-based Hardware Obfuscation
Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Karim Baghery
Karim Baghery
Estimating quantum speedups for lattice sieves
Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
Cryptanalysis of the Multivariate Encryption Scheme EFLASH
Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid
Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Practical Privacy-Preserving K-means Clustering
Payman Mohassel, Mike Rosulek, Ni Trieu
Payman Mohassel, Mike Rosulek, Ni Trieu
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security
Srimanta Bhattacharya, Mridul Nandi
Srimanta Bhattacharya, Mridul Nandi
How to Extract Useful Randomness from Unreliable Sources
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti
Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti
Machine-Checked Proofs for Cryptographic Standards
José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
The Retracing Boomerang Attack
Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Stronger Security and Constructions of Multi-Designated Verifier Signatures
Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nițulescu, Claudio Orlandi, Sophia Yakoubov
Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nițulescu, Claudio Orlandi, Sophia Yakoubov
Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem
Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
The Bitcoin Backbone Protocol Against Quantum Adversaries
Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
LockDown: Balance Availability Attack against Lightning Network Channels
Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquin Garcia-Alfaro
Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquin Garcia-Alfaro
On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption
Benjamin R. Curtis, Rachel Player
Benjamin R. Curtis, Rachel Player
Batching non-membership proofs with bilinear accumulators
Steve Thakur
Steve Thakur
Implementing Grover oracles for quantum key search on AES and LowMC
Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia
Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
Craig Costello
Craig Costello
Rerandomizable Signatures under Standard Assumption
Sanjit Chatterjee, R. Kabaleeshwaran
Sanjit Chatterjee, R. Kabaleeshwaran
Auditable Compressed Storage
Iraklis Leontiadis, Reza Curtmola
Iraklis Leontiadis, Reza Curtmola
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP
Tamalika Mukherjee, Noah Stephens-Davidowitz
Tamalika Mukherjee, Noah Stephens-Davidowitz
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version)
Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
On the Complexity of Arithmetic Secret Sharing
Ronald Cramer, Chaoping Xing, Chen Yuan
Ronald Cramer, Chaoping Xing, Chen Yuan
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
Thijs Veugen, Thomas Attema, Gabriele Spini
Thijs Veugen, Thomas Attema, Gabriele Spini
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes
Ronald Cramer, Chaoping Xing
Ronald Cramer, Chaoping Xing
Threat Models and Security of Phase-Change Memory
Gang Wang
Gang Wang
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Nearly Optimal Robust Secret Sharing against Rushing Adversaries
Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode.
V. Ustimenko
V. Ustimenko
Privacy-Enhanced Machine Learning with Functional Encryption
Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
SoK: Communication Across Distributed Ledgers
Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt
Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing
Kazuhiko Minematsu, Norifumi Kamiya
Kazuhiko Minematsu, Norifumi Kamiya
Encrypted Distributed Dictionaries
Archita Agarwal, Seny Kamara
Archita Agarwal, Seny Kamara
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols
Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref
Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref
Evolving Ramp Secret Sharing with a Small Gap
Amos Beimel, Hussien Othman
Amos Beimel, Hussien Othman
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme
Laltu Sardar, Sushmita Ruj
Laltu Sardar, Sushmita Ruj
Exploring Trade-offs in Batch Bounded Distance Decoding
Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors
Aaron Hutchinson, Jason LeGrow, Brian Koziel, Reza Azarderakhsh
Aaron Hutchinson, Jason LeGrow, Brian Koziel, Reza Azarderakhsh
Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions
Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version)
Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
A Diffie-Hellman quantum session key establishment protocol without entanglement
Yalin Chen, Chang Hsiang, Liang-Chun Wang, Yu-Yuan Chou, Jue-Sam Chou
Yalin Chen, Chang Hsiang, Liang-Chun Wang, Yu-Yuan Chou, Jue-Sam Chou
NP-completeness Reduction for Semiprimes Factorization Problem
Yen-Lung Lai
Yen-Lung Lai
Computational Extractors with Negligible Error in the CRS Model
Ankit Garg, Yael Tauman Kalai, Dakshita Khurana
Ankit Garg, Yael Tauman Kalai, Dakshita Khurana
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son
Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector
Oliver Masters, Hamish Hunt, Enrico Steffinlongo, Jack Crawford, Flavio Bergamaschi, Maria E. Dela Rosa, Caio C. Quini, Camila T. Alves, Feranda de Souza, Deise G. Ferreira
Oliver Masters, Hamish Hunt, Enrico Steffinlongo, Jack Crawford, Flavio Bergamaschi, Maria E. Dela Rosa, Caio C. Quini, Camila T. Alves, Feranda de Souza, Deise G. Ferreira
Subliminal Hash Channels
George Teseleanu
George Teseleanu
Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
Mikerah Quintyne-Collins
Mikerah Quintyne-Collins
Redactable Proof-of-Stake Blockchain with Fast Confirmation
Jing Xu, Xinyu Li, Lingyuan Yin, Bingyong Guo, Han Feng, Zhenfeng Zhang
Jing Xu, Xinyu Li, Lingyuan Yin, Bingyong Guo, Han Feng, Zhenfeng Zhang
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography
Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
Lower Bounds for Multi-Server Oblivious RAMs
Kasper Green Larsen, Mark Simkin, Kevin Yeo
Kasper Green Larsen, Mark Simkin, Kevin Yeo
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger
Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger
Side-channel Masking with Pseudo-Random Generator
Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun
Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun
On the Multi-User Security of Short Schnorr Signatures with Preprocessing
Jeremiah Blocki, Seunghoon Lee
Jeremiah Blocki, Seunghoon Lee
More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang, Xiao Wang, Jiang Zhang
Kang Yang, Xiao Wang, Jiang Zhang
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms
Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels
Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels
Applications on traceable range proofs from fully regulatable privacy-preserving blockchains
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
Wulu Li, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
On the (Quantum) Random Oracle Methodology: New Separations and More
Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang
Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
Qi Chen, Chunming Tang, Zhiqiang Lin
Qi Chen, Chunming Tang, Zhiqiang Lin
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name
Eman Salem Alashwali, Kasper Rasmussen
Eman Salem Alashwali, Kasper Rasmussen
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling
Eleftheria Makri, Tim Wood
Eleftheria Makri, Tim Wood
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann
Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann
Proof-of-Burn
Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
Secure Computation with Preprocessing via Function Secret Sharing
Elette Boyle, Niv Gilboa, Yuval Ishai
Elette Boyle, Niv Gilboa, Yuval Ishai
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran
Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran
Quantum Random Oracle Model with Auxiliary Input
Minki Hhan, Keita Xagawa, Takashi Yamakawa
Minki Hhan, Keita Xagawa, Takashi Yamakawa
Cerberus Channels: Incentivizing Watchtowers for Bitcoin
Georgia Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer
Georgia Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer
Short Paper: XOR Arbiter PUFs have Systematic Response Bias
Nils Wisiol, Niklas Pirnay
Nils Wisiol, Niklas Pirnay
Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB
Xinggu Chen, Haining Fan
Xinggu Chen, Haining Fan
Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing
Josiah Johnson Umezurike
Josiah Johnson Umezurike
KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability
Clinton Ehrlich, Anna Guzova
Clinton Ehrlich, Anna Guzova
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Shyam Murthy, Srinivas Vivek
Shyam Murthy, Srinivas Vivek
The SPHINCS+ Signature Framework
Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee
Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee
Distributed Vector-OLE: Improved Constructions and Implementation
Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova
Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS
Eman Salem Alashwali, Kasper Rasmussen
Eman Salem Alashwali, Kasper Rasmussen
On the Security of Multikey Homomorphic Encryption
Hyang-Sook Lee, Jeongeun Park
Hyang-Sook Lee, Jeongeun Park
OCEAN: A Built-In Replacement for Mining Pools
Raymond Chee, Kartik Chitturi, Edouard Dufour-Sans, Kyle Soska
Raymond Chee, Kartik Chitturi, Edouard Dufour-Sans, Kyle Soska
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods
Fukang Liu, Takanori Isobe, Willi Meier
Fukang Liu, Takanori Isobe, Willi Meier
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited
Yiming Zhu, Zhen Liu, Yanbin Pan
Yiming Zhu, Zhen Liu, Yanbin Pan
Puncturable Proxy Re-Encryption supporting to Group Messaging Service
Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu
Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu
Adaptively Secure Garbling Schemes for Parallel Computations
Kai-Min Chung, Luowen Qian
Kai-Min Chung, Luowen Qian
Fractal: Post-Quantum and Transparent Recursive Proofs from Holography
Alessandro Chiesa, Dev Ojha, Nicholas Spooner
Alessandro Chiesa, Dev Ojha, Nicholas Spooner
Private Information Retrieval with Sublinear Online Time
Henry Corrigan-Gibbs, Dmitry Kogan
Henry Corrigan-Gibbs, Dmitry Kogan
Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe
Dirk Thatmann
Dirk Thatmann
iUC: Flexible Universal Composability Made Simple
Jan Camenisch, Stephan Krenn, Ralf Kuesters, Daniel Rausch
Jan Camenisch, Stephan Krenn, Ralf Kuesters, Daniel Rausch
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
DLSCA: a Tool for Deep Learning Side Channel Analysis
Martin Brisfors, Sebastian Forsmark
Martin Brisfors, Sebastian Forsmark
Secure Delegation of Isogeny Computations and Cryptographic Applications
Robi Pedersen, Osmanbey Uzunkol
Robi Pedersen, Osmanbey Uzunkol
Efficient Private PEZ Protocols for Symmetric Functions
Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently
Joey Green, Tilo Burghardt, Elisabeth Oswald
Joey Green, Tilo Burghardt, Elisabeth Oswald
Lattice Trapdoors and IBE from Middle-Product LWE
Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong
Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong
HEAX: An Architecture for Computing on Encrypted Data
M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai
M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Karim Baghery
Karim Baghery
Separating Symmetric and Asymmetric Password-Authenticated Key Exchange
Julia Hesse
Julia Hesse
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig
Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig
Local Proofs Approaching the Witness Length
Noga Ron-Zewi, Ron D. Rothblum
Noga Ron-Zewi, Ron D. Rothblum
Breaking and Fixing Anonymous Credentials for the Cloud
Ulrich Haböck, Stephan Krenn
Ulrich Haböck, Stephan Krenn
Sharing the LUOV: Threshold Post-Quantum Signatures
Daniele Cozzo, Nigel P. smart
Daniele Cozzo, Nigel P. smart
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Daniele Di Tullio, Ankan Pal
Daniele Di Tullio, Ankan Pal
Privacy-preserving auditable token payments in a permissioned blockchain system
Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann
Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann
A Study of Persistent Fault Analysis
Andrea Caforio, Subhadeep Banik
Andrea Caforio, Subhadeep Banik
Adventures in Supersingularland
Sarah Arpin, Catalina Camacho-Navarro, Kristin Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková
Sarah Arpin, Catalina Camacho-Navarro, Kristin Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence
David Cerezo Sánchez
David Cerezo Sánchez
Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Marc Fischlin, Felix Günther
Marc Fischlin, Felix Günther
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
A New Public Key Cryptosystem Based on Edwards Curves
Maher Boudabra, Abderrahmane Nitaj
Maher Boudabra, Abderrahmane Nitaj
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
Abderrahmane Nitaj, Emmanuel Fouotsa
Abderrahmane Nitaj, Emmanuel Fouotsa
CrypTFlow: Secure TensorFlow Inference
Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
New point compression method for elliptic $\mathbb{F}_{\!q^2}$-curves of $j$-invariant $0$
Dmitrii Koshelev
Dmitrii Koshelev
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, Nicholas Ward
Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, Nicholas Ward
The Function-Inversion Problem: Barriers and Opportunities
Henry Corrigan-Gibbs, Dmitry Kogan
Henry Corrigan-Gibbs, Dmitry Kogan
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Josh Alman, Robin Hui
Josh Alman, Robin Hui
Verifiable Registration-Based Encryption
Rishab Goyal, Satyanarayana Vusirikala
Rishab Goyal, Satyanarayana Vusirikala
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Eli Biham, Lior Neumann
Eli Biham, Lior Neumann
A Machine-Checked Proof of Security for AWS Key Management Service
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Gregoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Gregoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Swapnil Paliwal, Anvita Chandrakar
Swapnil Paliwal, Anvita Chandrakar
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
Abhishek Chakraborty, Ankur Srivastava
Abhishek Chakraborty, Ankur Srivastava
Accelerated V2X provisioning with Extensible Processor Platform
Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos Simplicio Jr., Diego F. Aranha, Ruud Derwig, Harsh Kupwade-Patil
Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos Simplicio Jr., Diego F. Aranha, Ruud Derwig, Harsh Kupwade-Patil
Dynamic Searchable Encryption with Access Control
Johannes Blömer, Nils Löken
Johannes Blömer, Nils Löken
Card-based Cryptography Meets Formal Verification
Alexander Koch, Michael Schrempp, Michael Kirsten
Alexander Koch, Michael Schrempp, Michael Kirsten
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Kazuki Yoneyama
Kazuki Yoneyama
An LLL Algorithm for Module Lattices
Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele, Christian Janson, Patrick Struck
Jean Paul Degabriele, Christian Janson, Patrick Struck
Anonymous AE
John Chan, Phillip Rogaway
John Chan, Phillip Rogaway
On Fully Secure MPC with Solitary Output
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
Rahim Toluee, Taraneh Eghlidos
Rahim Toluee, Taraneh Eghlidos
How to leverage hardness of constant degree expanding polynomials over R to build iO
Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Yilei Chen, Nicholas Genise, Pratyay Mukherjee
Yilei Chen, Nicholas Genise, Pratyay Mukherjee
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay
Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay
Quantum LLL with an Application to Mersenne Number Cryptosystems
Marcel Tiepelt, Alan Szepieniec
Marcel Tiepelt, Alan Szepieniec
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Mojtaba Khalili, Daniel Slamanig
Mojtaba Khalili, Daniel Slamanig
On Perfect Correctness without Derandomization
Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix
Dor Bitan, Shlomi Dolev
Dor Bitan, Shlomi Dolev
Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse
Dor Bitan, Shlomi Dolev
Dor Bitan, Shlomi Dolev
A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
Recursive Proof Composition without a Trusted Setup
Sean Bowe, Jack Grigg, Daira Hopwood
Sean Bowe, Jack Grigg, Daira Hopwood
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
Alexander Vlasov, Konstantin Panarin
Alexander Vlasov, Konstantin Panarin
Revisiting the Hybrid attack on sparse and ternary secret LWE
Yongha Son, Jung Hee Cheon
Yongha Son, Jung Hee Cheon
Towards Instantiating the Algebraic Group Model
Julia Kastner, Jiaxin Pan
Julia Kastner, Jiaxin Pan
The Local Forking Lemma and its Application to Deterministic Encryption
Mihir Bellare, Wei Dai, Lucy Li
Mihir Bellare, Wei Dai, Lucy Li
Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving
Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.
Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman
Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman
Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels
Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
Carolyn Whitnall, Elisabeth Oswald
Carolyn Whitnall, Elisabeth Oswald
Simple and Efficient KDM-CCA Secure Public Key Encryption
Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers
Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
On Perfect Correctness in (Lockable) Obfuscation
Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
LLL and stochastic sandpile models
Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang
Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain, François-Xavier Standaert
Olivier Bronchain, François-Xavier Standaert
SPAE a mode of operation for AES on low-cost hardware
Philippe Elbaz-Vincent, Cyril Hugounenq, Sébastien Riou
Philippe Elbaz-Vincent, Cyril Hugounenq, Sébastien Riou
Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable)
Francesco Lucente Stabile, Carey Patrick Atkins
Francesco Lucente Stabile, Carey Patrick Atkins
Threshold Implementations in the Robust Probing Model
Siemen Dhooghe, Svetla Nikova, Vincent Rijmen
Siemen Dhooghe, Svetla Nikova, Vincent Rijmen
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizar
Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizar
Twisted Hessian Isogenies
Thinh Dang, Dustin Moody
Thinh Dang, Dustin Moody
Boomerang Uniformity of Popular S-box Constructions
Shizhu Tian, Christina Boura, Léo Perrin
Shizhu Tian, Christina Boura, Léo Perrin
Middle-Product Learning with Rounding Problem and its Applications
Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
Security of Symmetric Primitives against Key-Correlated Attacks
Aisling Connolly, Pooya Farshim, Georg Fuchsbauer
Aisling Connolly, Pooya Farshim, Georg Fuchsbauer
On the Fast Algebraic Immunity of Majority Functions
Pierrick Méaux
Pierrick Méaux
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra, Divya Ravi
Arpita Patra, Divya Ravi
On the (In)security of Kilian-Based SNARGs
James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron Rothblum
James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron Rothblum
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
Shaanan Cohney, Andrew Kwong, Shachar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom
Shaanan Cohney, Andrew Kwong, Shachar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom
Blackbox Constructions from Mix-Nets
Douglas Wikström
Douglas Wikström
A new family of APN quadrinomials
Lilya Budaghyan, Tor Helleseth, Nikolay Kaleyski
Lilya Budaghyan, Tor Helleseth, Nikolay Kaleyski
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Louis Tajan, Dirk Westhoff, Frederik Armknecht
Louis Tajan, Dirk Westhoff, Frederik Armknecht
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin
Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang, Thomas Johansson, Alexander Maximov
Jing Yang, Thomas Johansson, Alexander Maximov
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky
Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky
Substitution Attacks against Message Authentication
Marcel Armour, Bertram Poettering
Marcel Armour, Bertram Poettering
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
David W. Archer, Jose Manuel Calderon Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan
David W. Archer, Jose Manuel Calderon Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan
Subverting Decryption in AEAD
Marcel Armour, Bertram Poettering
Marcel Armour, Bertram Poettering
Outpost: A Responsive Lightweight Watchtower
Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
EthDKG: Distributed Key Generation with Ethereum Smart Contracts
Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
Sam Kim, David J. Wu
Sam Kim, David J. Wu
Graph Similarity and Its Applications to Hardware Security
Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama
Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama
Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi, Ian Miers, Thomas Ristenpart
Nirvan Tyagi, Ian Miers, Thomas Ristenpart
New Approaches to Traitor Tracing with Embedded Identities
Rishab Goyal, Venkata Koppula, Brent Waters
Rishab Goyal, Venkata Koppula, Brent Waters
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal, Guang Gong
Kalikinkar Mandal, Guang Gong
Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis
Guilherme Perin, Lukasz Chmielewski, Stjepan Picek
Guilherme Perin, Lukasz Chmielewski, Stjepan Picek
Non-malleable Zero-Knowledge Arguments with Lower Round Complexity
Zhenbin Yan, Yi Deng
Zhenbin Yan, Yi Deng
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Martin Zuber, Sergiu Carpov, Renaud Sirdey
Martin Zuber, Sergiu Carpov, Renaud Sirdey
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Akashdeep Saha, Sayandeep Saha, Debdeep Mukhopadhyay, Bhargab Bikram Bhattacharya
Akashdeep Saha, Sayandeep Saha, Debdeep Mukhopadhyay, Bhargab Bikram Bhattacharya
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood
Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood
On the Non-Existence of Short Vectors in Random Module Lattices
Ngoc Khanh Nguyen
Ngoc Khanh Nguyen
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
Wenping MA
Wenping MA
Verifpal: Cryptographic Protocol Analysis for the Real World
Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari
Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Xinyu Li, Jing Xu, Xiong Fan, Yuchen Wang, Zhenfeng Zhang
Xinyu Li, Jing Xu, Xiong Fan, Yuchen Wang, Zhenfeng Zhang
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge
Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
William Black, Ryan Henry
William Black, Ryan Henry
On NIST's Compression Estimate Test
Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
Fast, Compact, and Expressive Attribute-Based Encryption
Junichi Tomida, Yuto Kawahara, Ryo Nishimaki
Junichi Tomida, Yuto Kawahara, Ryo Nishimaki
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness
Andrea Caforio, F Betül Durak, Serge Vaudenay
Andrea Caforio, F Betül Durak, Serge Vaudenay
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
Georg Fuchsbauer
Georg Fuchsbauer
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
Pascal Aubry, Sergiu Carpov, Renaud Sirdey
Pascal Aubry, Sergiu Carpov, Renaud Sirdey
New Constructions of Hinting PRGs, OWFs with Encryption, and more
Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
Another Look at Key Randomisation Hypotheses
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
Table Redundancy Method for Protecting against Fault Attacks
Seungkwang Lee, Nam-su Jho, Myungchul Kim
Seungkwang Lee, Nam-su Jho, Myungchul Kim
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Gabrielle Beck, Maximilian Zinkus, Matthew Green
Gabrielle Beck, Maximilian Zinkus, Matthew Green
TaaS: Commodity MPC via Triples-as-a-Service
Nigel P. Smart, Titouan Tanguy
Nigel P. Smart, Titouan Tanguy
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
Diego F. Aranha, Claudio Orlandi, Akira Takahashi, Greg Zaverucha
Diego F. Aranha, Claudio Orlandi, Akira Takahashi, Greg Zaverucha
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri
Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri
PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
Ariel Gabizon, Zachary J. Williamson, and Oana Ciobotaru
Ariel Gabizon, Zachary J. Williamson, and Oana Ciobotaru
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model
Vincenzo Iovino, Ivan Visconti
Vincenzo Iovino, Ivan Visconti
Collisions on Feistel-MiMC and univariate GMiMC
Xavier Bonnetain
Xavier Bonnetain
Another look at some isogeny hardness assumptions
Simon-Philipp Merz, Romy Minko, Christophe Petit
Simon-Philipp Merz, Romy Minko, Christophe Petit
A Note on Parameter Choices of Round5
Yongha Son
Yongha Son
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
M Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark Tehranipoor
M Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark Tehranipoor
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
Navid Ghaedi Bardeh
Navid Ghaedi Bardeh
Efficient zero-knowledge arguments in the discrete log setting, revisited
Max Hoffmann, Michael Klooß, Andy Rupp
Max Hoffmann, Michael Klooß, Andy Rupp
Analysis of Nakamoto Consensus
Ling Ren
Ling Ren
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
Handan Kılınç Alper
Handan Kılınç Alper
Does "www." Mean Better Transport Layer Security?
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
Security analysis of two lightweight certificateless signature schemes
Nasrollah Pakniat
Nasrollah Pakniat
Homomorphic Encryption Standard
Martin Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan
Martin Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent, Ferdinand Sibleyras
Gaëtan Leurent, Ferdinand Sibleyras
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Interpretable Encrypted Searchable Neural Networks
Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu
Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu
Linear Approximations of Random Functions and Permutations
Mohsin Khan, Kaisa Nyberg
Mohsin Khan, Kaisa Nyberg
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy
Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen
Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen
Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad ElSheikh, Amr M. Youssef
Muhammad ElSheikh, Amr M. Youssef
Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory
Andre Esser, Alexander May
Andre Esser, Alexander May
Module-LWE versus Ring-LWE, Revisited
Yang Wang, Mingqiang Wang
Yang Wang, Mingqiang Wang
On the Degree-Insensitive SI-GDH problem and assumption
Samuel Dobson, Steven D. Galbraith
Samuel Dobson, Steven D. Galbraith
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Domenic Forte
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Domenic Forte
Isogeny-based hashing despite known endomorphisms
Lorenz Panny
Lorenz Panny
Formal Verification of a Constant-Time Preserving C Compiler
Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu
Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu
Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors
Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill
Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill
Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter, Alexander Wild, Amir Moradi
Bastian Richter, Alexander Wild, Amir Moradi
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation
Karim Eldefrawy, Vitor Pereira
Karim Eldefrawy, Vitor Pereira
Tree authenticated ephemeral keys
Pavol Zajac
Pavol Zajac
Related-Key Differential Slide Attack Against Fountain V1
Raluca Posteuca
Raluca Posteuca
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗)
Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger
Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger
Resolving the Trilemma in Logic Encryption
Hai Zhou, Amin Rezaei, Yuanqi Shen
Hai Zhou, Amin Rezaei, Yuanqi Shen
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li
Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu.
Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu.
Unique Rabin-Williams Signature Scheme Decryption
Lynn Margaret Batten, Hugh Cowie Williams
Lynn Margaret Batten, Hugh Cowie Williams
Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu
Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Wen-Ran Zhang
Wen-Ran Zhang
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Gildas Avoine, Sébastien Canard, Loïc Ferreira
Gildas Avoine, Sébastien Canard, Loïc Ferreira
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
A Practicable Timing Attack Against HQC and its Countermeasure
Guillaume Wafo-Tapa, Slim Bettaieb, Loic Bidoux, Philippe Gaborit, Etienne Marcatel
Guillaume Wafo-Tapa, Slim Bettaieb, Loic Bidoux, Philippe Gaborit, Etienne Marcatel
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security
Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
Practical Forgery Attacks on Limdolen and HERN
Raghvendra Rohit, Guang Gong
Raghvendra Rohit, Guang Gong
Efficient and secure software implementations of Fantomas
Rafael J. Cruz, Antonio Guimarães, Diego F. Aranha
Rafael J. Cruz, Antonio Guimarães, Diego F. Aranha
The Power of NIST Cryptographic Tests Suite
Paul Burciu, Emil Simion
Paul Burciu, Emil Simion
Timed-Release Encryption With Master Time Bound Key (Full Version)
Gwangbae Choi, Serge Vaudenay
Gwangbae Choi, Serge Vaudenay
Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases
Igor Semaev, Andrea Tenti
Igor Semaev, Andrea Tenti
Fractional LWE: a nonlinear variant of LWE
Gérald Gavin, Stéphane Bonnevay
Gérald Gavin, Stéphane Bonnevay
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
Thomas Haines, Clementine Gritti
Thomas Haines, Clementine Gritti
Multi-client Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu.
Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu.
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
Michael Yonli
Michael Yonli
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Mehdi Tibouchi, Alexandre Wallet
Mehdi Tibouchi, Alexandre Wallet
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Vasyl Ustimenko
Vasyl Ustimenko
On the optionality and fairness of Atomic Swaps
Runchao Han, Haoyu Lin, Jiangshan Yu
Runchao Han, Haoyu Lin, Jiangshan Yu
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha
Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha
BioID: a Privacy-Friendly Identity Document
Fatih Balli, F. Betül Durak, Serge Vaudenay
Fatih Balli, F. Betül Durak, Serge Vaudenay
New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin
Thomas Pornin
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Patrick Kresmer, Alexander Zeh
Patrick Kresmer, Alexander Zeh
Shielded Computations in Smart Contracts Overcoming Forks
Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
An Adaptive Attack on 2-SIDH
Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti, Lukas Zobernig
Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti, Lukas Zobernig
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Shulman
Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Shulman
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
Mustafa Khairallah
Accelerating V2X Cryptography through Batch Operations
Paul Bottinelli, Robert Lambert
Paul Bottinelli, Robert Lambert
Round Complexity of Byzantine Agreement, Revisited
T-H. Hubert Chan, Rafael Pass, Elaine Shi
T-H. Hubert Chan, Rafael Pass, Elaine Shi
On the alpha value of polynomials in the tower number field sieve algorithm
Aurore Guillevic, Shashank Singh
Aurore Guillevic, Shashank Singh
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
Mahesh Sreekumar Rajasree
Mahesh Sreekumar Rajasree
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication
Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller
Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller
Modifying The Tropical Version of Stickel’s Key Exchange Protocol
Any Muanalifah, Serge˘ı Sergeev
Any Muanalifah, Serge˘ı Sergeev
On the Boomerang Uniformity of some Permutation Polynomials
Marco Calderini, Irene Villa
Marco Calderini, Irene Villa
A Blockchain-Based Access Control Scheme for Smart Grids
Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
Cube-Based Cryptanalysis of Subterranean-SAE
Fukang Liu, Takanori Isobe, Willi Meier
Fukang Liu, Takanori Isobe, Willi Meier
Algebraically Structured LWE, Revisited
Chris Peikert and Zachary Pepin
Chris Peikert and Zachary Pepin
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin
Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
Elias Rohrer, Florian Tschorsch
Elias Rohrer, Florian Tschorsch
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
Daan Leermakers, Boris Skoric
Daan Leermakers, Boris Skoric
ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing
Fei Meng, Mingqiang Wang
Fei Meng, Mingqiang Wang
Count of rotational symmetric bent Boolean functions
Shashi Kant Pandey, P. R. Mishra
Shashi Kant Pandey, P. R. Mishra
Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings
Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan
Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan
Non-Locality and Zero-Knowledge MIPs
Claude Crépeau, Nan Yang
Claude Crépeau, Nan Yang
The Eleventh Power Residue Symbol
Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache
Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
On the Round Complexity of Randomized Byzantine Agreement
Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky
Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky
A Practical Forgery Attack on Lilliput-AE
Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
A Fast Characterization Method for Semi-invasive Fault Injection Attacks
Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek
Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek
Cryptanalysis of Reduced-Round SipHash
Le He, Hongbo Yu
Le He, Hongbo Yu
Another Look at Byzantine Fault Tolerance
Yongge Wang
Yongge Wang
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla
Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla
Key recovery attacks on the Legendre PRFs within the birthday bound
Dmitry Khovratovich
Dmitry Khovratovich
A Tale of Three Signatures: practical attack of ECDSA with wNAF
Gabrielle De Micheli, Rémi Piau, Cécile Pierrot
Gabrielle De Micheli, Rémi Piau, Cécile Pierrot
Machine learning and side channel analysis in a CTF competition
Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich
Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich
A Coin-Free Oracle-Based Augmented Black Box Framework
Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe
Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
Eric Crockett, Christian Paquin, Douglas Stebila
Eric Crockett, Christian Paquin, Douglas Stebila
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains
Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
More results on Shortest Linear Programs
Subhadeep Banik, Yuki Funabiki, Takanori Isobe
Subhadeep Banik, Yuki Funabiki, Takanori Isobe
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Dominic Dams, Jeff Lataille, Rino Sanchez, John Wade
Dominic Dams, Jeff Lataille, Rino Sanchez, John Wade
Reducing the Cost of Implementing AES as a Quantum Circuit
Brandon Langenberg, Hai Pham, Rainer Steinwandt
Brandon Langenberg, Hai Pham, Rainer Steinwandt
A critique of game-based definitions of receipt-freeness for voting
Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth
Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth
Weak-Key Distinguishers for AES
Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
On Designing Lightweight RFID Security Protocols for Medical IoT
Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri
Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
Morteza Adeli, Nasour Bagheri
Morteza Adeli, Nasour Bagheri
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
Ambili K N, Jimmy Jose
Ambili K N, Jimmy Jose
Observations on the DLCT and Absolute Indicators
Anne Canteaut, Lukas Kölsch, Friedrich Wiemer
Anne Canteaut, Lukas Kölsch, Friedrich Wiemer
Improved Heuristics for Short Linear Programs
Quan Quan Tan, Thomas Peyrin
Quan Quan Tan, Thomas Peyrin
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Yuechen Chen, Linru Zhang, Siu-Ming Yiu
Yuechen Chen, Linru Zhang, Siu-Ming Yiu
A Reaction Attack against Cryptosystems based on LRPC Codes
Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, Ko Stoffelen
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, Ko Stoffelen
How to Construct CSIDH on Edwards Curves
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
Improved SIMD Implementation of Poly1305
Sreyosi Bhattacharyya, Palash Sarkar
Sreyosi Bhattacharyya, Palash Sarkar
Practical Cryptanalysis of k-ary C*
Daniel Smith-Tone
Daniel Smith-Tone
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS
Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
Statistical Zap Arguments from Quasi-Polynomial LWE
Abhishek Jain, Zhengzhong Jin
Abhishek Jain, Zhengzhong Jin
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, Benjamin Smith
Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, Benjamin Smith
Optimal Transport Layer for Secure Computation
Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman
Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
Succinct Arguments in the Quantum Random Oracle Model
Alessandro Chiesa, Peter Manohar, Nicholas Spooner
Alessandro Chiesa, Peter Manohar, Nicholas Spooner
AES MixColumn with 92 XOR gates
Alexander Maximov
Alexander Maximov
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC
Ronald Cramer, Matthieu Rambaud, Chaoping Xing
Ronald Cramer, Matthieu Rambaud, Chaoping Xing
Privacy of Stateful RFID Systems with Constant Tag Identifiers
Cristian Hristea, Ferucio Laurentiu Tiplea
Cristian Hristea, Ferucio Laurentiu Tiplea
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Diego F. Aranha, Elena Pagnin
Diego F. Aranha, Elena Pagnin
Batch Binary Weierstrass
Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
Optimal Collision Side-Channel Attacks
Cezary Glowacz, Vincent Grosso
Cezary Glowacz, Vincent Grosso
k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain
Zvi Schreiber
Zvi Schreiber
Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations
Erdinç Öztürk
Erdinç Öztürk
Plaintext Recovery Attacks against XTS Beyond Collisions
Takanori Isobe, Kazuhiko Minematsu
Takanori Isobe, Kazuhiko Minematsu
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Behnaz Rezvani, Flora Coleman, Sachin Sachin, William Diehl
Behnaz Rezvani, Flora Coleman, Sachin Sachin, William Diehl
Securely Sampling Biased Coins with Applications to Differential Privacy
Jeffrey Champion, abhi shelat, Jonathan Ullman
Jeffrey Champion, abhi shelat, Jonathan Ullman
Surveying definitions of coercion resistance
Thomas Haines, Ben Smyth
Thomas Haines, Ben Smyth
Towards Forward Secure Internet Traffic
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow
Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow
Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen
Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions
Tapas Pal, Ratna Dutta
Tapas Pal, Ratna Dutta
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
Mirco Richter
Mirco Richter
A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies
Selçuk Kayacan
Selçuk Kayacan
Faster Subgroup Checks for BLS12-381
Sean Bowe
Sean Bowe
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Alexandros Bakas, Antonis Michalas
Alexandros Bakas, Antonis Michalas
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Chaoyun Li, Bart Preneel
Chaoyun Li, Bart Preneel
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
Jeroen Delvaux
Jeroen Delvaux
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Yosuke Todo, Willi Meier, Kazumaro Aoki
Yosuke Todo, Willi Meier, Kazumaro Aoki
2-Message Publicly Verifiable WI from (Subexponential) LWE
Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
Provable Security for PKI Schemes
Sara Wrótniak, Hemi Leibowitz, Ewa Syta, and Amir Herzberg
Sara Wrótniak, Hemi Leibowitz, Ewa Syta, and Amir Herzberg
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk
Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Saskia Nuñez von Voigt, Florian Tschorsch
Saskia Nuñez von Voigt, Florian Tschorsch
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Claire Delaplace, Andre Esser, Alexander May
Claire Delaplace, Andre Esser, Alexander May
Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
Alexander Maximov, Patrik Ekdahl
Alexander Maximov, Patrik Ekdahl
A Chosen Random Value Attack on WPA3 SAE authentication protocol
Sheng Sun
Sheng Sun
Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations?
Claire Delaplace, Alexander May
Claire Delaplace, Alexander May
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin
Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Kwangsu Lee
Kwangsu Lee
Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$
Douglas Martins, Gustavo Banegas, Ricardo Custodio
Douglas Martins, Gustavo Banegas, Ricardo Custodio
The End of Logic Locking? A Critical View on the Security of Logic Locking
Susanne Engels, Max Hoffmann, Christof Paar
Susanne Engels, Max Hoffmann, Christof Paar
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peter Pessl, Robert Primas
Peter Pessl, Robert Primas
Efficient Cryptography on the RISC-V Architecture
Ko Stoffelen
Ko Stoffelen
On equivalence between known families of quadratic APN functions
Lylia Budaghyan, Marco Calderini, Irene Villa
Lylia Budaghyan, Marco Calderini, Irene Villa
TICK: Tiny Client for Blockchains
Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Zhang, Nan Guan
Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Zhang, Nan Guan
Sublattice Attacks on LWE over Arbitrary Number Field Lattices
Hao Chen
Hao Chen
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
Wei Jiang, Adam Bowers, Dan Lin
Wei Jiang, Adam Bowers, Dan Lin
Relation between o-equivalence and EA-equivalence for Niho bent functions
Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila
Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila
The Impact of Time on DNS Security
Aanchal Malhotra, Willem Toorop, Benno Overeinder, Ralph Dolmans, Sharon Goldberg
Aanchal Malhotra, Willem Toorop, Benno Overeinder, Ralph Dolmans, Sharon Goldberg
Optimized implementation of the NIST PQC submission ROLLO on microcontroller
Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet
Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation
Rebecca Schwerdt, Matthias Nagel, Valerie Fetzer, Tobias Gräf, Andy Rupp
Rebecca Schwerdt, Matthias Nagel, Valerie Fetzer, Tobias Gräf, Andy Rupp
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Yalin Chen, Jue-Sam Chou, Liang-Chun Wang, Yu-Yuan Chou
Yalin Chen, Jue-Sam Chou, Liang-Chun Wang, Yu-Yuan Chou
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Priyadarshi Singh, Abdul Basit, N Chaitanya Kumar, V. Ch. Venkaiah
Priyadarshi Singh, Abdul Basit, N Chaitanya Kumar, V. Ch. Venkaiah
Dissecting the CHES 2018 AES Challenge
Tobias Damm, Sven Freud, Dominik Klein
Tobias Damm, Sven Freud, Dominik Klein
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
Antoine Joux, Cecile Pierrot
Antoine Joux, Cecile Pierrot
BBQ: Using AES in Picnic Signatures
Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart
Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart
Statistical ZAP Arguments
Saikrishna Badrinarayan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai
Saikrishna Badrinarayan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse
Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse
A Composable Security Treatment of the Lightning Network
Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Jörg Schwenk, Douglas Stebila
Jörg Schwenk, Douglas Stebila
Scalable Private Set Union from Symmetric-Key Techniques
Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies
Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar Weippl
Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar Weippl
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
Hamidreza Amini Khorasgani, Hemanta Maji, Tamalika Mukherjee
Hamidreza Amini Khorasgani, Hemanta Maji, Tamalika Mukherjee
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi, Markus Schofnegger
Lorenzo Grassi, Markus Schofnegger
DDH-based Multisignatures with Public Key Aggregation
Duc-Phong Le, Guomin Yang, Ali Ghorbani
Duc-Phong Le, Guomin Yang, Ali Ghorbani
Practical Attacks on Reduced-Round AES
Navid Ghaedi Bardeh, Sondre Rønjom
Navid Ghaedi Bardeh, Sondre Rønjom
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
Distributing any Elliptic Curve Based Protocol
Nigel P. Smart, Younes Talibi Alaoui
Nigel P. Smart, Younes Talibi Alaoui
On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$
Jaeseong Jeong, Chang Heon Kim, Namhun Koo, Soonhak Kwon, Sumin Lee
Jaeseong Jeong, Chang Heon Kim, Namhun Koo, Soonhak Kwon, Sumin Lee
Complexity of Estimating Renyi Entropy of Markov Chains
Maciej Obremski, Maciej Skorski
Maciej Obremski, Maciej Skorski
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
The Adversarial Robustness of Sampling
Omri Ben-Eliezer, Eylon Yogev
Omri Ben-Eliezer, Eylon Yogev
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma
Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma
Verifiable Computing for Approximate Computation
Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park
Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park
Athena: A verifiable, coercion-resistant voting system with linear complexity
Ben Smyth
Ben Smyth
Differential Fault Analysis of NORX
Amit Jana, Dhiman Saha, Goutam Paul
Amit Jana, Dhiman Saha, Goutam Paul
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
Genus 2 Supersingular Isogeny Oblivious Transfer
Ramsès Fernàndez-València
Ramsès Fernàndez-València
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cedric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph Wintersteiger, Santiago Zanella-Beguelin
Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cedric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph Wintersteiger, Santiago Zanella-Beguelin
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
Generic Attacks on Hash Combiners
Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang
Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang
Is it Easier to Prove Theorems that are Guaranteed to be True?
Rafael Pass, Muthuramakrishnan Venkitasubramaniam
Rafael Pass, Muthuramakrishnan Venkitasubramaniam
Design of Anonymous Endorsement System in Hyperledger Fabric
Subhra Mazumdar, Sushmita Ruj
Subhra Mazumdar, Sushmita Ruj
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen
Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic
Thorsten Kleinjung, Benjamin Wesolowski
Thorsten Kleinjung, Benjamin Wesolowski
A Short Note on a Weight Probability Distribution Related to SPNs
Sondre Rønjom
Sondre Rønjom
The privacy of the TLS 1.3 protocol
Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete
Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete
Temporary Censorship Attacks in the Presence of Rational Miners
Fredrik Winzer, Benjamin Herd, Sebastian Faust
Fredrik Winzer, Benjamin Herd, Sebastian Faust
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte
Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte
Public-Key Function-Private Hidden Vector Encryption (and More)
James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova
James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
Vincenzo Iovino
Vincenzo Iovino
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento
Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Yangguang Tian, Yingjiu Li, Robert. H Deng, Binanda Sengupta, Guomin Yang
Yangguang Tian, Yingjiu Li, Robert. H Deng, Binanda Sengupta, Guomin Yang
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps
William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps
Comprehensive Security Analysis of CRAFT
Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, and Nasour Bagheri
Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, and Nasour Bagheri
A Secure Publish/Subscribe Protocol for Internet of Things
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalcin
Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalcin
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Zihao Wei, Siwei Sun, Lei Hu, Man Wei, Joan Boyar, Rene Peralta
Zihao Wei, Siwei Sun, Lei Hu, Man Wei, Joan Boyar, Rene Peralta
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Hao Chen, Ilaria Chillotti, Ling Ren
Hao Chen, Ilaria Chillotti, Ling Ren
SoK of Used Cryptography in Blockchain
Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
From Usability to Secure Computing and Back Again
Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
Compressible FHE with Applications to PIR
Craig Gentry, Shai Halevi
Craig Gentry, Shai Halevi
Fully Homomorphic NIZK and NIWI Proofs
Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya
Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya
On the Complexity of ``Superdetermined'' Minrank Instances
Javier Verbel, John Baena, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone
Javier Verbel, John Baena, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH
Vladimir Soukharev, Basil Hess
Vladimir Soukharev, Basil Hess
Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients
Jingwei Zhang, Shuhong Gao, Chang-An Zhao
Jingwei Zhang, Shuhong Gao, Chang-An Zhao
Verifying Solutions to LWE with Implications for Concrete Security
Palash Sarkar, Subhadip Singha
Palash Sarkar, Subhadip Singha
Iterative Differential Characteristic of TRIFLE-BC
Fukang Liu, Takanori Isobe
Fukang Liu, Takanori Isobe
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
He Gives C-Sieves on the CSIDH
Chris Peikert
Chris Peikert
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
Sebati Ghosh, Palash Sarkar
Sebati Ghosh, Palash Sarkar
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
Neural Network Model Assessment for Side-Channel Analysis
Guilherme Perin, Baris Ege, Lukasz Chmielewski
Guilherme Perin, Baris Ege, Lukasz Chmielewski
Optimized SIKE Round 2 on 64-bit ARM
Hwajeong Seo, Amir Jalali, Reza Azarderakhsh
Hwajeong Seo, Amir Jalali, Reza Azarderakhsh
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Mir Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark Tehranipoor, Navid Asadizanjani
Mir Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark Tehranipoor, Navid Asadizanjani
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
Marina Blanton, Ahreum Kang, Chen Yuan
Marina Blanton, Ahreum Kang, Chen Yuan
Homomorphism learning problems and its applications to public-key cryptography
Christopher Leonardi, Luis Ruiz-Lopez
Christopher Leonardi, Luis Ruiz-Lopez
On the Quantum Complexity of the Continuous Hidden Subgroup Problem
Koen de Boer, Léo Ducas, Serge Fehr
Koen de Boer, Léo Ducas, Serge Fehr
On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage
Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming
Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT
Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang
Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang
Public Ledger for Sensitive Data
Riccardo Longo, Massimiliano Sala
Riccardo Longo, Massimiliano Sala
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
Shay Gueron, Yehuda Lindell
Shay Gueron, Yehuda Lindell
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel, A-Bon Ackie, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
Brian Koziel, A-Bon Ackie, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0
Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan, Guohui Wang
Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan, Guohui Wang
Secure Computation for Cloud data Storage
Davood Rezaeipour
Davood Rezaeipour
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
Luís T. A. N. Brandão, Çağdaş Çalık, Meltem Sönmez Turan, René Peralta
Luís T. A. N. Brandão, Çağdaş Çalık, Meltem Sönmez Turan, René Peralta
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Olivier Blazy, Céline Chevalier, Quoc Huy Vu
Olivier Blazy, Céline Chevalier, Quoc Huy Vu
Endemic Oblivious Transfer
Daniel Masny, Peter Rindal
Daniel Masny, Peter Rindal
Commodity-Based 2PC for Arithmetic Circuits
Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi
Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese
Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
Carolyn Whitnall, Elisabeth Oswald
Carolyn Whitnall, Elisabeth Oswald
Cryptanalysis of Plantlet
Subhadeep Banik, Khashayar Barooti, Takanori Isobe
Subhadeep Banik, Khashayar Barooti, Takanori Isobe
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
Hiroaki Anada
Hiroaki Anada
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki
Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki
Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes
André Chailloux
André Chailloux
A Formal Treatment of Deterministic Wallets
Poulami Das, Sebastian Faust, Julian Loss
Poulami Das, Sebastian Faust, Julian Loss
Breaking ACORN with a Single Fault
Elena Dubrova
Elena Dubrova
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas
Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas
A Unified and Composable Take on Ratcheting
Daniel Jost, Ueli Maurer, Marta Mularczyk
Daniel Jost, Ueli Maurer, Marta Mularczyk
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
Raphael Bost, Pierre-Alain Fouque
Raphael Bost, Pierre-Alain Fouque
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
Erica Blum, Jonathan Katz, Julian Loss
Erica Blum, Jonathan Katz, Julian Loss
Comparing proofs of security for lattice-based encryption
Daniel J. Bernstein
Daniel J. Bernstein
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks
Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
On-Device Power Analysis Across Hardware Security Domains
Colin O'Flynn, Alex Dewar
Colin O'Flynn, Alex Dewar
Better Bootstrapping for Approximate Homomorphic Encryption
Kyoohyung Han, Dohyeong Ki
Kyoohyung Han, Dohyeong Ki
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun
Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Nir Bitansky, Akshay Degwekar
Nir Bitansky, Akshay Degwekar
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Revelio: A MimbleWimble Proof of Reserves Protocol
Arijit Dutta, Saravanan Vijayakumaran
Arijit Dutta, Saravanan Vijayakumaran
The Notion of Transparency Order, Revisited
Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin
Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Alexandros Bakas, Antonis Michalas
Alexandros Bakas, Antonis Michalas
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Maire O’Neill
Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Maire O’Neill
Non-Commutative Ring Learning With Errors From Cyclic Algebras
Charles Grover, Andrew Mendelsohn, Cong Ling, Roope Vehkalahti
Charles Grover, Andrew Mendelsohn, Cong Ling, Roope Vehkalahti
Forgery Attacks on FlexAE and FlexAEAD
Maria Eichlseder, Daniel Kales, and Markus Schofnegger
Maria Eichlseder, Daniel Kales, and Markus Schofnegger
A Modified pqsigRM: RM Code-Based Signature Scheme
Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No
Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No
A Note on Lower Digits Extraction Polynomial for Bootstrapping
Mingjia Huo, Kewen Wu, Qi Ye
Mingjia Huo, Kewen Wu, Qi Ye
Robust and Scalable Consensus for Sharded Distributed Ledgers
Eleftherios Kokoris-Kogias
Eleftherios Kokoris-Kogias
Balance: Dynamic Adjustment of Cryptocurrency Deposits
Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt
Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt
Polar Sampler: A Novel Bernoulli Sampler Using Polar Codes with Application to Integer Gaussian Sampling
Jiabo Wang, Cong Ling
Jiabo Wang, Cong Ling
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu
Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu
A Blockchain-Assisted Hash-Based Signature Scheme
Ahto Buldas, Risto Laanoja, Ahto Truu
Ahto Buldas, Risto Laanoja, Ahto Truu
A Server-Assisted Hash-Based Signature Scheme
Ahto Buldas, Risto Laanoja, Ahto Truu
Ahto Buldas, Risto Laanoja, Ahto Truu
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Vahid Amin Ghafari, Honggang Hu, Fujiang Lin
Vahid Amin Ghafari, Honggang Hu, Fujiang Lin
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Yunwen Liu, Yu Sasaki
Yunwen Liu, Yu Sasaki
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
PPAD-Hardness via Iterated Squaring Modulo a Composite
Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
Zheng Wang, Cong Ling
Zheng Wang, Cong Ling
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Jintai Ding, Pedro Branco, Kevin Schmitt
Jintai Ding, Pedro Branco, Kevin Schmitt
How Diversity Affects Deep-Learning Side-Channel Attacks
Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova
Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova
Can Verifiable Delay Functions be Based on Random Oracles?
Mohammad Mahmoody, Caleb Smith, David J. Wu
Mohammad Mahmoody, Caleb Smith, David J. Wu
Generalized Proofs of Knowledge with Fully Dynamic Setup
Christian Badertscher, Daniel Jost, Ueli Maurer
Christian Badertscher, Daniel Jost, Ueli Maurer
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa
Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
Zheng Wang, Cong Ling
Zheng Wang, Cong Ling
Tight Verifiable Delay Functions
Nico Döttling, Sanjam Garg, Giulio Malavolta, Prashant Nalini Vasudevan
Nico Döttling, Sanjam Garg, Giulio Malavolta, Prashant Nalini Vasudevan
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest
Jun Furukawa, Yehuda Lindell
Jun Furukawa, Yehuda Lindell
Multi-Party PSM, Revisited: Improved Communication and Unbalanced Communication
Leonard Assouline, Tianren Liu
Leonard Assouline, Tianren Liu
SeqL: Secure Scan-Locking for IP Protection
Seetal Potluri, Aydin Aysu, Akash Kumar
Seetal Potluri, Aydin Aysu, Akash Kumar
Visualizing size-security tradeoffs for lattice-based encryption
Daniel J. Bernstein
Daniel J. Bernstein
Concise Linkable Ring Signatures and Forgery Against Adversarial Keys
Brandon Goodell, Sarang Noether, Arthur Blue
Brandon Goodell, Sarang Noether, Arthur Blue
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts
Navid Ghaedi Bardeh, Sondre Rønjom
Navid Ghaedi Bardeh, Sondre Rønjom
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
Muhammad Ishaq, Ana Milanova, Vassilis Zikas
Muhammad Ishaq, Ana Milanova, Vassilis Zikas
Incremental Proofs of Sequential Work
Nico Döttling, Russell W. F. Lai, Giulio Malavolta
Nico Döttling, Russell W. F. Lai, Giulio Malavolta
Txilm: Lossy Block Compression with Salted Short Hashing
Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun
Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun
Efficient Invisible and Unlinkable Sanitizable Signatures
Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
Strong Asymmetric PAKE based on Trapdoor CKEM
Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu
Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
Vipul Goyal, Yanyi Liu, Yifan Song
Vipul Goyal, Yanyi Liu, Yifan Song
Attribute Based Encryption for Deterministic Finite Automata from DLIN
Shweta Agrawal, Monosij Maitra, Shota Yamada
Shweta Agrawal, Monosij Maitra, Shota Yamada
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas
Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler
Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler
Simulation Extractability in Groth's zk-SNARK
Shahla Atapoor, Karim Baghery
Shahla Atapoor, Karim Baghery
On Round Optimal Statistical Zero Knowledge Arguments
Nir Bitansky, Omer Paneth
Nir Bitansky, Omer Paneth
Trapdoor Hash Functions and Their Applications
Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
Cryptographic Sensing
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs
Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs
Homomorphic Time-Lock Puzzles and Applications
Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
New non-linearity parameters of Boolean functions
Igor Semaev
Igor Semaev
Fully Homomorphic Encryption for RAMs
Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs
Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
Cody Freitag, Ilan Komargodski, Rafael Pass
Cody Freitag, Ilan Komargodski, Rafael Pass
ABE for DFA from k-Lin
Junqing Gong, Brent Waters, Hoeteck Wee
Junqing Gong, Brent Waters, Hoeteck Wee
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal, Monosij Maitra, Shota Yamada
Shweta Agrawal, Monosij Maitra, Shota Yamada
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu
Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu
Unconditionally Secure Computation Against Low-Complexity Leakage
Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
Vipul Goyal, Aayush Jain, Amit Sahai
Vipul Goyal, Aayush Jain, Amit Sahai
Public-Key Cryptography in the Fine-Grained Setting
Rio Lavigne, Andrea Lincoln, Virginia Vassilevska Williams
Rio Lavigne, Andrea Lincoln, Virginia Vassilevska Williams
Nonces are Noticed: AEAD Revisited
Mihir Bellare, Ruth Ng, Björn Tackmann
Mihir Bellare, Ruth Ng, Björn Tackmann
Exploring Constructions of Compact NIZKs from Various Assumptions
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Extended Truncated-differential Distinguishers on Round-reduced AES
Zhenzhen Bao, Jian Guo, Eik List
Zhenzhen Bao, Jian Guo, Eik List
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
Bruce Kallick
Bruce Kallick
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Steven D. Galbraith, Lukas Zobernig
Steven D. Galbraith, Lukas Zobernig
Continuous Verifiable Delay Functions
Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
Fukang Liu, Takanori Isobe
Fukang Liu, Takanori Isobe
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
Sebastian Gajek, Marco Lewandowsky
Sebastian Gajek, Marco Lewandowsky
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak
Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Siemen Dhooghe, Svetla Nikova
Siemen Dhooghe, Svetla Nikova
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks
Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas
Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas
Simulation-Extractable SNARKs Revisited
Helger Lipmaa
Helger Lipmaa
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
Thaddeus Dryja
Thaddeus Dryja
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem
Jean-Sebastien Coron, Agnese Gini
Jean-Sebastien Coron, Agnese Gini
CPA-to-CCA Transformation for KDM Security
Fuyuki Kitagawa, Takahiro Matsuda
Fuyuki Kitagawa, Takahiro Matsuda
Symmetric Primitives with Structured Secrets
Navid Alamati, Hart Montgomery, Sikhar Patranabis
Navid Alamati, Hart Montgomery, Sikhar Patranabis
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
An Efficient and Provable Masked Implementation of qTESLA
François Gérard, Mélissa Rossi
François Gérard, Mélissa Rossi
A note on different types of ransomware attacks
Mihail Anghel, Andrei Racautanu
Mihail Anghel, Andrei Racautanu
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan
Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan
How to Delegate Computations Publicly
Yael Kalai, Omer Paneth, Lisa Yang
Yael Kalai, Omer Paneth, Lisa Yang
Continuously Non-Malleable Secret Sharing for General Access Structures
Gianluca Brian, Antonio Faonio, Daniele Venturi
Gianluca Brian, Antonio Faonio, Daniele Venturi
AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system
Ariel Gabizon
Ariel Gabizon
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu
Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
Ivan Damgård, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
Ivan Damgård, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
Partial Secret Sharing
Amir Jafari, Reza Kaboli, Shahram Khazaei
Amir Jafari, Reza Kaboli, Shahram Khazaei
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
Shahram Khazaei
Shahram Khazaei
Discretisation and Product Distributions in Ring-LWE
Sean Murphy, Rachel Player
Sean Murphy, Rachel Player
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Pedro Moreno-Sanchez, Arthur Blue, Duc V. Le, Sarang Noether, Brandon Goodell, Aniket Kate
Pedro Moreno-Sanchez, Arthur Blue, Duc V. Le, Sarang Noether, Brandon Goodell, Aniket Kate
Computing Primitive Idempotents in Finite Commutative Rings and Applications
Mugurel Barcau, Vicentiu Pasol
Mugurel Barcau, Vicentiu Pasol
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
V. Ustimenko, M. Klisowski
V. Ustimenko, M. Klisowski
Statistical Analysis and Anonymity of TOR's Path Selection
Andrei Mogage, Emil Simion
Andrei Mogage, Emil Simion
Simulating Homomorphic Evaluation of Deep Learning Predictions
Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Tighter proofs of CCA security in the quantum random oracle model
Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andreas Hülsing, Edoardo Persichetti
Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andreas Hülsing, Edoardo Persichetti
A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
Formal Notions of Security for Verifiable Homomorphic Encryption
Jakub Klemsa, Ivana Trummová
Jakub Klemsa, Ivana Trummová
Polygraph: Accountable Byzantine Agreement
Pierre Civit, Seth Gilbert, Vincent Gramoli
Pierre Civit, Seth Gilbert, Vincent Gramoli
Simulation-Extractable zk-SNARK with a Single Verification
Jihye Kim, Jiwon Lee, Hyunok Oh
Jihye Kim, Jiwon Lee, Hyunok Oh
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay
Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
Lintao Liu, Xuehu Yan, Yuliang Lu, Huaixi Wang
Lintao Liu, Xuehu Yan, Yuliang Lu, Huaixi Wang
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei
Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Ran Canetti, Alley Stoughton, Mayank Varia
Ran Canetti, Alley Stoughton, Mayank Varia
--Withdrawn--
---
---
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang
Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
Dominic Letz
Dominic Letz
Deep Learning based Side Channel Attacks in Practice
Houssem Maghrebi
Houssem Maghrebi
Improved Multiplication Triple Generation over Rings via RLWE-based AHE
Deevashwer Rathee, Thomas Schneider, K. K. Shukla
Deevashwer Rathee, Thomas Schneider, K. K. Shukla
On Group-Characterizability of Homomorphic Secret Sharing Schemes
Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
On Abelian and Homomorphic Secret Sharing Schemes
Amir Jafari, Shahram Khazaei
Amir Jafari, Shahram Khazaei
Subliminal channels in post-quantum digital signature schemes
Herman Galteland, Kristian Gjøsteen
Herman Galteland, Kristian Gjøsteen
Security of the Suffix Keyed Sponge
Christoph Dobraunig, Bart Mennink
Christoph Dobraunig, Bart Mennink
On the Commitment Capacity of Unfair Noisy Channels
Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento
Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento
Multi-Party Virtual State Channels
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Daan van der Valk, Stjepan Picek
Daan van der Valk, Stjepan Picek
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng
Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng
Post Quantum ECC on FPGA Platform
Debapriya Basu Roy, Debdeep Mukhopadhyay
Debapriya Basu Roy, Debdeep Mukhopadhyay
(Linkable) Ring Signature from Hash-Then-One-Way Signature
Xingye Lu, Man Ho Au, Zhenfei Zhang
Xingye Lu, Man Ho Au, Zhenfei Zhang
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty
Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart
Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart
Verification of Authenticated Firmware Load
Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray
Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Omer Shlomovits, István András Seres
Omer Shlomovits, István András Seres
Towards More Secure Constructions of Adjustable Join Schemes
Shahram Khazaei, Mojtaba Rafiee
Shahram Khazaei, Mojtaba Rafiee
Faster Bootstrapping of FHE over the integers with large prime message space
Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang
Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang
Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$
Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager
Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables
Evgeny K. Alekseev, Lyudmila A. Kushchinskaya
Evgeny K. Alekseev, Lyudmila A. Kushchinskaya
How to not break SIDH
Chloe Martindale, Lorenz Panny
Chloe Martindale, Lorenz Panny
Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Gideon Samid
Gideon Samid
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree
Georgios Fotiadis, Chloe Martindale
Georgios Fotiadis, Chloe Martindale
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen, Eran Lambooij, Bart Mennink
Yu Long Chen, Eran Lambooij, Bart Mennink
Towards post-quantum symmetric cryptography
John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec
John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee
Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee
A note on the correlations between NIST cryptographic statistical tests suite
Emil Simion, Paul Burciu
Emil Simion, Paul Burciu
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
Srinath Setty
Srinath Setty
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir
Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
About Wave Implementation and its Leakage Immunity
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
Linearly-Homomorphic Signatures and Scalable Mix-Nets
Chloé Hébant, Duong Hieu Phan, David Pointcheval
Chloé Hébant, Duong Hieu Phan, David Pointcheval
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
David Cerezo Sánchez
David Cerezo Sánchez
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborti, Shivam Bhasin, Debdeep Mukhopadhyay
Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborti, Shivam Bhasin, Debdeep Mukhopadhyay
Evaluation of Code-based Signature Schemes
Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto
Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto
TMPS: Ticket-Mediated Password Strengthening
John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sonmez Turan
John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sonmez Turan
Formally Verified Cryptographic Web Applications in WebAssembly
Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan
Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
James Shook, Scott Simon, Peter Mell
James Shook, Scott Simon, Peter Mell
A chosen key attack against the secret S-boxes of GOST
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Cryptanalysis of FlexAEAD
Mostafizar Rahman, Dhiman Saha, Goutam Paul
Mostafizar Rahman, Dhiman Saha, Goutam Paul
On Perfect Endomorphic Ciphers
Nikolay Shenets
Nikolay Shenets
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, and Robert Primas
Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, and Robert Primas
SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe, Amir Jalali, Reza Azarderakhsh
Hwajeong soe, Amir Jalali, Reza Azarderakhsh
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark Tehranipoor
Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark Tehranipoor
Stopping time signatures for some algorithms in cryptography
Percy Deift, Stephen D. Miller, Thomas Trogdon
Percy Deift, Stephen D. Miller, Thomas Trogdon
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
Carsten Baum, Ariel Nof
Carsten Baum, Ariel Nof
How to Correct Errors in Multi-Server PIR
Kaoru Kurosawa
Kaoru Kurosawa
Speed-up of SCA attacks on 32-bit multiplications
Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Pedro Branco, Manuel Goulão, Paulo Mateus
Pedro Branco, Manuel Goulão, Paulo Mateus
Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)
Xavier Bonnetain, Léo Perrin, Shizhu Tian
Xavier Bonnetain, Léo Perrin, Shizhu Tian
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Olamide Omolola, Paul Plessing
Olamide Omolola, Paul Plessing
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
Cas Cremers, Dennis Jackson
Cas Cremers, Dennis Jackson
Misuse Attacks on Post-Quantum Cryptosystems
Ciprian Băetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay
Ciprian Băetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
Secret-Sharing from Robust Conditional Disclosure of Secrets
Amos Beimel, Naty Peter
Amos Beimel, Naty Peter
Fully Homomorphic Encryption with k-bit Arithmetic Operations
Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu
Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu
A Note on Sub-Gaussian Random Variables
Benjamin M. Case, Colin Gallagher, Shuhong Gao
Benjamin M. Case, Colin Gallagher, Shuhong Gao
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Christopher Patton, Thomas Shrimpton
Christopher Patton, Thomas Shrimpton
Fast Database Joins and PSI for Secret Shared Data
Payman Mohassel, Peter Rindal, Mike Rosulek
Payman Mohassel, Peter Rindal, Mike Rosulek
Mobile Private Contact Discovery at Scale
Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
CellTree: A New Paradigm for Distributed Data Repositories
Anasuya Acharya, Manoj Prabhakaran, Akash Trehan
Anasuya Acharya, Manoj Prabhakaran, Akash Trehan
A Countermeasure Against Statistical Ineffective Fault Analysis
Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu
Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu
Pixel: Multi-signatures for Consensus
Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
New Code-Based Privacy-Preserving Cryptographic Constructions
Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng
Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu
Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
New Slide Attacks on Almost Self-Similar Ciphers
Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu
Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu
Simple Schemes in the Bounded Storage Model
Jiaxin Guan, Mark Zhandry
Jiaxin Guan, Mark Zhandry
Forward Security with Crash Recovery for Secure Logs
Erik-Oliver Blass and Guevara Noubir
Erik-Oliver Blass and Guevara Noubir
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Thorben Moos, Felix Wegener, Amir Moradi
Thorben Moos, Felix Wegener, Amir Moradi
Afgjort: A Partially Synchronous Finality Layer for Blockchains
Thomas Dinsdale-Young, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
Thomas Dinsdale-Young, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
A refined analysis of the cost for solving LWE via uSVP
Shi Bai, Shaun Miller, Weiqiang Wen
Shi Bai, Shaun Miller, Weiqiang Wen
Optimal Merging in Quantum k-xor and k-sum Algorithms
María Naya-Plasencia, André Schrottenloher
María Naya-Plasencia, André Schrottenloher
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster
Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Michael Naehrig, Joost Renes
Michael Naehrig, Joost Renes
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren
Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren
Forward and Backward-Secure Range-Searchable Symmetric Encryption
Jiafan Wang, Sherman S. M. Chow
Jiafan Wang, Sherman S. M. Chow
Non-malleability for quantum public-key encryption
Christian Majenz, Christian Schaffner, Jeroen van Wier
Christian Majenz, Christian Schaffner, Jeroen van Wier
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Marc Joye
Marc Joye
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
Evaluating the effectiveness of heuristic worst-case noise analysis in FHE
Anamaria Costache, Kim Laine, Rachel Player
Anamaria Costache, Kim Laine, Rachel Player
Decisional second-preimage resistance: When does SPR imply PRE?
Daniel J. Bernstein, Andreas Hülsing
Daniel J. Bernstein, Andreas Hülsing
Best Information is Most Successful
Eloi de Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida
Eloi de Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida
Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
Ward Beullens
Ward Beullens
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4
Leon Botros, Matthias J. Kannwischer, Peter Schwabe
Leon Botros, Matthias J. Kannwischer, Peter Schwabe
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
Alan Kaminsky
From Single-Input to Multi-Client Inner-Product Functional Encryption
Michel Abdalla, Fabrice Benhamouda, Romain Gay
Michel Abdalla, Fabrice Benhamouda, Romain Gay
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
Suhyeon Lee, Seungjoo Kim
Suhyeon Lee, Seungjoo Kim
A taxonomy of pairings, their security, their complexity
Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam
Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam
New Number-Theoretic Cryptographic Primitives
Eric Brier, Houda Ferradi, Marc Joye, David Naccache
Eric Brier, Houda Ferradi, Marc Joye, David Naccache
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert
Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert
Tiny WireGuard Tweak
Jacob Appelbaum, Chloe Martindale, Peter Wu
Jacob Appelbaum, Chloe Martindale, Peter Wu
An Efficient and Compact Reformulation of NIST Collision Estimate Test
Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
Karim Baghery
Extended 3-Party ACCE and Application to LoRaWAN 1.1
Sébastien Canard, Loïc Ferreira
Sébastien Canard, Loïc Ferreira
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy, James Howe, Neil Smyth, Seamus Brannigan, Máire O’Neill
Sarah McCarthy, James Howe, Neil Smyth, Seamus Brannigan, Máire O’Neill
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter
Cas Cremers, Britta Hale, Konrad Kohbrok
Cas Cremers, Britta Hale, Konrad Kohbrok
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef
Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef
Dual-Mode NIZKs from Obfuscation
Dennis Hofheinz, Bogdan Ursu
Dennis Hofheinz, Bogdan Ursu
A Method to Reduce the Key Size of UOV Signature Scheme
Chengdong Tao
Chengdong Tao
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
Niek J. Bouman, Niels de Vreede
Niek J. Bouman, Niels de Vreede
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan
Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem
Alessandro Budroni, Andrea Tenti
Alessandro Budroni, Andrea Tenti
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Clément Massart, François-Xavier Standaert
Clément Massart, François-Xavier Standaert
Privacy-Preserving K-means Clustering with Multiple Data Owners
Jung Hee Cheon, Jinhyuck Jeong, Dohyeong Ki, Jiseung Kim, Joohee Lee, Seok Won Lee
Jung Hee Cheon, Jinhyuck Jeong, Dohyeong Ki, Jiseung Kim, Joohee Lee, Seok Won Lee
Towards a Practical Cluster Analysis over Encrypted Data
Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park
Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park
The complexity of MinRank
Alessio Caminata, Elisa Gorla
Alessio Caminata, Elisa Gorla
In Pursuit of Clarity In Obfuscation
Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes
Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes
Physical Security of Deep Learning on Edge Devices: Comprehensive Evaluation of Fault Injection Attack Vectors
Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu
Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
Gaëtan Leurent, Thomas Peyrin
Gaëtan Leurent, Thomas Peyrin
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
Forgery Attack on mixFeed in the Nonce-Misuse Scenario
Mustafa Khairallah
Mustafa Khairallah
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan
Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu
João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung
Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms, Elizabeth A. Quaglia
Lydia Garms, Elizabeth A. Quaglia
A Central Limit Framework for Ring-LWE Noise Analysis
Sean Murphy and Rachel Player
Sean Murphy and Rachel Player
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti, Olivier Pereira, François-Xavier Standaert
Francesco Berti, Olivier Pereira, François-Xavier Standaert
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou
Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou
Limits to Non-Malleability
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier
Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah
Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Gildas Avoine, Sébastien Canard, Loïc Ferreira
Gildas Avoine, Sébastien Canard, Loïc Ferreira
Contingent payments on a public ledger: models and reductions for automated verification
Sergiu Bursuc, Steve Kremer
Sergiu Bursuc, Steve Kremer
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
Sabyasachi Karati, Reihaneh Safavi-Naini
Sabyasachi Karati, Reihaneh Safavi-Naini
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loïc Masure, Cécile Dumas, Emmanuel Prouff
Loïc Masure, Cécile Dumas, Emmanuel Prouff
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti
Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti
Efficient coding for secure computing with additively-homomorphic encrypted data
Thijs Veugen
Thijs Veugen
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
Benjamin Dowling, Paul Rösler, Jörg Schwenk
Benjamin Dowling, Paul Rösler, Jörg Schwenk
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin, Chi Cheng, Jintai Ding
Yue Qin, Chi Cheng, Jintai Ding
Masking Fuzzy-Searchable Public Databases
Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle, Julian Renner
Julien Lavauzelle, Julian Renner
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic, Simon Masson, Emmanuel Thomé
Aurore Guillevic, Simon Masson, Emmanuel Thomé
Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions
Guangpu Gao, Dongdai Lin, Wenfen Liu, Yongjuan Wang
Guangpu Gao, Dongdai Lin, Wenfen Liu, Yongjuan Wang
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh
Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
Improved Secure Integer Comparison via Homomorphic Encryption
Florian Bourse, Olivier Sanders, Jacques Traoré
Florian Bourse, Olivier Sanders, Jacques Traoré
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
Homomorphic Training of 30,000 Logistic Regression Models
Flavio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
Flavio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
Preimage Security of KNOT-Hash
Raghvendra Rohit
Raghvendra Rohit
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Peter T. Breuer
Peter T. Breuer
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
Alexander Moch, Eik List
Alexander Moch, Eik List
Continuing to reflect on TLS 1.3 with external PSK
Liliya Akhmetzyanova, Evgeny Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov
Liliya Akhmetzyanova, Evgeny Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov
Improving Speed of Dilithium’s Signing Procedure
Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin
Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
Sharing of Encrypted files in Blockchain Made Simpler
S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan
S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan
Numerical Method for Comparison on Homomorphically Encrypted Numbers
Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
How many transactions per second can bitcoin really handle ? Theoretically.
Evangelos Georgiadis
Evangelos Georgiadis
Refinement and Verification of CBC Casper
Ryuya Nakamura, Takayuki Jimba, Dominik Harz
Ryuya Nakamura, Takayuki Jimba, Dominik Harz
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Itai Dinur
Itai Dinur
On the complexity of the Permuted Kernel Problem
Eliane KOUSSA, Gilles MACARIO-RAT, Jacques PATARIN
Eliane KOUSSA, Gilles MACARIO-RAT, Jacques PATARIN
Exploring the Monero Peer-to-Peer Network
Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Verissimo
Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Verissimo
Policy-Based Sanitizable Signatures
Kai Samelin, Daniel Slamanig
Kai Samelin, Daniel Slamanig
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
Houda Ferradi, Keita Xagawa
Houda Ferradi, Keita Xagawa
Forgery Attack on SNEIKEN
Mustafa Khairallah
Mustafa Khairallah
Privacy-Preserving Network Path Validation
Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng
Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens
Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
Kazuhiko Minematsu
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby, Dan Boneh
Riad S. Wahby, Dan Boneh
ILC: A Calculus for Composable, Computational Cryptography
Kevin Liao, Matthew A. Hammer, Andrew Miller
Kevin Liao, Matthew A. Hammer, Andrew Miller
Side-Channel assessment of Open Source Hardware Wallets
Manuel San Pedro, Victor Servant, Charles Guillemet
Manuel San Pedro, Victor Servant, Charles Guillemet
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi, Mehdi Tibouchi
Akira Takahashi, Mehdi Tibouchi
Inception makes non-malleable codes shorter as well!
Divesh Aggarwal, Maciej Obremski
Divesh Aggarwal, Maciej Obremski
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
Feistel Structures for MPC, and More
Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou, Roberto Tamassia
Evangelia Anna Markatou, Roberto Tamassia
Full Database Reconstruction with Access and Search Pattern Leakage
Evangelia Anna Markatou, Roberto Tamassia
Evangelia Anna Markatou, Roberto Tamassia
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore, Benoit Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
Vincent Migliore, Benoit Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence
Itay Berman, Iftach Haitner, Eliad Tsfadia
Itay Berman, Iftach Haitner, Eliad Tsfadia
New Conditional Cube Attack on Keccak Keyed Modes
Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier
Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
Biswabandan Panda
Biswabandan Panda
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Michael Specter, Sunoo Park, Matthew Green
Michael Specter, Sunoo Park, Matthew Green
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Sauvik Bhattacharya, Oscar Garcia-Morchon, Rachel Player, Ludo Tolhuizen
Sauvik Bhattacharya, Oscar Garcia-Morchon, Rachel Player, Ludo Tolhuizen
Towards Secret-Free Security
Ulrich Rührmair
Ulrich Rührmair
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin
Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt
Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt
Miller Inversion is Easy for the Reduced Tate Pairing on Supersingular Curves of Embedding Degree Two and Three
Takakazu Satoh
Takakazu Satoh
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
Mathy Vanhoef, Eyal Ronen
Mathy Vanhoef, Eyal Ronen
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Daniel Gardham, Mark Manulis
Daniel Gardham, Mark Manulis
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Chen-Dong Ye, Tian Tian
Chen-Dong Ye, Tian Tian
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Kazumasa Shinagawa, Koji Nuida
Kazumasa Shinagawa, Koji Nuida
Non-Malleable Codes for Decision Trees
Marshall Ball, Siyao Guo, Daniel Wichs
Marshall Ball, Siyao Guo, Daniel Wichs
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu, Mark Manulis
Jia Liu, Mark Manulis
Lower Bounds for Oblivious Near-Neighbor Search
Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo
Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo
SELL v1.0: Searchable Encrypted Logging Library
Amir Jalali, Neil Davenport
Amir Jalali, Neil Davenport
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters
Xavier Bultel, Pascal Lafourcade
Xavier Bultel, Pascal Lafourcade
Probability 1 Iterated Differential in the SNEIK Permutation
Léo Perrin
Léo Perrin
Lelantus: A New Design for Anonymous and Confidential Cryptocurrencies
Aram Jivanyan
Aram Jivanyan
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
Adding Linkability to Ring Signatures with One-Time Signatures
Xueli Wang, Yu Chen, Xuecheng Ma
Xueli Wang, Yu Chen, Xuecheng Ma
Indifferentiability for Public Key Cryptosystems
Mark Zhandry, Cong Zhang
Mark Zhandry, Cong Zhang
On the EA-classes of known APN functions in small dimensions
Marco Calderini
Marco Calderini
Strong Post-Compromise Secure Proxy Re-Encryption
Alex Davidson, Amit Deo, Ela Lee, Keith Martin
Alex Davidson, Amit Deo, Ela Lee, Keith Martin
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
Triggerflow: Regression Testing by Advanced Execution Path Inspection
Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
Fully Secure Attribute-Based Encryption for $t$-CNF from LWE
Rotem Tsabary
Rotem Tsabary
Everybody's a Target: Scalability in Public-Key Encryption
Benedikt Auerbach, Federico Giacon, Eike Kiltz
Benedikt Auerbach, Federico Giacon, Eike Kiltz
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
Alisa Cherniaeva, Ilia Shirobokov, Alexander Davydov
Alisa Cherniaeva, Ilia Shirobokov, Alexander Davydov
On polynomial secret sharing schemes
Anat Paskin-Chernivasky, Artiom Radune
Anat Paskin-Chernivasky, Artiom Radune
SoK: Layer-Two Blockchain Protocols
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Leo Weissbart, Stjepan Picek, Lejla Batina
Leo Weissbart, Stjepan Picek, Lejla Batina
Lattice-based proof of a shuffle
Núria Costa, Ramiro Martínez, Paz Morillo
Núria Costa, Ramiro Martínez, Paz Morillo
Ad Hoc Multi-Input Functional Encryption
Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, Justin Thaler
Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, Justin Thaler
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
Anubhab Baksi, Dhiman Saha, Sumanta Sarkar
Anubhab Baksi, Dhiman Saha, Sumanta Sarkar
Benchmarking Privacy Preserving Scientific Operations
Abdelrahaman Aly, Nigel P. Smart
Abdelrahaman Aly, Nigel P. Smart
A Faster Constant-time Algorithm of CSIDH keeping Two Points
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka
Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka
Forward Secrecy of SPAKE2
Jose Becerra, Dimiter Ostrev, Marjan Skrobot
Jose Becerra, Dimiter Ostrev, Marjan Skrobot
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski
Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES
Felix Wegener, Lauren De Meyer, Amir Moradi
Felix Wegener, Lauren De Meyer, Amir Moradi
Efficient and Scalable Universal Circuits
Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
Selfie: reflections on TLS 1.3 with PSK
Nir Drucker, Shay Gueron
Nir Drucker, Shay Gueron
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
Christophe Clavier, Leo Reynaud, Antoine Wurcker
Christophe Clavier, Leo Reynaud, Antoine Wurcker
Second-order Scatter Attack
Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker
Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
Aurelien Vasselle, Antoine Wurcker
Aurelien Vasselle, Antoine Wurcker
LightChain: A DHT-based Blockchain for Resource Constrained Environments
Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap
Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap
MixEth: efficient, trustless coin mixing service for Ethereum
István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi
István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Antoine Wurcker
Antoine Wurcker
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito, Takeshi Sugawara
Yusuke Naito, Takeshi Sugawara
Garbled Neural Networks are Practical
Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski
Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
DEEP-FRI: Sampling Outside the Box Improves Soundness
Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf
Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf
Examining the Practical Side Channel Resilience of ARX-boxes
Yan Yan and Elisabeth Oswald
Yan Yan and Elisabeth Oswald
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition
Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova
Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova
Key-and-Argument-Updatable QA-NIZKs
Helger Lipmaa
Helger Lipmaa
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung
Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors
Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
Practical Supersingular Isogeny Group Key Agreement
Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
Doubly half-injective PRGs for incompressible white-box cryptography
Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels
Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels
On the Difficulty of Hiding the Balance of Lightning Network Channels
Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro
Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Gembu Ito, Tetsu Iwata
Gembu Ito, Tetsu Iwata
Shorter Pairing-based Arguments under Standard Assumptions
Alonso Gonzalez, Carla Rafols
Alonso Gonzalez, Carla Rafols
An Efficient Private Evaluation of a Decision Graph
Hiroki Sudo, Koji Nuida, Kana Shimizu
Hiroki Sudo, Koji Nuida, Kana Shimizu
A Traceable Ring Signature Scheme based on Coding Theory
Pedro Branco, Paulo Mateus
Pedro Branco, Paulo Mateus
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
Sabyasachi Dutta, Kouichi Sakurai
Sabyasachi Dutta, Kouichi Sakurai
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
Horizontal Collision Correlation Attack on Elliptic Curves
Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
PGC: Pretty Good Decentralized Confidential Payment System with Auditability
Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Boyu Ni, Xiaoyang Dong
Boyu Ni, Xiaoyang Dong
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song
Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song
Extended Affine and CCZ Equivalence up to Dimension 4
Marcus Brinkmann
Marcus Brinkmann
Blockchains from Non-Idealized Hash Functions
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
Optimal Bounded-Collusion Secure Functional Encryption
Prabhanjan Ananth, Vinod Vaikuntanathan
Prabhanjan Ananth, Vinod Vaikuntanathan
A SAT-based approach for index calculus on binary elliptic curves
Monika Trimoska, Sorina Ionica, Gilles Dequen
Monika Trimoska, Sorina Ionica, Gilles Dequen
Side-Channel Analysis of the TERO PUF
Lars Tebelmann, Michael Pehl, Vincent Immler
Lars Tebelmann, Michael Pehl, Vincent Immler
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering
A Formal Approach to Secure Speculation
Kevin Cheang, Cameron Rasmussen, Sanjit Seshia, Pramod Subramanyan
Kevin Cheang, Cameron Rasmussen, Sanjit Seshia, Pramod Subramanyan
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots
Jean-Sebastien Coron, Luca Notarnicola
Jean-Sebastien Coron, Luca Notarnicola
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova
Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Kwang Ho Kim, Sihem Mesnager
Kwang Ho Kim, Sihem Mesnager
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields
Madhurima Mukhopadhyay, Palash Sarkar
Madhurima Mukhopadhyay, Palash Sarkar
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier
Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier
Ternary Syndrome Decoding with Large Weight
Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne
Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne
Analysis of TPL Signature Scheme
Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo
Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo
A Survey of Leakage-Resilient Cryptography
Yael Tauman Kalai, Leonid Reyzin
Yael Tauman Kalai, Leonid Reyzin
Safe Compilation for Encrypted Computing
Peter T. Breuer, Simon Pickin
Peter T. Breuer, Simon Pickin
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer
Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer
A Generic Construction of Revocable Identity-Based Encryption
Xuecheng Ma, Dongdai Lin
Xuecheng Ma, Dongdai Lin
Improved Classical Cryptanalysis of SIKE in Practice
Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
Towards Optimized and Constant-Time CSIDH on Embedded Devices
Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck, Thomas Decru, Benjamin Smith
Wouter Castryck, Thomas Decru, Benjamin Smith
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio
Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio
Impossibility of Strong KDM Security with Auxiliary Input
Cody Freitag, Ilan Komargodski, Rafael Pass
Cody Freitag, Ilan Komargodski, Rafael Pass
Timing attacks on Error Correcting Codes in Post-Quantum Schemes
Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi
Philippe Loubet Moundi
Cryptanalysis of ForkAES
Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
On the construction of S-boxes using the leaders and followers metaheuristic
Alejandro Freyre-Echevarría, Ismel Martínez-Díaz
Alejandro Freyre-Echevarría, Ismel Martínez-Díaz
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk, S. M. Koniushok, M. V. Poremskyi
A. N. Alekseychuk, S. M. Koniushok, M. V. Poremskyi
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Yindong Chen, Fei Guo, Liu Zhang
Yindong Chen, Fei Guo, Liu Zhang
SpaceFlip : Unbound Geometry Cryptography
Gideon Samid
Gideon Samid
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm
Dimitrios Poulakis
Dimitrios Poulakis
A Framework for Cryptographic Problems from Linear Algebra
Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann, Adria Gascon, Mariana Raykova, Benny Pinkas
Phillipp Schoppmann, Adria Gascon, Mariana Raykova, Benny Pinkas
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
Sam Kim
Sam Kim
A Note on Key Agreement and Non-Interactive Commitments
Alex Lombardi, Luke Schaeffer
Alex Lombardi, Luke Schaeffer
Uncovering Algebraic Structures in the MPC Landscape
Navneet Agarwal, Sanat Anand, Manoj Prabhakaran
Navneet Agarwal, Sanat Anand, Manoj Prabhakaran
On the boomerang uniformity of quadratic permutations
Sihem Mesnager, Chunming Tang, Maosheng Xiong
Sihem Mesnager, Chunming Tang, Maosheng Xiong
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains
Erik-Oliver Blass, Florian Kerschbaum
Erik-Oliver Blass, Florian Kerschbaum
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar
M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue
Elaine Shi
Elaine Shi
Compressing Vector OLE
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
Quantum Security Analysis of AES
Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
Jintai Ding, Chi Cheng, Yue Qin
Jintai Ding, Chi Cheng, Yue Qin
Sync HotStuff: Simple and Practical Synchronous State Machine Replication
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin
Digital Signatures for Consensus
Sergey Gorbunov, Hoeteck Wee
Sergey Gorbunov, Hoeteck Wee
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*
Sergei Bauer, Martin Brunner, Peter Schartner
Sergei Bauer, Martin Brunner, Peter Schartner
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein, Bo-Yin Yang
Daniel J. Bernstein, Bo-Yin Yang
TEX - A Securely Scalable Trustless Exchange
Rami Khalil, Arthur Gervais, Guillaume Felley
Rami Khalil, Arthur Gervais, Guillaume Felley
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Jiaping Wang, Hao Wang
Jiaping Wang, Hao Wang
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu, Mark Zhandry
Qipeng Liu, Mark Zhandry
Forward-Secure Multi-Signatures
Manu Drijvers, Gregory Neven
Manu Drijvers, Gregory Neven
A Modular Treatment of Blind Signatures from Identification Schemes
Eduard Hauck, Eike Kiltz, and Julian Loss
Eduard Hauck, Eike Kiltz, and Julian Loss
A Practical Method to Recover Exact Superpoly in Cube Attack
SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, TaiRong Shi
SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, TaiRong Shi
Tight Time-Memory Trade-offs for Symmetric Encryption
Joseph Jaeger, Stefano Tessaro
Joseph Jaeger, Stefano Tessaro
Uncloneable Quantum Encryption via Oracles
Anne Broadbent, Sébastien Lord
Anne Broadbent, Sébastien Lord
DLCT: A New Tool for Differential-Linear Cryptanalysis
Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick
Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick
Founding Secure Computation on Blockchains
Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
Reversible Proofs of Sequential Work
Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
Consensus through Herding
T-H. Hubert Chan, Rafael Pass, Elaine Shi
T-H. Hubert Chan, Rafael Pass, Elaine Shi
Function-Dependent Commitments from Homomorphic Authenticators
Lucas Schabhüser, Denis Butin, Johannes Buchmann
Lucas Schabhüser, Denis Butin, Johannes Buchmann
Revisiting Variable Output Length XOR Pseudorandom Function
Srimanta Bhattacharya, Mridul Nandi
Srimanta Bhattacharya, Mridul Nandi
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach
Ting Li, Yao Sun
Ting Li, Yao Sun
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo, Alex B. Grilo, Stacey Jeffery, Thomas Vidick
Andrea Coladangelo, Alex B. Grilo, Stacey Jeffery, Thomas Vidick
Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr, Chen Yuan
Serge Fehr, Chen Yuan
Distributed Differential Privacy via Shuffling
Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev
Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev
Attacks Only Get Better: How to Break FF3 on Large Domains
Viet Tung Hoang, David Miller, Ni Trieu
Viet Tung Hoang, David Miller, Ni Trieu
4-Round Luby-Rackoff Construction is a qPRP: Tight Quantum Security Bound
Akinori Hosoyamada, Tetsu Iwata
Akinori Hosoyamada, Tetsu Iwata
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu
Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu
Efficient Circuit-based PSI with Linear Communication
Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai
Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Vipul Goyal, Yifan Song
Vipul Goyal, Yifan Song
Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce, Peter Rindal, Mike Rosulek
Adam Groce, Peter Rindal, Mike Rosulek
Robust Encryption, Extended
Rémi Géraud, David Naccache, Răzvan Roşie
Rémi Géraud, David Naccache, Răzvan Roşie
Optimal Oblivious Priority Queues
Zahra Jafargholi, Kasper Green Larsen, Mark Simkin
Zahra Jafargholi, Kasper Green Larsen, Mark Simkin
Designated-verifier pseudorandom generators, and their applications
Geoffroy Couteau, Dennis Hofheinz
Geoffroy Couteau, Dennis Hofheinz
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach, Ron D. Rothblum, Daniel Wichs
Willy Quach, Ron D. Rothblum, Daniel Wichs
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas, Maxime Plançon, Benjamin Wesolowski
Léo Ducas, Maxime Plançon, Benjamin Wesolowski
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
Nuttapong Attrapadung
Nuttapong Attrapadung
On Quantum Advantage in Information Theoretic Single-Server PIR
Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath
Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath
Secret-Sharing Schemes for General and Uniform Access Structures
Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, and Naty Peter
Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, and Naty Peter
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
XOR-counts and lightweight multiplication with fixed elements in binary finite fields
Lukas Kölsch
Lukas Kölsch
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Nimrod Aviram, Kai Gellert, Tibor Jager
Nimrod Aviram, Kai Gellert, Tibor Jager
Securing Update Propagation with Homomorphic Hashing
Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen Weis
Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen Weis
Flyclient: Super-Light Clients for Cryptocurrencies
Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani
Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani
Leakage Resilience of the Duplex Construction
Christoph Dobraunig, Bart Mennink
Christoph Dobraunig, Bart Mennink
Compact Adaptively Secure ABE for NC1 from k-Lin
Lucas Kowalczyk, Hoeteck Wee
Lucas Kowalczyk, Hoeteck Wee
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan
Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan
(R)CCA Secure Updatable Encryption with Integrity Protection
Michael Klooß, Anja Lehmann, Andy Rupp
Michael Klooß, Anja Lehmann, Andy Rupp
Group Signatures without NIZK: From Lattices in the Standard Model
Shuichi Katsumata, Shota Yamada
Shuichi Katsumata, Shota Yamada
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen
Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen
Nitro Protocol
Tom Close
Tom Close
Computational Limitations in Robust Classification and Win-Win Results
Akshay Degwekar, Vinod Vaikuntanathan
Akshay Degwekar, Vinod Vaikuntanathan
A family of boolean functions with good cryptographic properties
Guillermo Sosa Gómez, Octavio Paez Osuna
Guillermo Sosa Gómez, Octavio Paez Osuna
Round Optimal Secure Multiparty Computation from Minimal Assumptions
Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
Approx-SVP in Ideal Lattices with Pre-processing
Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
Four-Round Secure Multiparty Computation from General Assumptions
Michele Ciampi, Rafail Ostrovsky
Michele Ciampi, Rafail Ostrovsky
On ELFs, Deterministic Encryption, and Correlated-Input Security
Mark Zhandry
Mark Zhandry
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
Hossein Oraei, Massoud Hadian Dehkordi
Hossein Oraei, Massoud Hadian Dehkordi
MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k}
Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli
Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki
Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li, Kai Hu, Meiqin Wang
Muzhou Li, Kai Hu, Meiqin Wang
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru, Tim Wood
Dragos Rotaru, Tim Wood
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald
James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald
A note on isogeny-based hybrid verifiable delay functions
Barak Shani
Barak Shani
The Security of All Private-key Bits in Isogeny-based Schemes
Barak Shani
Barak Shani
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
Osman Bicer, Alptekin Kupcu
Osman Bicer, Alptekin Kupcu
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek, Fermi Ma, Mark Zhandry
James Bartusek, Fermi Ma, Mark Zhandry
DL-Extractable UC-Commitment Schemes
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
Degree 2 is Complete for the Round-Complexity of Malicious MPC
Benny Applebaum, Zvika Brakerski, Rotem Tsabary
Benny Applebaum, Zvika Brakerski, Rotem Tsabary
Password-Authenticated Public-Key Encryption
Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
Esteban Landerreche, Marc Stevens, Christian Schaffner
Esteban Landerreche, Marc Stevens, Christian Schaffner
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee
Classical zero-knowledge arguments for quantum computations
Thomas Vidick, Tina Zhang
Thomas Vidick, Tina Zhang
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
An Omission-Tolerant Cryptographic Checksum
Francisco Corella, Karen Lewison
Francisco Corella, Karen Lewison
Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh
Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis
Yaoling Ding, An Wang, Siu Ming YIU
Yaoling Ding, An Wang, Siu Ming YIU
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
Fully homomorphic encryption modulo Fermat numbers
Antoine Joux
Antoine Joux
Re-thinking untraceability in the CryptoNote-style blockchain
Jiangshan Yu, Man Ho Allen Au, Paulo Esteves-Verissimo
Jiangshan Yu, Man Ho Allen Au, Paulo Esteves-Verissimo
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon
William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
Katherine E. Stange
Security is an Architectural Design Constraint
Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin
Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin
Lower Bounds for Leakage-Resilient Secret Sharing
Jesper Buus Nielsen, Mark Simkin
Jesper Buus Nielsen, Mark Simkin
Disco: Modern Session Encryption
David Wong
David Wong
Synchronous, with a Chance of Partition Tolerance
Yue Guo, Rafael Pass, Elaine Shi
Yue Guo, Rafael Pass, Elaine Shi
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness
Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan
Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan
Genus Two Isogeny Cryptography
E. V. Flynn, Yan Bo Ti
E. V. Flynn, Yan Bo Ti
Homomorphic Encryption for Finite Automata
Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh, Mark Simkin
Satrajit Ghosh, Mark Simkin
Towards an Exponential Lower Bound for Secret Sharing
Kasper Green Larsen, Mark Simkin
Kasper Green Larsen, Mark Simkin
Shorter Quadratic QA-NIZK Proofs
Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva
Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu
Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong
Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
Profiling Side-channel Analysis in the Efficient Attacker Framework
Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley
Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley
Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks
Shuwen Deng, Wenjie Xiong, Jakub Szefer
Shuwen Deng, Wenjie Xiong, Jakub Szefer
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso
Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso
libInterMAC: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson, Marcel Keller, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin
Hendrik Eerikson, Marcel Keller, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert
A New Blockchain Proposal Supporting Multi-Stage Proof-of-Work
Palash Sarkar
Palash Sarkar
Understanding Optimizations and Measuring Performances of PBKDF2
Andrea Francesco Iuorio, Andrea Visconti
Andrea Francesco Iuorio, Andrea Visconti
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
MPC with Synchronous Security and Asynchronous Responsiveness
Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi
Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert, Sina Shiehian
Chris Peikert, Sina Shiehian
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Paulo S. L. M. Barreto, Marcos A. Simplicio Jr., Jefferson E. Ricardini, Harsh Kupwade Patil
Paulo S. L. M. Barreto, Marcos A. Simplicio Jr., Jefferson E. Ricardini, Harsh Kupwade Patil
Efficient Constructions for Almost-everywhere Secure Computation
Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas
Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas
Constant-time BCH Error-Correcting Code
Matthew Walters, Sujoy Sinha Roy
Matthew Walters, Sujoy Sinha Roy
FastKitten: Practical Smart Contracts on Bitcoin
Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon
Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon
Solving binary MQ with Grover's algorithm
Peter Schwabe, Bas Westerbaan
Peter Schwabe, Bas Westerbaan
QcBits: Constant-Time Small-Key Code-Based Cryptography
Tung Chou
Tung Chou
Improved Lattice-based CCA2-Secure PKE in the Standard Model
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang
On the efficiency of pairing-based proofs under the d-PKE
Ariel Gabizon
Ariel Gabizon
Practical Collision Attacks against Round-Reduced SHA-3
Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song
Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song
Boomerang Connectivity Table Revisited
Ling Song, Xianrui Qin, Lei Hu
Ling Song, Xianrui Qin, Lei Hu
Achieving GWAS with Homomorphic Encryption
Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung
Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung
Modeling Power Efficiency of S-boxes Using Machine Learning
Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay
Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli, Dario Fiore, and Anaïs Querol
Matteo Campanelli, Dario Fiore, and Anaïs Querol
A General Proof Framework for Recent AES Distinguishers
Christina Boura, Anne Canteaut, Daniel Coggia
Christina Boura, Anne Canteaut, Daniel Coggia
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Jinhyun So, Basak Guler, A. Salman Avestimehr, Payman Mohassel
Jinhyun So, Basak Guler, A. Salman Avestimehr, Payman Mohassel
Vulnerability and Remedy of Stripped Function Logic Locking
Hai Zhou, Yuanqi Shen, Amin Rezaei
Hai Zhou, Yuanqi Shen, Amin Rezaei
Unifying Leakage Models on a Rényi Day
Thomas Prest, Dahmun Goudarzi, Ange Martinelli, Alain Passelègue
Thomas Prest, Dahmun Goudarzi, Ange Martinelli, Alain Passelègue
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Divisible E-Cash from Constrained Pseudo-Random Functions
Florian Bourse, David Pointcheval, Olivier Sanders
Florian Bourse, David Pointcheval, Olivier Sanders
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park, Adam Sealfon
Sunoo Park, Adam Sealfon
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
Vasyl Ustimenko
Vasyl Ustimenko
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert
Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert
Secure Evaluation of Quantized Neural Networks
Anders Dalskov, Daniel Escudero, Marcel Keller
Anders Dalskov, Daniel Escudero, Marcel Keller
Are Certificate Thumbprints Unique?
Greg Zaverucha, Dan Shumow
Greg Zaverucha, Dan Shumow
Homomorphic Secret Sharing from Lattices Without FHE
Elette Boyle, Lisa Kohl, Peter Scholl
Elette Boyle, Lisa Kohl, Peter Scholl
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
Junichi Tomida
Junichi Tomida
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta, Mridul Nandi, Suprita Talnikar
Avijit Dutta, Mridul Nandi, Suprita Talnikar
New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT
AmirHossein E. Moghaddam, Zahra Ahmadian
AmirHossein E. Moghaddam, Zahra Ahmadian
Combinatorial Primality Test
Maheswara Rao Valluri
Maheswara Rao Valluri
Anomalous Look at Provable Security
Douglas Wikström
Douglas Wikström
Security of Multilinear Galois Mode (MGM)
Liliya Akhmetzyanova, Evgeny Alekseev, Grigory Karpunin, Vladislav Nozdrunov
Liliya Akhmetzyanova, Evgeny Alekseev, Grigory Karpunin, Vladislav Nozdrunov
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes
Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry
Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry
Anonymous Attestation for IoT
Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry
Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
Keita Xagawa
Keita Xagawa
On the security of the BCTV Pinocchio zk-SNARK variant
Ariel Gabizon
Ariel Gabizon
Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Non-Interactive Keyed-Verification Anonymous Credentials
Geoffroy Couteau, Michael Reichle
Geoffroy Couteau, Michael Reichle
Multi-Key Homomophic Encryption from TFHE
Hao Chen, Ilaria Chillotti, Yongsoo Song
Hao Chen, Ilaria Chillotti, Yongsoo Song
Distributional Collision Resistance Beyond One-Way Functions
Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev
Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Rosario Gennaro, Steven Goldfeder
Rosario Gennaro, Steven Goldfeder
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Ferucio Laurentiu Tiplea, Cristian Hristea
Ferucio Laurentiu Tiplea, Cristian Hristea
Variable Elimination - a Tool for Algebraic Cryptanalysis
Bjørn Greve, Øyvind Ytrehus, Håvard Raddum
Bjørn Greve, Øyvind Ytrehus, Håvard Raddum
On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials
Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi
Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
Minicrypt Primitives with Algebraic Structure and Applications
Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy
Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
Identity-Based Higncryption
Hongbing Wang, Yunlei Zhao
Hongbing Wang, Yunlei Zhao
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio, Daniele Venturi
Antonio Faonio, Daniele Venturi
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
Naomi Farley, Robert Fitzpatrick, Duncan Jones
Naomi Farley, Robert Fitzpatrick, Duncan Jones
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques, John M. Schanck
Samuel Jaques, John M. Schanck
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal, Amr M. Youssef
Hisham S. Galal, Amr M. Youssef
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramon Troncoso-Pastoriza
Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramon Troncoso-Pastoriza
Power Analysis on NTRU Prime
Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang
Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Pedro Branco
Pedro Branco
Linearly equivalent S-boxes and the Division Property
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin
On Recovering Affine Encodings in White-Box Implementations
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud
Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Aron Gohr, Sven Jacob, Werner Schindler
Aron Gohr, Sven Jacob, Werner Schindler
Key Encapsulation Mechanism From Modular Multivariate Linear Equations
Muhammad Rezal Kamel Ariffin, Abderrahmane Nitaj, Yanbin Pan, Nur Azman Abu
Muhammad Rezal Kamel Ariffin, Abderrahmane Nitaj, Yanbin Pan, Nur Azman Abu
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
Léo Perrin
Efficient Zero-Knowledge for NP from Secure Two-Party Computation
Li Hongda, Pan Dongxue, Ni Peifang
Li Hongda, Pan Dongxue, Ni Peifang
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
The General Sieve Kernel and New Records in Lattice Reduction
Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
Continuous Key Agreement with Reduced Bandwidth
Nir Drucker, Shay Gueron
Nir Drucker, Shay Gueron
The Secure Link Prediction Problem
Laltu Sardar, Sushmita Ruj
Laltu Sardar, Sushmita Ruj
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
George Teseleanu
George Teseleanu
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Kramer, Patrick Longa, Jefferson E. Ricardini
Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Kramer, Patrick Longa, Jefferson E. Ricardini
An Information Obfuscation Calculus for Encrypted Computing
Peter T. Breuer
Peter T. Breuer
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
Zhen Liu, Yanbin Pan, Zhenfei Zhang
Zhen Liu, Yanbin Pan, Zhenfei Zhang
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn, Kai Samelin, Christoph Striecks
Stephan Krenn, Kai Samelin, Christoph Striecks
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Aner Ben Efraim, Michael Nielsen, Eran Omri
Aner Ben Efraim, Michael Nielsen, Eran Omri
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
Testing the Randomness of Cryptographic Function Mappings
Alan Kaminsky
Alan Kaminsky
Pairing Implementation Revisited
Michael Scott
Michael Scott
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain, Junwei Wang
Matthieu Rivain, Junwei Wang
Assessment of the Key-Reuse Resilience of NewHope
Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu
Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
Cristian Hristea, Ferucio Laurentiu Tiplea
Cristian Hristea, Ferucio Laurentiu Tiplea
ZeroCT: Improving ZeroCoin with Confidential Transactions and more
Alex Vazquez
Alex Vazquez
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong
Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt
Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt
Quantum Indistinguishability of Random Sponges
Jan Czajkowski, Andreas Hülsing, Christian Schaffner
Jan Czajkowski, Andreas Hülsing, Christian Schaffner
Sampling the Integers with Low Relative Error
Michael Walter
Michael Walter
Managing Your Kleptographic Subscription Plan
George Teseleanu
George Teseleanu
Publicly Verifiable Proofs from Blockchains
Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Jan Camenisch, Manu Drijvers, Björn Tackmann
Jan Camenisch, Manu Drijvers, Björn Tackmann
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Keita Emura, Takuya Hayashi
Keita Emura, Takuya Hayashi
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov
Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov
Additively Homomorphic IBE from Higher Residuosity
Michael Clear, Ciaran McGoldrick
Michael Clear, Ciaran McGoldrick
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou
Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou
Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou
Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou
Tightly secure hierarchical identity-based encryption
Roman Langrehr, Jiaxin Pan
Roman Langrehr, Jiaxin Pan
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
Obfuscating simple functionalities from knowledge assumptions
Ward Beullens, Hoeteck Wee
Ward Beullens, Hoeteck Wee
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
Sandro Coretti, Antonio Faonio, Daniele Venturi
Sandro Coretti, Antonio Faonio, Daniele Venturi
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, Francois Dassance, Guillaume Dufresne, Cecile Dumas, Emmanuel Prouff, Alexandre Venelli
Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, Francois Dassance, Guillaume Dufresne, Cecile Dumas, Emmanuel Prouff, Alexandre Venelli
A New Code-based Signature Scheme with Shorter Public Key
Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu
Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
Haodong Jiang, Zhenfeng Zhang, Zhi Ma
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu
Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
The Relationship between the Construction and Solution of the MILP Models and Applications
Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang
Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Eyal Kushilevitz, Tamer Mour
Eyal Kushilevitz, Tamer Mour
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri
Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec, Bart Preneel
Alan Szepieniec, Bart Preneel
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Ryo Nishimaki, Takashi Yamakawa
Ryo Nishimaki, Takashi Yamakawa
Toha Key Hardened Function
Ahmad Almorabea
Ahmad Almorabea
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo, Thomas Johansson, Alexander Nilsson
Qian Guo, Thomas Johansson, Alexander Nilsson
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
Lisa Kohl
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
Bartosz Zoltak
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky, Gregor Seiler
Vadim Lyubashevsky, Gregor Seiler
Fully Invisible Protean Signatures Schemes
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge, Puwen Wei
Aijun Ge, Puwen Wei
Improving Attacks on Round-Reduced Speck32/64 using Deep Learning
Aron Gohr
Aron Gohr
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata, Shota Yamada
Shuichi Katsumata, Shota Yamada
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Carsten Baum, Daniele Cozzo, Nigel P. Smart
Carsten Baum, Daniele Cozzo, Nigel P. Smart
A Formal Treatment of Hardware Wallets
Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias
Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang, Xiong Fan, Feng-Hao Liu
Zhedong Wang, Xiong Fan, Feng-Hao Liu
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith, Jake Massimo, Kenneth G. Paterson
Steven Galbraith, Jake Massimo, Kenneth G. Paterson
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang, Zhenfeng Zhang
Ke Wang, Zhenfeng Zhang
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia, Chunming Tang, Yanhua Zhang
Huiwen Jia, Chunming Tang, Yanhua Zhang
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator
Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator
Group Signatures with Selective Linkability
Lydia Garms, Anja Lehmann
Lydia Garms, Anja Lehmann
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth, Yoshikazu Hanatani
Ben Smyth, Yoshikazu Hanatani
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang
Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou, Shu-Mei Hsu
Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou, Shu-Mei Hsu
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner, Nadia Heninger
Joachim Breitner, Nadia Heninger
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl
Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl
CryptoNote+
Ilya Aldanov
Ilya Aldanov
Decentralizing Inner-Product Functional Encryption
Michel Abdalla, Fabrice Benhamouda, Markulf Kolhweiss, Hendrik Waldner
Michel Abdalla, Fabrice Benhamouda, Markulf Kolhweiss, Hendrik Waldner
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach
Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen, Shengli Liu, Dawu Gu
Yunhua Wen, Shengli Liu, Dawu Gu
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song
Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage
Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin, Thomas Prest
Thomas Pornin, Thomas Prest
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan
Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan
The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks
Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee
Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa, Claudio Valencia, Julio López
Rodrigo Abarzúa, Claudio Valencia, Julio López
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren
Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann, Matthias Krause
Matthias Hamann, Matthias Krause
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone, Rafael Pass, abhi shelat
Antonio Marcedone, Rafael Pass, abhi shelat
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le
Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu, Yang Xie, Abhishek Charkraborty, Ankur Srivastava
Yuntao Liu, Yang Xie, Abhishek Charkraborty, Ankur Srivastava
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang, Qiong Huang
Jianye Huang, Qiong Huang
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas
Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas
Accountable Tracing Signatures from Lattices
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
Function Private Predicate Encryption for Low Min-Entropy Predicates
Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna
Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations
NingBo Li, TanPing Zhou, XiaoYuan Yang, YiLiang Han, Longfei Liu, WenChao Liu
NingBo Li, TanPing Zhou, XiaoYuan Yang, YiLiang Han, Longfei Liu, WenChao Liu
Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE)
Ran Canetti, Alex Lombardi, Daniel Wichs
Ran Canetti, Alex Lombardi, Daniel Wichs
qSCMS: Post-quantum certificate provisioning process for V2X
Paulo S. L. M. Barreto, Jefferson E. Ricardini, Marcos A. Simplicio Jr., Harsh Kupwade Patil
Paulo S. L. M. Barreto, Jefferson E. Ricardini, Marcos A. Simplicio Jr., Harsh Kupwade Patil
Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution
Dat Le Tien, Frank Eliassen
Dat Le Tien, Frank Eliassen
Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics
Jung Hee Cheon, Andrey Kim, Donggeon Yhee
Jung Hee Cheon, Andrey Kim, Donggeon Yhee
Fully Deniable Interactive Encryption
Ran Canetti, Sunoo Park, Oxana Poburinnaya
Ran Canetti, Sunoo Park, Oxana Poburinnaya
BoxDB: Realistic Adversary Model for Distance Bounding
Ioana Boureanu, David Gerault, Pascal Lafourcade
Ioana Boureanu, David Gerault, Pascal Lafourcade
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
Nicolas T. Courtois
Nicolas T. Courtois
Universally Composable Accumulators
Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov
Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov
Jevil's Encryption Systems
Nadim Kobeissi
Nadim Kobeissi
Proof-of-Stake Sidechains
Peter Gaži, Aggelos Kiayias, Dionysis Zindros
Peter Gaži, Aggelos Kiayias, Dionysis Zindros
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
Sum-of-Squares Meets Program Obfuscation, Revisited
Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai
Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich
Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
Key Assignment Scheme with Authenticated Encryption
Suyash Kandele, Souradyuti Paul
Suyash Kandele, Souradyuti Paul
Certificate Transparency Using Blockchain
D S V Madala, Mahabir Prasad Jhanwar, Anupam Chattopadhyay
D S V Madala, Mahabir Prasad Jhanwar, Anupam Chattopadhyay
Post-quantum verifiable random functions from ring signatures
Endre Abraham
Endre Abraham
Pooled Mining Makes Selfish Mining Tricky
Suhyeon Lee, Seungjoo Kim
Suhyeon Lee, Seungjoo Kim
On Some Computational Problems in Local Fields
Yingpu Deng, Lixia Luo, Guanju Xiao
Yingpu Deng, Lixia Luo, Guanju Xiao
Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic
Marina Blanton, Chen Yuan
Marina Blanton, Chen Yuan
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
Louis Cianciullo, Hossein Ghodosi
Louis Cianciullo, Hossein Ghodosi
Boolean Exponent Splitting
Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos
Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen
Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups
Essam Ghadafi
Essam Ghadafi
Error Amplification in Code-based Cryptography
Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner
Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner
Implementing Token-Based Obfuscation under (Ring) LWE
Cheng Chen, Nicholas Genise, Daniele Micciancio, Yuriy Polyakov, Kurt Rohloff
Cheng Chen, Nicholas Genise, Daniele Micciancio, Yuriy Polyakov, Kurt Rohloff
Using the Cloud to Determine Key Strengths -- Triennial Update
M. Delcourt, T. Kleinjung, A. K. Lenstra, S. Nath, D. Page, N. Smart
M. Delcourt, T. Kleinjung, A. K. Lenstra, S. Nath, D. Page, N. Smart
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model
Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi
Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
Tomer Ashur, Raluca Posteuca
Tomer Ashur, Raluca Posteuca
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications
Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
Changing Points in APN Functions
Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay Kaleyski
Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay Kaleyski
This is Not an Attack on Wave
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves
Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park, Seokhie Hong
Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park, Seokhie Hong
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon
Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Yevhenii ZOTKIN, Francis OLIVIER, Eric BOURBAO
Yevhenii ZOTKIN, Francis OLIVIER, Eric BOURBAO
Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols
Itai Dinur, Niv Nadler
Itai Dinur, Niv Nadler
Countering Block Withholding Attack Effciently
Suhyeon Lee, Seungjoo Kim
Suhyeon Lee, Seungjoo Kim
MProve: A Proof of Reserves Protocol for Monero Exchanges
Arijit Dutta, Saravanan Vijayakumaran
Arijit Dutta, Saravanan Vijayakumaran
Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
Min Liang
Min Liang
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications
Jun Xu, Santanu Sarkar, Lei Hu
Jun Xu, Santanu Sarkar, Lei Hu
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
Nicolas Sendrier, Valentin Vasseur
Nicolas Sendrier, Valentin Vasseur
ARPA Whitepaper
Derek Zhang, Alex Su, Felix Xu, Jiang Chen
Derek Zhang, Alex Su, Felix Xu, Jiang Chen
Cryptanalysis of a code-based one-time signature
Jean-Christophe Deneuville, Philippe Gaborit
Jean-Christophe Deneuville, Philippe Gaborit
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Antonis Michalas
Antonis Michalas
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh
Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh
Subversion in Practice: How to Efficiently Undermine Signatures
Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow
Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow
On a Rank-Metric Code-Based Cryptosystem with Small Key Size
Julian Renner, Sven Puchinger, Antonia Wachter-Zeh
Julian Renner, Sven Puchinger, Antonia Wachter-Zeh
Quantum Equivalence of the DLP and CDHP for Group Actions
Steven Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren
Steven Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren
On Lions and Elligators: An efficient constant-time implementation of CSIDH
Michael Meyer, Fabio Campos, Steffen Reith
Michael Meyer, Fabio Campos, Steffen Reith
Automated software protection for the masses against side-channel attacks
NICOLAS BELLEVILLE, DAMIEN COUROUSSÉ, KARINE HEYDEMANN, HENRI-PIERRE CHARLES
NICOLAS BELLEVILLE, DAMIEN COUROUSSÉ, KARINE HEYDEMANN, HENRI-PIERRE CHARLES
Gradient Visualization for General Characterization in Profiling Attacks
Loïc Masure, Cécile Dumas, Emmanuel Prouff
Loïc Masure, Cécile Dumas, Emmanuel Prouff
M&M: Masks and Macs against Physical Attacks
Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
On Degree-d Zero-Sum Sets of Full Rank
Christof Beierle, Alex Biryukov, Aleksei Udovenko
Christof Beierle, Alex Biryukov, Aleksei Udovenko
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata
Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata
Durandal: a rank metric based signature scheme
Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor
Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor
Cryptanalysis of 2-round KECCAK-384
Rajendra Kumar, Nikhil Mittal, Shashank Singh
Rajendra Kumar, Nikhil Mittal, Shashank Singh
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)
Sanjit Chatterjee, Sayantan Mukherjee
Sanjit Chatterjee, Sayantan Mukherjee
The Role of the Adversary Model in Applied Security Research
Quang Do, Ben Martini, Kim-Kwang Raymond Choo
Quang Do, Ben Martini, Kim-Kwang Raymond Choo
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
Dan Boneh, Benedikt Bünz, Ben Fisch
Dan Boneh, Benedikt Bünz, Ben Fisch
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
Kai Hu, Meiqin Wang
Kai Hu, Meiqin Wang
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets
Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba
Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba
Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity
Nasser Alsalami, Bingsheng Zhang
Nasser Alsalami, Bingsheng Zhang
Lossy Trapdoor Permutations with Improved Lossiness
Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen
Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen
Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes
Fangguo Zhang, Zhuoran Zhang
Fangguo Zhang, Zhuoran Zhang
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe
Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendoerfer
Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendoerfer
Lattice-Based Signature from Key Consensus
Leixiao Cheng, Boru Gong, Yunlei Zhao
Leixiao Cheng, Boru Gong, Yunlei Zhao
Elliptic Curves in Generalized Huff's Model
Ronal Pranil Chand, Maheswara Rao Valluri
Ronal Pranil Chand, Maheswara Rao Valluri
Pseudo-Free Families of Computational Universal Algebras
Mikhail Anokhin
Mikhail Anokhin
Excalibur Key-Generation Protocols For DAG Hierarchic Decryption
Louis Goubin, Geraldine Monsalve, Juan Reutter, Francisco Vial Prado
Louis Goubin, Geraldine Monsalve, Juan Reutter, Francisco Vial Prado
Downgradable Identity-based Encryption and Applications
Olivier Blazy, Paul Germouty, Duong Hieu Phan
Olivier Blazy, Paul Germouty, Duong Hieu Phan
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik
Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik
A Comparison of NTRU Variants
John M. Schanck
John M. Schanck
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion
Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang
Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang
Toward RSA-OAEP without Random Oracles
Nairen Cao, Adam O'Neill, Mohammad Zaheri
Nairen Cao, Adam O'Neill, Mohammad Zaheri
Placing Conditional Disclosure of Secrets in the Communication Complexity Universe
Benny Applebaum, Prashant Nalini Vasudevan
Benny Applebaum, Prashant Nalini Vasudevan
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, Cong Zuo
Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, Cong Zuo
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan
Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan
Keeping Time-Release Secrets through Smart Contracts
Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang
Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang
Identity-Concealed Authenticated Encryption and Key Exchange
Yunlei Zhao
Yunlei Zhao
Can you sign a quantum state
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
More on sliding right
Joachim Breitner
Joachim Breitner
On the Concrete Security of Goldreich’s Pseudorandom Generator
Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
Adaptively Secure MPC with Sublinear Communication Complexity
Ran Cohen, abhi shelat, Daniel Wichs
Ran Cohen, abhi shelat, Daniel Wichs
Algebraic normal form of a bent function: properties and restrictions
Natalia Tokareva
Natalia Tokareva
Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions
Sihem Mesnager, Kwang Ho Kim, Myong Song Jo
Sihem Mesnager, Kwang Ho Kim, Myong Song Jo
Adversarially Robust Property Preserving Hash Functions
Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan
Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan
Special Soundness Revisited
Douglas Wikström
Douglas Wikström
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS
Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption
Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
Leakage Resilient Secret Sharing and Applications
Akshayaram Srinivasan, Prashant Nalini Vasudevan
Akshayaram Srinivasan, Prashant Nalini Vasudevan
Dfinity Consensus, Explored
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren
Improvements of Blockchain’s Block Broadcasting:An Incentive Approach
Qingzhao Zhang, Yijun Leng, Lei Fan
Qingzhao Zhang, Yijun Leng, Lei Fan
Analysis Of The Simulatability Of An Oblivious Transfer
Bing Zeng
Bing Zeng
Quantum-secure message authentication via blind-unforgeability
Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
Changhai Ou, Chengju Zhou, Siew-Kei Lam
Changhai Ou, Chengju Zhou, Siew-Kei Lam
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Divesh Aggarwal, Ivan Damgard, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, Mark Simkin
Divesh Aggarwal, Ivan Damgard, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, Mark Simkin
Functional Analysis Attacks on Logic Locking
Deepak Sirone, Pramod Subramanyan
Deepak Sirone, Pramod Subramanyan
Privacy Computing: Concept, Computing Framework And Future Development Trends
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
Revisiting Non-Malleable Secret Sharing
Saikrishna Badrinarayanan, Akshayaram Srinivasan
Saikrishna Badrinarayanan, Akshayaram Srinivasan
A new SNOW stream cipher called SNOW-V
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
Factoring Products of Braids via Garside Normal Form
Simon-Philipp Merz, Christophe Petit
Simon-Philipp Merz, Christophe Petit
Fast Authentication from Aggregate Signatures with Improved Security
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
Efficient Fully-Leakage Resilient One-More Signature Schemes
Antonio Faonio
Antonio Faonio
Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications
Kexin Hu, Zhenfeng Zhang, Kaiven Guo
Kexin Hu, Zhenfeng Zhang, Kaiven Guo
Leakage-Resilient Secret Sharing
Ashutosh Kumar, Raghu Meka, Amit Sahai
Ashutosh Kumar, Raghu Meka, Amit Sahai
Genus 2 curves with given split Jacobian
Jasper Scholten
Jasper Scholten
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains
Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson
Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
Vamshi Krishna Kammadanam, Virendra R. Sule, Yi Hong
Vamshi Krishna Kammadanam, Virendra R. Sule, Yi Hong
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake
Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas
Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan
Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
Ashwin Jha, Mridul Nandi
Ashwin Jha, Mridul Nandi
On Kilian's Randomization of Multilinear Map Encodings
Jean-Sebastien Coron, Hilder V. L. Pereira
Jean-Sebastien Coron, Hilder V. L. Pereira
Direct Anonymous Attestation with Optimal TPM Signing Efficiency
Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi
Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi
Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
P. Arun Babu, Jithin Jose Thomas
P. Arun Babu, Jithin Jose Thomas
Lightweight AE and HASH in a Single Round Function
Dingfeng Ye, Danping Shi, Peng Wang
Dingfeng Ye, Danping Shi, Peng Wang
Verifying liquidity of Bitcoin contracts
Massimo Bartoletti, Roberto Zunino
Massimo Bartoletti, Roberto Zunino
Secure Opportunistic Multipath Key Exchange
Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu
Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Stjepan Picek, Annelie Heuser, Lichao Wu, Cesare Alippi, Francesco Regazzoni
Stjepan Picek, Annelie Heuser, Lichao Wu, Cesare Alippi, Francesco Regazzoni
Improved Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa
Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa
An Analysis of the ProtonMail Cryptographic Architecture
Nadim Kobeissi
Nadim Kobeissi
Organizational Cryptography for Access Control
Masahito Gotaishi, Shigeo Tsujii
Masahito Gotaishi, Shigeo Tsujii
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Matthias Fitzi, Peter Ga{ž}i, Aggelos Kiayias, Alexander Russell
Matthias Fitzi, Peter Ga{ž}i, Aggelos Kiayias, Alexander Russell
Non-Interactive Non-Malleability from Quantum Supremacy
Yael Tauman Kalai, Dakshita Khurana
Yael Tauman Kalai, Dakshita Khurana
A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
Felix Wegener, Amir Moradi
Felix Wegener, Amir Moradi
Fly, you fool! Faster Frodo for the ARM Cortex-M4
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
Group Signature without Random Oracles from Randomizable Signatures
Remi Clarisse, Olivier Sanders
Remi Clarisse, Olivier Sanders
Lightweight Circuits with Shift and Swap
Subhadeep Banik, Francesco Regazzoni, Serge Vaudenay
Subhadeep Banik, Francesco Regazzoni, Serge Vaudenay
Private Function Evaluation with Cards
Alexander Koch, Stefan Walzer
Alexander Koch, Stefan Walzer
DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung, Tzu-Wei Chao
Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung, Tzu-Wei Chao
Cryptanalysis of the Wave Signature Scheme
Paulo S. L. M. Barreto, Edoardo Persichetti
Paulo S. L. M. Barreto, Edoardo Persichetti
Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
Faster SeaSign signatures through improved rejection sampling
Thomas Decru, Lorenz Panny, Frederik Vercauteren
Thomas Decru, Lorenz Panny, Frederik Vercauteren
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang
Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang
Further observations on SIMON and SPECK families of block ciphers
S. M. Dehnavi
S. M. Dehnavi
P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection
Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt
Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt
Proof-of-Stake Protocols for Privacy-Aware Blockchains
Chaya Ganesh, Claudio Orlandi, Daniel Tschudi
Chaya Ganesh, Claudio Orlandi, Daniel Tschudi
Tropical cryptography II: extensions by homomorphisms
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
Some Properties of Modular Addition
Victoria Vysotskaya
Victoria Vysotskaya
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi
Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
Lunzhi Deng
Lunzhi Deng
Correction to "Improving the DGK comparison protocol"
Thijs Veugen
Thijs Veugen
SoK: Modular and Efficient Private Decision Tree Evaluation
Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives
Tomer Ashur, Siemen Dhooghe
Tomer Ashur, Siemen Dhooghe
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
Michael Schliep, Nicholas Hopper
Michael Schliep, Nicholas Hopper
On Finding Quantum Multi-collisions
Qipeng Liu, Mark Zhandry
Qipeng Liu, Mark Zhandry
Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
Wen-Ran Zhang
Wen-Ran Zhang
Match Me if You Can: Matchmaking Encryption and its Applications
Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
Felix Wegener, Christian Baiker, Amir Moradi
Felix Wegener, Christian Baiker, Amir Moradi
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Plaintext Recovery Attack of OCB2
Tetsu Iwata
Tetsu Iwata
On the impact of decryption failures on the security of LWE/LWR based schemes
Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
High-speed Side-channel-protected Encryption and Authentication in Hardware
Nele Mentens, Vojtech Miskovsky, Martin Novotny, Jo Vliegen
Nele Mentens, Vojtech Miskovsky, Martin Novotny, Jo Vliegen
Breaking the confidentiality of OCB2
Bertram Poettering
Bertram Poettering
Two Party Distribution Testing: Communication and Security
Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki
Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Vitaly Kiryukhin
Vitaly Kiryukhin
A Deep Dive into Blockchain Selfish Mining
Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong
Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong
Private Stateful Information Retrieval
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
An Algebraic Method to Recover Superpolies in Cube Attacks
Chen-Dong Ye, Tian Tian
Chen-Dong Ye, Tian Tian
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
Yiwen Gao, Yongbin Zhou, Wei Cheng
Yiwen Gao, Yongbin Zhou, Wei Cheng
Analysis of Deterministic Longest-Chain Protocols
Elaine Shi
Elaine Shi
Two Round Information-Theoretic MPC with Malicious Security
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers
Hart Montgomery
Hart Montgomery
Game Theoretic Notions of Fairness in Multi-Party Coin Toss
Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi
Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
Jannis Bossert, Eik List, Stefan Lucks
Jannis Bossert, Eik List, Stefan Lucks
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
Felix Wegener, Amir Moradi
Felix Wegener, Amir Moradi
Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping
Jung Hee Cheon, Kyoohyung Han, Minki Hhan
Jung Hee Cheon, Kyoohyung Han, Minki Hhan
Construction of MDS Matrices from Generalized Feistel Structures
Mahdi Sajadieh, Mohsen Mousavi
Mahdi Sajadieh, Mohsen Mousavi
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
A New Batch FHE Scheme over the Integers
Kwak Wi Song, Kim Chol Un
Kwak Wi Song, Kim Chol Un
Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering
Eshan Chattopadhyay, Xin Li
Eshan Chattopadhyay, Xin Li
Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience
Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
On Quantum Slide Attacks
Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
Akinori Hosoyamada, Takashi Yamakawa
Akinori Hosoyamada, Takashi Yamakawa
Homomorphic Secret Sharing for Low Degree Polynomials
Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
Nithyashankari Gummidipoondi Jayasankaran, Adriana Sanabria Borbon, Edgar Sanchez-Sinencio, Jiang Hu, Jeyavijayan Rajendran
Nithyashankari Gummidipoondi Jayasankaran, Adriana Sanabria Borbon, Edgar Sanchez-Sinencio, Jiang Hu, Jeyavijayan Rajendran
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
Mashael AlSabah, Gabriele Oligeri, Ryan Riley
Mashael AlSabah, Gabriele Oligeri, Ryan Riley
DAGsim: Simulation of DAG-based distributed ledger protocols
Manuel Zander, Tom Waite, Dominik Harz
Manuel Zander, Tom Waite, Dominik Harz
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
Port Contention for Fun and Profit
Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri
Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
Limiting the impact of unreliable randomness in deployed security protocols
Liliya Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev, Nick Sullivan
Liliya Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev, Nick Sullivan
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs
Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation
Pan Dongxue, Li Hongda, Ni Peifang
Pan Dongxue, Li Hongda, Ni Peifang
Efficient Multi-key FHE with short extended ciphertexts and less public parameters
Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu
Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu
Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
Jothi Rangasamy, Lakshmi Kuppusamy
Jothi Rangasamy, Lakshmi Kuppusamy
Verifiability Analysis of CHVote
David Bernhard, Véronique Cortier, Pierrick Gaudry, Mathieu Turuani, Bogdan Warinschi
David Bernhard, Véronique Cortier, Pierrick Gaudry, Mathieu Turuani, Bogdan Warinschi
Lower Bounds for Differentially Private RAMs
Giuseppe Persiano, Kevin Yeo
Giuseppe Persiano, Kevin Yeo
Towards Automatically Penalizing Multimedia Breaches
Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate
Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate
Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol
Aggelos Kiayias, Alexander Russell
Aggelos Kiayias, Alexander Russell
Proof-of-Work Sidechains
Aggelos Kiayias, Dionysis Zindros
Aggelos Kiayias, Dionysis Zindros
On the Linear Transformation in White-box Cryptography
Seungkwang Lee, Nam-su Jho, Myungchul Kim
Seungkwang Lee, Nam-su Jho, Myungchul Kim
Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$
Claude Carlet, Xi Chen, Longjiang Qu
Claude Carlet, Xi Chen, Longjiang Qu
MPC Joins the Dark Side
John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions
Masahito Ishizaka, Kanta Matsuura
Masahito Ishizaka, Kanta Matsuura
Improved Bootstrapping for Approximate Homomorphic Encryption
Hao Chen, Ilaria Chillotti, Yongsoo Song
Hao Chen, Ilaria Chillotti, Yongsoo Song
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger
Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger
Secure Outsourced Matrix Computation and Application to Neural Networks
Xiaoqian Jiang, Miran Kim, Kristin Lauter, Yongsoo Song
Xiaoqian Jiang, Miran Kim, Kristin Lauter, Yongsoo Song
Cryptanalysis of OCB2
Akiko Inoue, Kazuhiko Minematsu
Akiko Inoue, Kazuhiko Minematsu
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Georg Fuchsbauer, Michele Orrù, Yannick Seurin
Georg Fuchsbauer, Michele Orrù, Yannick Seurin
On inversion modulo pseudo-Mersenne primes
Michael Scott
Michael Scott
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
Joël Alwen, Sandro Coretti, Yevgeniy Dodis
Joël Alwen, Sandro Coretti, Yevgeniy Dodis
If a Generalised Butterfly is APN then it Operates on 6 Bits
Anne Canteaut, Léo Perrin, Shizhu Tian
Anne Canteaut, Léo Perrin, Shizhu Tian
Relating different Polynomial-LWE problems
Madalina Bolboceanu
Madalina Bolboceanu
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
One-Round Authenticated Group Key Exchange from Isogenies
Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama
Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama
Conditionals in Homomorphic Encryption and Machine Learning Applications
Diego Chialva, Ann Dooms
Diego Chialva, Ann Dooms
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
Roderick Bloem, Rinat Iusupov, Martin Krenn, Stefan Mangard
Roderick Bloem, Rinat Iusupov, Martin Krenn, Stefan Mangard
Registration-Based Encryption from Standard Assumptions
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations
Zhe Li, Chaoping Xing, Sze Ling Yeo
Zhe Li, Chaoping Xing, Sze Ling Yeo
Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
A Unified Security Perspective on Legally Fair Contract Signing Protocols
Diana Maimut, George Teseleanu
Diana Maimut, George Teseleanu
Pairing-Friendly Twisted Hessian Curves
Chitchanok Chuengsatiansup, Chloe Martindale
Chitchanok Chuengsatiansup, Chloe Martindale
Integer Matrices Homomorphic Encryption and Its application
Yanan Bai, Jingwei Chen, Yong Feng, Wenyuan Wu
Yanan Bai, Jingwei Chen, Yong Feng, Wenyuan Wu
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution
Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun
Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic
Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic
Blind Certificate Authorities
Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, abhi shelat
Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, abhi shelat
Multi-Client Functional Encryption with Repetition for Inner Product
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
Non-Interactive Secure Computation from One-Way Functions
Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
Chloé Hébant, Duong Hieu Phan, David Pointcheval
Chloé Hébant, Duong Hieu Phan, David Pointcheval
Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
TNFS Resistant Families of Pairing-Friendly Elliptic Curves
Georgios Fotiadis, Elisavet Konstantinou
Georgios Fotiadis, Elisavet Konstantinou
Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
Gerben Geltink
Gerben Geltink
Non-Malleable Codes Against Bounded Polynomial Time Tampering
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin
An FPGA-based programmable processor for bilinear pairings
Eduardo Cuevas-Farfán, Miguel Morales-Sandoval, René Cumplido
Eduardo Cuevas-Farfán, Miguel Morales-Sandoval, René Cumplido
E3: A Framework for Compiling C++ Programs with Encrypted Operands
Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos, Michail Maniatakos
Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos, Michail Maniatakos
The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
BISON - Instantiating the Whitened Swap-Or-Not Construction
Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
Space Efficient Computational Multi-Secret Sharing and Its Applications
Aggelos Kiayias, Murat Osmanoglu, Alexander Russell, Qiang Tang
Aggelos Kiayias, Murat Osmanoglu, Alexander Russell, Qiang Tang
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li, Kunpeng Wang
Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li, Kunpeng Wang
Masking the AES with Only Two Random Bits
Hannes Gross, Ko Stoffelen, Lauren De Meyer, Martin Krenn, Stefan Mangard
Hannes Gross, Ko Stoffelen, Lauren De Meyer, Martin Krenn, Stefan Mangard
Code Offset in the Exponent
Luke Demarest, Benjamin Fuller, Alexander Russell
Luke Demarest, Benjamin Fuller, Alexander Russell
Fiat-Shamir From Simpler Assumptions
Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum
Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum
Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets
Adi Akavia, Dan Feldman, Hayim Shaul
Adi Akavia, Dan Feldman, Hayim Shaul
"S-Box" Implementation of AES is NOT side-channel resistant
C Ashokkumar, Bholanath Roy, M Bhargav Sri Venkatesh, Bernard L Menezes
C Ashokkumar, Bholanath Roy, M Bhargav Sri Venkatesh, Bernard L Menezes
Illuminating the Dark or how to recover what should not be seen in FE-based classifiers
Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey
Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey
Adaptively Single-Key Secure Constrained PRFs for NC1
Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao
Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao
A Key Recovery Attack on Streamlined NTRU Prime
Chen Li
Chen Li
Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
Leonid Reyzin, Adam Smith, Sophia Yakoubov
Leonid Reyzin, Adam Smith, Sophia Yakoubov
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He
Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes
Long Chen, Qiang Tang
Long Chen, Qiang Tang
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam
Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam
Deconstructing the Blockchain to Approach Physical Limits
Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
Reconsidering Generic Composition: the Tag-then-Encrypt case
Francesco Berti, Olivier Pereira, Thomas Peters
Francesco Berti, Olivier Pereira, Thomas Peters
Quisquis: A New Design for Anonymous Cryptocurrencies
Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi
Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi
Kleptography trapdoor free cryptographic protocols
Bohdan Kovalenko, Anton Kudin
Bohdan Kovalenko, Anton Kudin
On the Hardness of Learning With Errors with Binary Secrets
Daniele Micciancio
Daniele Micciancio
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
Iftach Haitner, Yehuda Lindell, Ariel Nof, Samuel Ranellucci
Iftach Haitner, Yehuda Lindell, Ariel Nof, Samuel Ranellucci
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
Sam Kim, David J. Wu
Sam Kim, David J. Wu
Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields
Kaushik Nath, Palash Sarkar
Kaushik Nath, Palash Sarkar
Pseudorandomness Against Mean and Variance Bounded Attackers
Maciej Skorski
Maciej Skorski
Efficient UC Commitment Extension with Homomorphism for Free (and Applications)
Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli
Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli
Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance
Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada
Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada
PaLa: A Simple Partially Synchronous Blockchain
T-H. Hubert Chan, Rafael Pass, Elaine Shi
T-H. Hubert Chan, Rafael Pass, Elaine Shi
PiLi: An Extremely Simple Synchronous Blockchain
T-H. Hubert Chan, Rafael Pass, Elaine Shi
T-H. Hubert Chan, Rafael Pass, Elaine Shi
FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
Encrypted Multi-Maps with Computationally-Secure Leakage
Seny Kamara, Tarik Moataz
Seny Kamara, Tarik Moataz
Threshold Single Password Authentication
Devriş İşler, Alptekin Küpçü
Devriş İşler, Alptekin Küpçü
Distributed Single Password Protocol Framework
Devriş İşler, Alptekin Küpçü
Devriş İşler, Alptekin Küpçü
User Study on Single Password Authentication
Devriş İşler, Alptekin Küpçü, Aykut Coskun
Devriş İşler, Alptekin Küpçü, Aykut Coskun
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa
How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO
Aayush Jain, Amit Sahai
Aayush Jain, Amit Sahai
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Protean Signature Schemes
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Optimal TNFS-secure pairings on elliptic curves with even embedding degree
Georgios Fotiadis, Chloe Martindale
Georgios Fotiadis, Chloe Martindale
Edrax: A Cryptocurrency with Stateless Transaction Validation
Alexander Chepurnoy, Charalampos Papamanthou, Shravan Srinivasan, Yupeng Zhang
Alexander Chepurnoy, Charalampos Papamanthou, Shravan Srinivasan, Yupeng Zhang
Higher dimensional sieving for the number field sieve algorithms
Laurent Grémy
Laurent Grémy
On the Security of the Multivariate Ring Learning with Errors Problem
Carl Bootland, Wouter Castryck, Frederik Vercauteren
Carl Bootland, Wouter Castryck, Frederik Vercauteren
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson
Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas
Saud Al Musa, Guangwu Xu
Saud Al Musa, Guangwu Xu
On Enabling Attribute-Based Encryption to Be Traceable against Traitors
Zhen Liu, Qiong Huang, Duncan S. Wong
Zhen Liu, Qiong Huang, Duncan S. Wong
Zexe: Enabling Decentralized Private Computation
Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu
Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng
Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng
Towards Quantum One-Time Memories from Stateless Hardware
Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
Information Entropy Based Leakage Certification
Changhai Ou, Xinping Zhou, Siew-Kei Lam
Changhai Ou, Xinping Zhou, Siew-Kei Lam
On Tightly Secure Primitives in the Multi-Instance Setting
Dennis Hofheinz, Ngoc Khanh Nguyen
Dennis Hofheinz, Ngoc Khanh Nguyen
Same Point Composable and Nonmalleable Obfuscated Point Functions
Peter Fenteany, Benjamin Fuller
Peter Fenteany, Benjamin Fuller
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang
Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang
Compact Sparse Merkle Trees
Faraz Haider
Faraz Haider
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
Daniel Jost, Ueli Maurer, Marta Mularczyk
Daniel Jost, Ueli Maurer, Marta Mularczyk
A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols
Dmytro Bogatov, George Kollios, Leonid Reyzin
Dmytro Bogatov, George Kollios, Leonid Reyzin
Approximate Homomorphic Encryption over the Conjugate-invariant Ring
Duhyeong Kim, Yongsoo Song
Duhyeong Kim, Yongsoo Song
The Landscape of Optimal Card-based Protocols
Alexander Koch
Alexander Koch
Security bound for CTR-ACPKM internally re-keyed encryption mode
Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav V. Smyshlyaev
Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav V. Smyshlyaev
Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations
Si Gao, Arnab Roy, Elisabeth Oswald
Si Gao, Arnab Roy, Elisabeth Oswald
MILP-Based Automatic Differential Searches for LEA and HIGHT
Elnaz Bagherzadeh, Zahra Ahmadian
Elnaz Bagherzadeh, Zahra Ahmadian
On the security of Circulant UOV/Rainbow
Yasufumi Hashimoto
Yasufumi Hashimoto
Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More
Nicholas Genise, Daniele Micciancio, Yuriy Polyakov
Nicholas Genise, Daniele Micciancio, Yuriy Polyakov
On the Inner Product Predicate and a Generalization of Matching Vector Families
Balthazar Bauer, Jevgēnijs Vihrovs, Hoeteck Wee
Balthazar Bauer, Jevgēnijs Vihrovs, Hoeteck Wee
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions
Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound
Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
Insured MPC: Efficient Secure Computation with Financial Penalties
Carsten Baum, Bernardo David, Rafael Dowsley
Carsten Baum, Bernardo David, Rafael Dowsley
A tutorial introduction to CryptHOL
Andreas Lochbihler, S. Reza Sefidgar
Andreas Lochbihler, S. Reza Sefidgar
Reusable Non-Interactive Secure Computation
Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms
Marcella Hastings, Nadia Heninger, Eric Wustrow
Marcella Hastings, Nadia Heninger, Eric Wustrow
Private Message Franking with After Opening Privacy
Iraklis Leontiadis, Serge Vaudenay
Iraklis Leontiadis, Serge Vaudenay
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
Mathias Wagner, Stefan Heyse
Mathias Wagner, Stefan Heyse
New Techniques for Obfuscating Conjunctions
James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
Distinguishing Error of Nonlinear Invariant Attacks
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
A Full RNS Variant of Approximate Homomorphic Encryption
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
A study on the fast ElGamal encryption
Kim Gyu-Chol, Li Su-Chol
Kim Gyu-Chol, Li Su-Chol
Expander Graphs are Non-Malleable Codes
Peter M. R. Rasmussen, Amit Sahai
Peter M. R. Rasmussen, Amit Sahai
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
Adaptively Secure Distributed PRFs from LWE
Benoît Libert, Damien Stehlé, Radu Titiu
Benoît Libert, Damien Stehlé, Radu Titiu
Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion
Salim Ali Altug, Yilei Chen
Salim Ali Altug, Yilei Chen
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Songze Li, Mingchao Yu, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
Songze Li, Mingchao Yu, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
Forward Secure Signatures on Smart Cards
Andreas Hülsing, Christoph Busold, Johannes Buchmann
Andreas Hülsing, Christoph Busold, Johannes Buchmann
Delegatable Anonymous Credentials from Mercurial Signatures
Elizabeth C. Crites, Anna Lysyanskaya
Elizabeth C. Crites, Anna Lysyanskaya
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Dušan Božilov, Miroslav Knežević, Ventzislav Nikov
Dušan Božilov, Miroslav Knežević, Ventzislav Nikov
Round Optimal Black-Box “Commit-and-Prove”
Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
A Message Franking Channel
Loïs Huguenin-Dumittan, Iraklis Leontiadis
Loïs Huguenin-Dumittan, Iraklis Leontiadis
Registration-Based Encryption: Removing Private-Key Generator from IBE
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi
Scalable Lightning Factories for Bitcoin
Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Secure multiparty PageRank algorithm for collaborative fraud detection
Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm
Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm
Forking a Blockcipher for Authenticated Encryption of Very Short Messages
Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
On the Security of a Certificateless Strong Designated Verifier Signature Scheme
Nasrollah Pakniat
Nasrollah Pakniat
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance
Shuichi Katsumata, Shota Yamada
Shuichi Katsumata, Shota Yamada
Best Possible Information-Theoretic MPC
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Achieving Fair Treatment in Algorithmic Classification
Andrew Morgan, Rafael Pass
Andrew Morgan, Rafael Pass
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
Two-Round MPC: Information-Theoretic and Black-Box
Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
FE and iO for Turing Machines from Minimal Assumptions
Shweta Agrawal and Monosij Maitra
Shweta Agrawal and Monosij Maitra
Proving the correct execution of concurrent services in zero-knowledge
Srinath Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee
Srinath Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee
Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
Willy Quach, Daniel Wichs, Giorgos Zirdelis
Willy Quach, Daniel Wichs, Giorgos Zirdelis
On the Security Loss of Unique Signatures
Andrew Morgan, Rafael Pass
Andrew Morgan, Rafael Pass
Quantum security proofs using semi-classical oracles
Andris Ambainis, Mike Hamburg, Dominique Unruh
Andris Ambainis, Mike Hamburg, Dominique Unruh
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
ProximiTEE: Hardened SGX Attestation by Proximity Verification
Aritra Dhar, Evan Puddu, Kari Kostiainen, Srdjan Capkun
Aritra Dhar, Evan Puddu, Kari Kostiainen, Srdjan Capkun
On the Complexity of Fair Coin Flipping
Iftach Haitner, Nikolaos Makriyannis, Eran Omri
Iftach Haitner, Nikolaos Makriyannis, Eran Omri
Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations
Mohammad Hajiabadi
Mohammad Hajiabadi
Differential Cryptanalysis of Round-Reduced SPECK
Ashutosh Dhar Dwivedi, Pawel Morawiecki
Ashutosh Dhar Dwivedi, Pawel Morawiecki
Differential Cryptanalysis in ARX Ciphers with specific applications to LEA
Ashutosh Dhar Dwivedi, Gautam Srivastava
Ashutosh Dhar Dwivedi, Gautam Srivastava
Traitor-Tracing from LWE Made Simple and Attribute-Based
Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Apoorvaa Deshpande, Yael Kalai
Apoorvaa Deshpande, Yael Kalai
Weak Zero-Knowledge Beyond the Black-Box Barrier
Nir Bitansky, Dakshita Khurana, Omer Paneth
Nir Bitansky, Dakshita Khurana, Omer Paneth
Perfect Secure Computation in Two Rounds
Benny Applebaum, Zvika Brakerski, Rotem Tsabary
Benny Applebaum, Zvika Brakerski, Rotem Tsabary
Blockchain as cryptanalytic tool
Manfred Lochter
Manfred Lochter
OptORAMa: Optimal Oblivious RAM
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi
Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment
Seyed Farhad Aghili, Hamid Mala
Seyed Farhad Aghili, Hamid Mala
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE
Alex Davidson, Ryo Nishimaki
Alex Davidson, Ryo Nishimaki
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
F. Betül Durak, Serge Vaudenay
F. Betül Durak, Serge Vaudenay
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
Thom Wiggers
Thom Wiggers
Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions
Serge Fehr
Serge Fehr
Towards Isogeny-Based Password-Authenticated Key Establishment
Oleg Taraskin, Vladimir Soukharev, David Jao, Jason LeGrow
Oleg Taraskin, Vladimir Soukharev, David Jao, Jason LeGrow
PASTA: PASsword-based Threshold Authentication
Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee
Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee
Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model
Alan Szepieniec, Reza Reyhanitabar, Bart Preneel
Alan Szepieniec, Reza Reyhanitabar, Bart Preneel
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
Suvradip Chakraborty, C. Pandu Rangan
Suvradip Chakraborty, C. Pandu Rangan
Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies
Benjamin Smith
Benjamin Smith
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
Spread: a new layer for profiled deep-learning side-channel attacks
Christophe Pfeifer, Patrick Haddad
Christophe Pfeifer, Patrick Haddad
Efficient Group Signature Scheme without Pairings
Ke Gu, Bo Yin
Ke Gu, Bo Yin
RSA Signatures Under Hardware Restrictions
Marc Joye, Yan Michalevsky
Marc Joye, Yan Michalevsky
On QA-NIZK in the BPK Model
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
Identity Confidentiality in 5G Mobile Telephony Systems
Haibat Khan, Benjamin Dowling, Keith M. Martin
Haibat Khan, Benjamin Dowling, Keith M. Martin
Oblivious Transfer in Incomplete Networks
Varun Narayanan, Vinod M. Prabhakaran
Varun Narayanan, Vinod M. Prabhakaran
Enhanced Security of Attribute-Based Signatures
Johannes Blömer, Fabian Eidens, Jakob Juhnke
Johannes Blömer, Fabian Eidens, Jakob Juhnke
TACHYON: Fast Signatures from Compact Knapsack
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
New Techniques for Efficient Trapdoor Functions and Applications
Sanjam Garg, Romain Gay, Mohammad Hajiabadi
Sanjam Garg, Romain Gay, Mohammad Hajiabadi
Non-profiled Mask Recovery: the impact of Independent Component Analysis
Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi
Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi
Unifying Kleptographic Attacks
George Teseleanu
George Teseleanu
Higher-Order DCA against Standard Side-Channel Countermeasures
Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang
Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Dea Saka Kurnia Putra, Mohamad Ali Sadikin, Susila Windarta
Dea Saka Kurnia Putra, Mohamad Ali Sadikin, Susila Windarta
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
Liron David, Avishai Wool
Liron David, Avishai Wool
Output Compression, MPC, and iO for Turing Machines
Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters
Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters
Multiplicative Masking for AES in Hardware
Lauren De Meyer, Oscar Reparaz, Begül Bilgin
Lauren De Meyer, Oscar Reparaz, Begül Bilgin
Optimistic Mixing, Revisited
Antonio Faonio, Dario Fiore
Antonio Faonio, Dario Fiore
Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation
Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz, Ori Rottenstreich, Ronen Tamari, David Yakira
Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz, Ori Rottenstreich, Ronen Tamari, David Yakira
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
Nils Wisiol, Marian Margraf
Nils Wisiol, Marian Margraf
Delegating Computations with (almost) Minimal Time and Space Overhead
Justin Holmgren, Ron D. Rothblum
Justin Holmgren, Ron D. Rothblum
Encrypted Databases for Differential Privacy
Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
Cryptanalysis of Low-Data Instances of Full LowMCv2
Christian Rechberger, Hadi Soleimany, Tyge Tiessen
Christian Rechberger, Hadi Soleimany, Tyge Tiessen
Stronger Security for Sanitizable Signatures
Stephan Krenn, Kai Samelin, Dieter Sommer
Stephan Krenn, Kai Samelin, Dieter Sommer
Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Xingye Lu, Man Ho Au, Zhenfei Zhang
Xingye Lu, Man Ho Au, Zhenfei Zhang
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
Shi Bai, Damien Stehlé, Weiqiang Wen
Shi Bai, Damien Stehlé, Weiqiang Wen
On the Security of the PKCS#1 v1.5 Signature Scheme
Tibor Jager, Saqib A. Kakvi, Alexander May
Tibor Jager, Saqib A. Kakvi, Alexander May
Universal Multi-Party Poisoning Attacks
Saeed Mahloujifar, Mahammad Mahmoody, Ameer Mohammed
Saeed Mahloujifar, Mahammad Mahmoody, Ameer Mohammed
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
Computing supersingular isogenies on Kummer surfaces
Craig Costello
Craig Costello
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications
Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
A Universally Composable Framework for the Privacy of Email Ecosystems
Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias
Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Venkata Koppula, Brent Waters
Venkata Koppula, Brent Waters
Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext
Jia Xu, Jianying Zhou
Jia Xu, Jianying Zhou
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
Fuyuki Kitagawa, Keisuke Tanaka
Fuyuki Kitagawa, Keisuke Tanaka
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele, Marc Fischlin
Jean Paul Degabriele, Marc Fischlin
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions
Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions
Akinori Hosoyamada, Kan Yasuda
Akinori Hosoyamada, Kan Yasuda
Universal Proxy Re-Encryption
Nico Döttling, Ryo Nishimaki
Nico Döttling, Ryo Nishimaki
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
Huseyin Hisil, Joost Renes
Huseyin Hisil, Joost Renes
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Keita Xagawa, Takashi Yamakawa
Keita Xagawa, Takashi Yamakawa
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
Fully-Featured Anonymous Credentials with Reputation System
Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier
Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
Dennis Hofheinz, Dingding Jia, Jiaxin Pan
Dennis Hofheinz, Dingding Jia, Jiaxin Pan
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
Jie Chen, Junqing Gong, Hoeteck Wee
Jie Chen, Junqing Gong, Hoeteck Wee
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
Practical Attack on RaCoSS-R
Keita Xagawa
Keita Xagawa
A remark on a success rate model fpr DPA and CPA
Andreas Wiemers
Andreas Wiemers
Information-Theoretic Broadcast with Dishonest Majority for Long Messages
Wutichai Chongchitmate, Rafail Ostrovsky
Wutichai Chongchitmate, Rafail Ostrovsky
Aurora: Transparent Succinct Arguments for R1CS
Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, Nicholas P. Ward
Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, Nicholas P. Ward
Practical Strategy-Resistant Privacy-Preserving Elections
Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
Tibor Jager, Rafael Kurek, Jiaxin Pan
Tibor Jager, Rafael Kurek, Jiaxin Pan
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
Kostas Papagiannopoulos
Kostas Papagiannopoulos
SeaSign: Compact isogeny signatures from class group actions
Luca De Feo, Steven D. Galbraith
Luca De Feo, Steven D. Galbraith
The Security of Lazy Users in Out-of-Band Authentication
Moni Naor, Lior Rotem, Gil Segev
Moni Naor, Lior Rotem, Gil Segev
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS
Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
David Sommer, Sebastian Meiser, Esfandiar Mohammadi
David Sommer, Sebastian Meiser, Esfandiar Mohammadi
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
Ritam Bhaumik, Eik List, Mridul Nandi
Ritam Bhaumik, Eik List, Mridul Nandi
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Yunhua Wen, Shengli Liu
Yunhua Wen, Shengli Liu
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
Chun Guo, Lei Wang
Chun Guo, Lei Wang
Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
Yoshitatsu Matsuda, Tadanori Teruya, Kenji Kasiwabara
Yoshitatsu Matsuda, Tadanori Teruya, Kenji Kasiwabara
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
Programming the Demirci-Sel{ç}uk Meet-in-the-Middle Attack with Constraints
Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?
Lior Rotem, Gil Segev
Lior Rotem, Gil Segev
Reconstructing an S-box from its Difference Distribution Table
Orr Dunkelman, Senyang Huang
Orr Dunkelman, Senyang Huang
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Ling Song, Jian Guo
Ling Song, Jian Guo
Algebraic Cryptanalysis of Frit
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Markus Schofnegger
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Markus Schofnegger
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher
Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
Nicolas T. Courtois
Nicolas T. Courtois
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Victor Arribas, Svetla Nikova, Vincent Rijmen
Victor Arribas, Svetla Nikova, Vincent Rijmen
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda
Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
Secure Modulo Zero-Sum Randomness as Cryptographic Resource
Masahito Hayashi, Takeshi Koshiba
Masahito Hayashi, Takeshi Koshiba
Faster PCA and Linear Regression through Hypercubes in HElib
Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda
Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda
Security of the Blockchain against Long Delay Attack
Puwen Wei, Quan Yuan, Yuliang Zheng
Puwen Wei, Quan Yuan, Yuliang Zheng
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
Fukang Liu, Zhenfu Cao, Gaoli Wang
Fukang Liu, Zhenfu Cao, Gaoli Wang
Recovering Secrets From Prefix-Dependent Leakage
Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi
Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
Martin Ekerå
Martin Ekerå
On relations between CCZ- and EA-equivalences
Lilya Budaghyan, Marco Calderini, Irene Villa
Lilya Budaghyan, Marco Calderini, Irene Villa
Solving ECDLP via List Decoding
Fangguo Zhang, Shengli Liu
Fangguo Zhang, Shengli Liu
Blending FHE-NTRU keys – The Excalibur Property
Louis Goubin, Francisco Vial-Prado
Louis Goubin, Francisco Vial-Prado
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki
Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki
Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices
Joppe W. Bos, Simon J. Friedberger
Joppe W. Bos, Simon J. Friedberger
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$
Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation
David Derler, Sebastian Ramacher, Daniel Slamanig
David Derler, Sebastian Ramacher, Daniel Slamanig
Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free
Vladimir Kolesnikov
Vladimir Kolesnikov
Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal
Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal
Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices
Zhongxiang Zheng, Guangwu Xu, Chunhuan Zhao
Zhongxiang Zheng, Guangwu Xu, Chunhuan Zhao
Efficiently Processing Complex-Valued Data in Homomorphic Encryption
Carl Bootland, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Carl Bootland, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model
ByeongHak Lee, Jooyoung Lee
ByeongHak Lee, Jooyoung Lee
Short Variable Length Domain Extenders With Beyond Birthday Bound Security
Yu Long Chen, Bart Mennink, Mridul Nandi
Yu Long Chen, Bart Mennink, Mridul Nandi
A faster way to the CSIDH
Michael Meyer, Steffen Reith
Michael Meyer, Steffen Reith
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
Yu Chen, Yuyu Wang, Hong-sheng Zhou
Yu Chen, Yuyu Wang, Hong-sheng Zhou
A Game Theoretic Analysis of Resource Mining in Blockchain
Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
PPP-Completeness with Connections to Cryptography
Katerina Sotiraki, Manolis Zampetakis, Giorgos Zirdelis
Katerina Sotiraki, Manolis Zampetakis, Giorgos Zirdelis
Delegation of Decryption Rights with Revocability from Learning with Errors
Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
On Publicly Verifiable Delegation From Standard Assumptions
Yael Kalai, Omer Paneth, Lisa Yang
Yael Kalai, Omer Paneth, Lisa Yang
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants
Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun
Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun
Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies
Brandon Goodell, Sarang Noether
Brandon Goodell, Sarang Noether
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures
Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
A Simple Construction of iO for Turing Machines
Sanjam Garg, Akshayaram Srinivasan
Sanjam Garg, Akshayaram Srinivasan
Combiners for Backdoored Random Oracles
Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
Constructing APN functions through isotopic shifts
Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa
Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
Xoodoo cookbook
Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan
Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan
Symbolic Proofs for Lattice-Based Cryptography
Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
Generating Graphs Packed with Paths
Mathias Hall-Andersen, Philip S. Vejre
Mathias Hall-Andersen, Philip S. Vejre
Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version)
Tim Beyne
Tim Beyne
Generalizing the SPDZ Compiler For Other Protocols
Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami
Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Bei Liang, Song Tian
Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Bei Liang, Song Tian
Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm
Prabhanjan Ananth, Alex Lombardi
Prabhanjan Ananth, Alex Lombardi
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Cryptography for Human Senses
Kimmo Halunen, Outi-Marja Latvala
Kimmo Halunen, Outi-Marja Latvala
Obfuscation Using Tensor Products
Craig Gentry, Charanjit S. Jutla, Daniel Kane
Craig Gentry, Charanjit S. Jutla, Daniel Kane
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
SoK: A Consensus Taxonomy in the Blockchain Era
Juan Garay, Aggelos Kiayias
Juan Garay, Aggelos Kiayias
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
Yan Michalevsky, Marc Joye
Yan Michalevsky, Marc Joye
Isogeny Secrets can be Traded
David Urbanik
David Urbanik
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
Non-Malleable Secret Sharing for General Access Structures
Vipul Goyal, Ashutosh Kumar
Vipul Goyal, Ashutosh Kumar
Prime and Prejudice: Primality Testing Under Adversarial Conditions
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
Definitions for Plaintext-Existence Hiding in Cloud Storage
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Eyal Ronen, Kenneth G. Paterson, Adi Shamir
Eyal Ronen, Kenneth G. Paterson, Adi Shamir
Secret Sharing with Binary Shares
Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang
Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang
Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin
Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin
On the Leakage of Corrupted Garbled Circuits
Aurélien Dupin, David Pointcheval, Christophe Bidan
Aurélien Dupin, David Pointcheval, Christophe Bidan
Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities
Hiroaki Anada, Seiko Arita
Hiroaki Anada, Seiko Arita
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
Alexander May, Gottfried Herold
Alexander May, Gottfried Herold
FairSwap: How to fairly exchange digital goods
Stefan Dziembowski, Lisa Eckey, Sebastian Faust
Stefan Dziembowski, Lisa Eckey, Sebastian Faust
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
Mahdi Sajadieh, Mohammad Vaziri
Mahdi Sajadieh, Mohammad Vaziri
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
Sanjit Chatterjee, R. Kabaleeshwaran
Sanjit Chatterjee, R. Kabaleeshwaran
Steady: A Simple End-to-End Secure Logging System
Tobias Pulls, Rasmus Dahlberg
Tobias Pulls, Rasmus Dahlberg
Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs
Marina Blanton, Myoungin Jeong
Marina Blanton, Myoungin Jeong
AntNest: Fully Non-interactive Secure Multi-party Computation
Lijing Zhou, Licheng Wang, Yiru Sun, Tianyi Ai
Lijing Zhou, Licheng Wang, Yiru Sun, Tianyi Ai
Random Number Generators Can Be Fooled to Behave Badly
George Teseleanu
George Teseleanu
Threshold Partially-Oblivious PRFs with Applications to Key Management
Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
Data Oblivious Genome Variants Search on Intel SGX
Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy
Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
Itai Dinur, Nathan Keller, Ohad Klein
Itai Dinur, Nathan Keller, Ohad Klein
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange
Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama
Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection
Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers
Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto
Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto
DiSE: Distributed Symmetric-key Encryption
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang
Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang
Round5: KEM and PKE based on GLWR
Sauvik Bhattacharya, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
Sauvik Bhattacharya, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
Nele Mentens, Edoardo Charbon, Francesco Regazzoni
Nele Mentens, Edoardo Charbon, Francesco Regazzoni
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
uMine: a Blockchain based on Human Miners
Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
Transparency Logs via Append-only Authenticated Dictionaries
Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
{Adiantum}: length-preserving encryption for entry-level processors
Paul Crowley, Eric Biggers
Paul Crowley, Eric Biggers
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic
Koji Nuida
Koji Nuida
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert
Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert
Lattice-Based Zero-Knowledge Arguments for Integer Relations
Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Practical Attacks on Relational Databases Protected via Searchable Encryption
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
PKP-Based Signature Scheme
Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting
Anne Canteaut, Léo Perrin
Anne Canteaut, Léo Perrin
A Survey of Two Verifiable Delay Functions
Dan Boneh, Benedikt Bünz, Ben Fisch
Dan Boneh, Benedikt Bünz, Ben Fisch
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures
Kallepu Raju, Appala Naidu Tentuand, V. Ch. Venkaiah
Kallepu Raju, Appala Naidu Tentuand, V. Ch. Venkaiah
Fast Secure Computation for Small Population over the Internet
Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies
Vanessa Vitse
Vanessa Vitse
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software
Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
Function Secret Sharing: Improvements and Extensions
Elette Boyle, Niv Gilboa, Yuval Ishai
Elette Boyle, Niv Gilboa, Yuval Ishai
Efficient 3-Party Distributed ORAM
Paul Bunn, Jonathan Katz, Eyal Kushilevitz, Rafail Ostrovsky
Paul Bunn, Jonathan Katz, Eyal Kushilevitz, Rafail Ostrovsky
Subvector Commitments with Application to Succinct Arguments
Russell W. F. Lai, Giulio Malavolta
Russell W. F. Lai, Giulio Malavolta
Verifiable Sealed-Bid Auction on the Ethereum Blockchain
Hisham S. Galal, Amr M. Youssef
Hisham S. Galal, Amr M. Youssef
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
Niek J. Bouman, Niels de Vreede
Niek J. Bouman, Niels de Vreede
Tight Proofs of Space and Replication
Ben Fisch
Ben Fisch
Secure Sketch for All Noisy Sources
Yen-Lung Lai
Yen-Lung Lai
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu
Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64
Raghvendra Rohit, Guang Gong
Raghvendra Rohit, Guang Gong
Parameter-Hiding Order Revealing Encryption
David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang
David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang
AUDIT: Practical Accountability of Secret Processes
Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner
Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner
Unbounded Inner Product Functional Encryption from Bilinear Maps
Junichi Tomida, Katsuyuki Takashima
Junichi Tomida, Katsuyuki Takashima
SPHINX: A Password Store that Perfectly Hides Passwords from Itself
Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena
Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena
Faster Privacy-Preserving Location Proximity Schemes
Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
Efficient Side-Channel Protections of ARX Ciphers
Bernhard Jungk, Richard Petri, Marc Stöttinger
Bernhard Jungk, Richard Petri, Marc Stöttinger
New Configurations of Grain Ciphers: Security Against Slide Attacks
Diana Maimut, George Teseleanu
Diana Maimut, George Teseleanu
DIZK: A Distributed Zero Knowledge Proof System
Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
Efficient KEA-Style Lattice-Based Authenticated Key Exchange
Zilong Wang, Honggang Hu
Zilong Wang, Honggang Hu
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Ralph Ankele, Stefan Kölbl
Ralph Ankele, Stefan Kölbl
Finding Integral Distinguishers with Ease
Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen
Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
Standard Lattice-Based Key Encapsulation on Embedded Devices
James Howe, Tobias Oder, Markus Krausz, Tim Güneysu
James Howe, Tobias Oder, Markus Krausz, Tim Güneysu
On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards
Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
PIEs: Public Incompressible Encodings for Decentralized Storage
Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels
Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
Oksana Kulyk, Melanie Volkamer
Oksana Kulyk, Melanie Volkamer
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede
Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede
A Reusable Fuzzy Extractor with Practical Storage Size
Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, Weiqi Luo
Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, Weiqi Luo
PoReps: Proofs of Space on Useful Data
Ben Fisch
Ben Fisch
Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems
François Gérard
François Gérard
Static Power Side-Channel Analysis - An Investigation of Measurement Factors
Thorben Moos, Amir Moradi, Bastian Richter
Thorben Moos, Amir Moradi, Bastian Richter
A signature scheme from the finite field isomorphism problem
Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Practical Fault Injection Attacks on SPHINCS
Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
Differential Power Analysis of XMSS and SPHINCS
Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
Joey Green, Elisabeth Oswald, Arnab Roy
Joey Green, Elisabeth Oswald, Arnab Roy
Public Key Compression for Constrained Linear Signature Schemes
Ward Beullens, Bart Preneel, Alan Szepieniec
Ward Beullens, Bart Preneel, Alan Szepieniec
Faster cofactorization with ECM using mixed representations
Cyril Bouvier, Laurent Imbert
Cyril Bouvier, Laurent Imbert
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
Takanori Isobe, Kazuhiko Minematsu
Takanori Isobe, Kazuhiko Minematsu
On Hardware Implementation of Tang-Maitra Boolean Functions
Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
Reproducible Families of Codes and Cryptographic Applications
Paolo Santini, Edoardo Persichetti, Marco Baldi
Paolo Santini, Edoardo Persichetti, Marco Baldi
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
Public Accountability vs. Secret Laws: Can They Coexist?
Shafi Goldwasser, Sunoo Park
Shafi Goldwasser, Sunoo Park
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption
Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
Efficient Logistic Regression on Large Encrypted Data
Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
Exploring Deployment Strategies for the Tor Network
Christoph Döpmann, Sebastian Rust, Florian Tschorsch
Christoph Döpmann, Sebastian Rust, Florian Tschorsch
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Xun Yi, Kwok-Yan Lam, Dieter Gollmann
Xun Yi, Kwok-Yan Lam, Dieter Gollmann
On the Menezes-Teske-Weng’s conjecture
Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang
Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang
Blockchained Post-Quantum Signatures
Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter
Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter
Platform-independent Secure Blockchain-Based Voting System
Bin Yu, Joseph Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au
Bin Yu, Joseph Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au
FPGA Cluster based high performance Cryptanalysis framework
Abhishek Bajpai, S V Kulgod
Abhishek Bajpai, S V Kulgod
Loamit: A Blockchain-based Residual Loanable-limit Query System
Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv
Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv
Proofs of Replicated Storage Without Timing Assumptions
Ivan Damgård, Chaya Ganesh, Claudio Orlandi
Ivan Damgård, Chaya Ganesh, Claudio Orlandi
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner
Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner
Efficient Collision Attack Frameworks for RIPEMD-160
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Brumley
Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Brumley
Designing Efficient Dyadic Operations for Cryptographic Applications
Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini
Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini
No-signaling Linear PCPs
Susumu Kiyoshima
Susumu Kiyoshima
Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
A new perspective on the powers of two descent for discrete logarithms in finite fields
Thorsten Kleinjung, Benjamin Wesolowski
Thorsten Kleinjung, Benjamin Wesolowski
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
Huijia Lin, Christian Matt
Huijia Lin, Christian Matt
Mitigating the One-Use Restriction in Attribute-Based Encryption
Lucas Kowalczyk, Jiahui Liu, Kailash Meiyappan, Tal Malkin
Lucas Kowalczyk, Jiahui Liu, Kailash Meiyappan, Tal Malkin
Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets
Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, William J. Knottenbelt
Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, William J. Knottenbelt
Commit-Chains: Secure, Scalable Off-Chain Payments
Rami Khalil, Alexei Zamyatin, Guillaume Felley, Pedro Moreno-Sanchez, Arthur Gervais
Rami Khalil, Alexei Zamyatin, Guillaume Felley, Pedro Moreno-Sanchez, Arthur Gervais
Membership Privacy for Fully Dynamic Group Signatures
Michael Backes, Lucjan Hanzlik, Jonas Schneider
Michael Backes, Lucjan Hanzlik, Jonas Schneider
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
Function-Dependent Commitments for Verifiable Multi-Party Computation
Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann
Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann
BurnBox: Self-Revocable Encryption in a World of Compelled Access
Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
Efficient Fully Homomorphic Encryption Scheme
Shuhong Gao
Shuhong Gao
Lattice-Based Dual Receiver Encryption and More
Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
On linear hulls in one round of DES
Tomer Ashur, Raluca Posteuca
Tomer Ashur, Raluca Posteuca
Partially Specified Channels: The TLS 1.3 Record Layer without Elision
Christopher Patton, Thomas Shrimpton
Christopher Patton, Thomas Shrimpton
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation
Shweta Agrawal
Shweta Agrawal
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
Clementine Gritti, Melek Onen, Refik Molva
Clementine Gritti, Melek Onen, Refik Molva
Efficient Construction of the Boomerang Connection Table
Orr Dunkelman
Orr Dunkelman
Characterizing overstretched NTRU attacks
Gabrielle De Micheli, Nadia Heninger, Barak Shani
Gabrielle De Micheli, Nadia Heninger, Barak Shani
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Lucas Schabhüser, Denis Butin, Johannes Buchmann
Lucas Schabhüser, Denis Butin, Johannes Buchmann
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Simple Verifiable Delay Functions
Krzysztof Pietrzak
Krzysztof Pietrzak
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
Sergiu Carpov, Oana Stan
Sergiu Carpov, Oana Stan
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions
Mihir Bellare, Joseph Jaeger, Julia Len
Mihir Bellare, Joseph Jaeger, Julia Len
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla
Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla
Efficient verifiable delay functions
Benjamin Wesolowski
Benjamin Wesolowski
New techniques for Multi-value input Homomorphic Evaluation and Applications
Sergiu Carpov, Malika Izabachène, Victor Mollimard
Sergiu Carpov, Malika Izabachène, Victor Mollimard
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
Ben Lapid, Avishai Wool
Ben Lapid, Avishai Wool
STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis
Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen
Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen
Is there an Oblivious RAM Lower Bound for Online Reads?
Mor Weiss, Daniel Wichs
Mor Weiss, Daniel Wichs
On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks
Reynier Antonio de la Cruz Jiménez
Reynier Antonio de la Cruz Jiménez
Two Notions of Differential Equivalence on Sboxes
Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Dario Fiore, Elena Pagnin
Dario Fiore, Elena Pagnin
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness
Prabhanjan Ananth, Aayush Jain, Amit Sahai
Prabhanjan Ananth, Aayush Jain, Amit Sahai
A Note on Key Rank
Daniel P. Martin, Marco Martinoli
Daniel P. Martin, Marco Martinoli
One-Message Zero Knowledge and Non-Malleable Commitments
Nir Bitansky, Huijia Lin
Nir Bitansky, Huijia Lin
Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol
Tim Ruffing, Sri Aravinda Thyagarajan, Viktoria Ronge, Dominique Schröder
Tim Ruffing, Sri Aravinda Thyagarajan, Viktoria Ronge, Dominique Schröder
Is Java Card ready for hash-based signatures?
Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren
Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren
Hierarchical Attribute-based Signatures
Constantin-Catalin Dragan, Daniel Gardham, Mark Manulis
Constantin-Catalin Dragan, Daniel Gardham, Mark Manulis
Improved Results on Factoring General RSA Moduli with Known Bits
Mengce Zheng
Mengce Zheng
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
Hamid Nejatollahi, Nikil Dutt, Indranil Banerjee, Rosario Cammarota
Hamid Nejatollahi, Nikil Dutt, Indranil Banerjee, Rosario Cammarota
SEEMless: Secure End-to-End Encrypted Messaging with less trust
Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai
Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai
Continuously Non-Malleable Codes with Split-State Refresh
Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi
Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi
Attack on Kayawood Protocol: Uncloaking Private Keys
Matvei Kotov, Anton Menshov, Alexander Ushakov
Matvei Kotov, Anton Menshov, Alexander Ushakov
Actively Secure OT-Extension from q-ary Linear Codes
Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
On the Universally Composable Security of OpenStack
Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang
Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang
Verifiable Delay Functions
Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch
Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch
GRANULE: An Ultra lightweight cipher design for embedded security
Gaurav Bansod, Abhijit Patil, Narayan Pisharoty
Gaurav Bansod, Abhijit Patil, Narayan Pisharoty
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Lucas Schabhüser, Denis Butin, Johannes Buchmann
Lucas Schabhüser, Denis Butin, Johannes Buchmann
Trends in design of ransomware viruses
Vlad Constantin Craciun, Andrei Mogage, Emil Simion
Vlad Constantin Craciun, Andrei Mogage, Emil Simion
Consolidating Security Notions in Hardware Masking
Lauren De Meyer, Begül Bilgin, Oscar Reparaz
Lauren De Meyer, Begül Bilgin, Oscar Reparaz
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments
Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
Randomness analysis for multiple-recursive matrix generator
Subhrajyoti Deb, Bubu Bhuyan, Sartaj Ul Hasan
Subhrajyoti Deb, Bubu Bhuyan, Sartaj Ul Hasan
Cryptanalysis of SFN Block Cipher
Sadegh Sadeghi, Nasour Bagheri
Sadegh Sadeghi, Nasour Bagheri
Ramanujan graphs in cryptography
Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer, Anna Puskas
Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer, Anna Puskas
XS-circuits in Block Ciphers
Sergey Agievich
Sergey Agievich
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis.
Sankhanil Dey, Ranjan Ghosh
Sankhanil Dey, Ranjan Ghosh
The Twin Conjugacy Search Problem and Applications
Xiaoming Chen, Weiqing You
Xiaoming Chen, Weiqing You
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff
Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
Guilherme Borges, Henrique Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela
Guilherme Borges, Henrique Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model
Tapas Pal, Ratna Dutta
Tapas Pal, Ratna Dutta
Lower Bounds on Lattice Enumeration with Extreme Pruning
Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata
Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata
Polynomial Functional Encryption Scheme with Linear Ciphertext Size
Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son
Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son
Bounded Fully Homomorphic Encryption from Monoid Algebras
Mugurel Barcau, Vicentiu Pasol
Mugurel Barcau, Vicentiu Pasol
Ring Homomorphic Encryption Schemes
Mugurel Barcau, Vicentiu Pasol
Mugurel Barcau, Vicentiu Pasol
Pisa: Arbitration Outsourcing for State Channels
Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn
Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn
Smart contracts for bribing miners
Patrick McCorry, Alexander Hicks, Sarah Meiklejohn
Patrick McCorry, Alexander Hicks, Sarah Meiklejohn
Secure MPC: Laziness Leads to GOD
Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
PIR-PSI: Scaling Private Contact Discovery
Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu
Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu
Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
Simpler Constructions of Asymmetric Primitives from Obfuscation
Pooya Farshim, Georg Fuchsbauer, Alain Passelègue
Pooya Farshim, Georg Fuchsbauer, Alain Passelègue
An Algorithmic Framework for the Generalized Birthday Problem
Itai Dinur
Itai Dinur
Correctness and Fairness of Tendermint-core Blockchains
Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Improved Lightweight Implementations of CAESAR Authenticated Ciphers
Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
Round-Optimal Secure Multiparty Computation with Honest Majority
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
Limits of Practical Sublinear Secure Computation
Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof
Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof
Dissection-BKW
Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen
Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen
On the Security Properties of e-Voting Bulletin Boards
Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
Private Circuits: A Modular Approach
Prabhanjan Ananth, Yuval Ishai, Amit Sahai
Prabhanjan Ananth, Yuval Ishai, Amit Sahai
Homomorphic Encryption for Approximate Matrix Arithmetic
Jung Hee Cheon, Andrey Kim
Jung Hee Cheon, Andrey Kim
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Multi-client Predicate-only Encryption for Conjunctive Equality Tests
Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
maskVerif: automated analysis of software and hardware higher-order masked implementations
Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert
Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert
Blockchain Abstract Data Type
Emmanuelle Anceaume, Antonella Del Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Emmanuelle Anceaume, Antonella Del Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits
Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
Proofs of Work from Worst-Case Assumptions
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
Phillip Rogaway, Yusi Zhang
Phillip Rogaway, Yusi Zhang
Non-Interactive Zero-Knowledge Proofs for Composite Statements
Shashank Agrawal, Chaya Ganesh, Payman Mohassel
Shashank Agrawal, Chaya Ganesh, Payman Mohassel
The Curse of Small Domains: New Attacks on Format-Preserving Encryption
Viet Tung Hoang, Stefano Tessaro, Ni Trieu
Viet Tung Hoang, Stefano Tessaro, Ni Trieu
Limits on the Power of Garbling Techniques for Public-Key Encryption
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
A new class of irreducible pentanomials for polynomial based multipliers in binary fields
Gustavo Banegas, Ricardo Custodio, Daniel Panario
Gustavo Banegas, Ricardo Custodio, Daniel Panario
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging
Joseph Jaeger, Igors Stepanovs
Joseph Jaeger, Igors Stepanovs
On the Complexity of Compressing Obfuscation
Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
Structured Encryption and Leakage Suppression
Seny Kamara, Tarik Moataz, Olga Ohrimenko
Seny Kamara, Tarik Moataz, Olga Ohrimenko
PRank: Fast Analytical Rank Estimation via Pareto Distributions
Liron David, Avishai Wool
Liron David, Avishai Wool
Adaptive Garbled RAM from Laconic Oblivious Transfer
Sanjam Garg, Rafail Ostrovsky, Akshayaram Srinivasan
Sanjam Garg, Rafail Ostrovsky, Akshayaram Srinivasan
From Laconic Zero-Knowledge to Public-Key Cryptography
Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
Indifferentiable Authenticated Encryption
Manuel Barbosa, Pooya Farshim
Manuel Barbosa, Pooya Farshim
Quantum Lattice Enumeration and Tweaking Discrete Pruning
Yoshinori Aono, Phong Q. Nguyen, Yixin Shen
Yoshinori Aono, Phong Q. Nguyen, Yixin Shen
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
Pseudorandom Quantum States
Zhengfeng Ji, Yi-Kai Liu, Fang Song
Zhengfeng Ji, Yi-Kai Liu, Fang Song
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Kristian Gjøsteen, Tibor Jager
Kristian Gjøsteen, Tibor Jager
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti
Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti
Generic Attacks against Beyond-Birthday-Bound MACs
Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubacek
Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubacek
Extracting Linearization Equations from Noisy Sources
Daniel Smith-Tone
Daniel Smith-Tone
Non-Malleable Codes for Partial Functions with Manipulation Detection
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Quantum Security Analysis of CSIDH
Xavier Bonnetain, André Schrottenloher
Xavier Bonnetain, André Schrottenloher
On the Hardness of the Computational Ring-LWR Problem and its Applications
Long Chen, Zhenfeng Zhang, Zhenfei Zhang
Long Chen, Zhenfeng Zhang, Zhenfei Zhang
Monero - Privacy in the Blockchain
Kurt M. Alonso, Jordi Herrera Joancomartí
Kurt M. Alonso, Jordi Herrera Joancomartí
Cryptographic Constructions Supporting Implicit Data Integrity
Michael Kounavis, David Durham, Sergej Deutsch
Michael Kounavis, David Durham, Sergej Deutsch
Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model
Alice Pellet-Mary
Alice Pellet-Mary
Ring packing and amortized FHEW bootstrapping
Daniele Micciancio, Jessica Sorrell
Daniele Micciancio, Jessica Sorrell
Polynomial direct sum masking to protect against both SCA and FIA
Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
Two-Message Statistically Sender-Private OT from LWE
Zvika Brakerski, Nico Döttling
Zvika Brakerski, Nico Döttling
Trapdoor Functions from the Computational Diffie-Hellman Assumption
Sanjam Garg, Mohammad Hajiabadi
Sanjam Garg, Mohammad Hajiabadi
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich
Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities
Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Towards KEM Unification
Daniel J. Bernstein, Edoardo Persichetti
Daniel J. Bernstein, Edoardo Persichetti
Location-Proof System based on Secure Multi-Party Computations
Aurélien Dupin, Jean-Marc Robert, Christophe Bidan
Aurélien Dupin, Jean-Marc Robert, Christophe Bidan
New Smooth Projective Hashing For Oblivious Transfer
Bing Zeng
Bing Zeng
Reducing Complexity of Pairing Comparisons using Polynomial Evaluation
Adam Bobowski, Marcin Słowik
Adam Bobowski, Marcin Słowik
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Gil Segev, Ido Shahaf
Gil Segev, Ido Shahaf
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries
Mridul Nandi
Mridul Nandi
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules
Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel
Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel
Secure and Reliable Key Agreement with Physical Unclonable Functions
Onur Gunlu, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
Onur Gunlu, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
Upper and Lower Bounds for Continuous Non-Malleable Codes
Dana Dachman-Soled, Mukul Kulkarni
Dana Dachman-Soled, Mukul Kulkarni
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
Atsushi Takayasu, Noboru Kunihiro
Atsushi Takayasu, Noboru Kunihiro
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
Weak Compression and (In)security of Rational Proofs of Storage
Ben Fisch, Shashwat Silas
Ben Fisch, Shashwat Silas
Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies
Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart
Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart
Provably Secure Integration Cryptosystem on Non-Commutative Group
Weiqing You, Xiaoming Chen
Weiqing You, Xiaoming Chen
Return of GGH15: Provable Security Against Zeroizing Attacks
James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry
James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry
Key-Secrecy of PACE with OTS/CafeOBJ
Dominik Klein
Dominik Klein
Improved Collision Attack on Reduced RIPEMD-160
Fukang Liu, Gaoli Wang, Zhenfu Cao
Fukang Liu, Gaoli Wang, Zhenfu Cao
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
Mriganka Mandal, Ratna Dutta
Mriganka Mandal, Ratna Dutta
Tight Tradeoffs in Searchable Symmetric Encryption
Gilad Asharov, Gil Segev, Ido Shahaf
Gilad Asharov, Gil Segev, Ido Shahaf
Secure Two-Party Computation over Unreliable Channels
Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
Quantum Attacks on Some Feistel Block Ciphers
Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang
Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang
Finger Printing Data
Gideon Samid
Gideon Samid
Computer-aided proofs for multiparty computation with active security
Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
Secure Grouping and Aggregation with MapReduce
Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye
Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
Secure Two-party Threshold ECDSA from ECDSA Assumptions
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity
Changyu Dong, Grigorios Loukides
Changyu Dong, Grigorios Loukides
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets
Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal
Lior Rotem, Gil Segev
Lior Rotem, Gil Segev
New Instantiations of the CRYPTO 2017 Masking Schemes
Pierre Karpman, Daniel S. Roche
Pierre Karpman, Daniel S. Roche
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol
Matvei Kotov, Anton Menshov, Alexey Myasnikov, Dmitry Panteleev, Alexander Ushakov
Matvei Kotov, Anton Menshov, Alexey Myasnikov, Dmitry Panteleev, Alexander Ushakov
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed
Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert
Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
Benoît Cogliati, Jooyoung Lee
Benoît Cogliati, Jooyoung Lee
Unbounded Inner-Product Functional Encryption, with Succinct Keys
Edouard Dufour-Sans, David Pointcheval
Edouard Dufour-Sans, David Pointcheval
Pushing the Communication Barrier in Secure Computation using Lookup Tables
Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
Towards practical key exchange from ordinary isogeny graphs
Luca De Feo, Jean Kieffer, Benjamin Smith
Luca De Feo, Jean Kieffer, Benjamin Smith
Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Compact Multi-Signatures for Smaller Blockchains
Dan Boneh, Manu Drijvers, Gregory Neven
Dan Boneh, Manu Drijvers, Gregory Neven
SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority
Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
On the Exact Round Complexity of Secure Three-Party Computation
Arpita Patra, Divya Ravi
Arpita Patra, Divya Ravi
On Distributional Collision Resistant Hashing
Ilan Komargodski, Eylon Yogev
Ilan Komargodski, Eylon Yogev
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
Adrian G. Schipor
Adrian G. Schipor
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
Ali Aydin Selcuk
Ali Aydin Selcuk
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni
Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
Peter Sebastian Nordholt, Meilof Veeningen
Peter Sebastian Nordholt, Meilof Veeningen
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement
Daniele Friolo, Daniel Masny, Daniele Venturi
Daniele Friolo, Daniel Masny, Daniele Venturi
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality
Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion
Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
An Abstract Model of UTxO-based Cryptocurrencies with Scripts
Joachim Zahnentferner
Joachim Zahnentferner
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs
Yaobin Shen, Lei Wang
Yaobin Shen, Lei Wang
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
Nigel P. Smart, Tim Wood
Nigel P. Smart, Tim Wood
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain
Somnath Panja, Bimal Kumar Roy
Somnath Panja, Bimal Kumar Roy
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model
Geoffroy Couteau
Geoffroy Couteau
Cryptanalysis of MORUS
Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, and Benoît Viguier
Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, and Benoît Viguier
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
Logistic regression over encrypted data from fully homomorphic encryption
Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter
Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter
Continuous-Source Fuzzy Extractors: Source uncertainty and security
Benjamin Fuller, Lowen Peng
Benjamin Fuller, Lowen Peng
RapidChain: Scaling Blockchain via Full Sharding
Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
Supersingular Isogeny Oblivious Transfer (SIOT)
Paulo Barreto, Anderson Nascimento, Glaucio Oliveira, Waldyr Benits
Paulo Barreto, Anderson Nascimento, Glaucio Oliveira, Waldyr Benits
Characterizing Collision and Second-Preimage Resistance in Linicrypt
Ian McQuoid, Trevor Swope, Mike Rosulek
Ian McQuoid, Trevor Swope, Mike Rosulek
From FE Combiners to Secure MPC and Back
Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
An efficient structural attack on NIST submission DAGS
Elise Barelli, Alain Couvreur
Elise Barelli, Alain Couvreur
On Renyi Entropies and their Applications to Guessing Attacks in Cryptography
Serdar Boztas
Serdar Boztas
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies
Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
Floppy-Sized Group Signatures from Lattices
Cecilia Boschini, Jan Camenisch, Gregory Neven
Cecilia Boschini, Jan Camenisch, Gregory Neven
Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2
Panjin Kim, Daewan Han, Kyung Chul Jeong
Panjin Kim, Daewan Han, Kyung Chul Jeong
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
David W. Archer, Dan Bogdanov, Liina Kamm, Y. Lindell, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright
David W. Archer, Dan Bogdanov, Liina Kamm, Y. Lindell, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright
Key Prediction Security of Keyed Sponges
Bart Mennink
Bart Mennink
Non-adaptive Group-Testing Aggregate MAC Scheme
Shoichi Hirose, Junji Shikata
Shoichi Hirose, Junji Shikata
Improved Distinguisher Search Techniques Based on Parity Sets
Xiaofeng Xie, Tian Tian
Xiaofeng Xie, Tian Tian
A voting scheme with post-quantum security based on physical laws
Hua Dong, Li Yang
Hua Dong, Li Yang
CRPSF and NTRU Signatures over cyclotomic fields
Yang Wang, Mingqiang Wang
Yang Wang, Mingqiang Wang
Founding Cryptography on Smooth Projective Hashing
Bing Zeng
Bing Zeng
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits
Rishab Goyal
Rishab Goyal
SecureNN: Efficient and Private Neural Network Training
Sameer Wagh, Divya Gupta, Nishanth Chandran
Sameer Wagh, Divya Gupta, Nishanth Chandran
Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols
Amos Beimel, Naty Peter
Amos Beimel, Naty Peter
Formal Analysis of Distance Bounding with Secure Hardware
Handan Kılınç, Serge Vaudenay
Handan Kılınç, Serge Vaudenay
Tight Private Circuits: Achieving Probing Security with the Least Refreshing
Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference
Gaëtan Cassiers, François-Xavier Standaert
Gaëtan Cassiers, François-Xavier Standaert
Zero-Knowledge Protocols for Search Problems
Ben Berger, Zvika Brakerski
Ben Berger, Zvika Brakerski
Crash-tolerant Consensus in Directed Graph Revisited
Ashish Choudhury, Gayathri Garimella, Arpita Patra, Divya Ravi, Pratik Sarkar
Ashish Choudhury, Gayathri Garimella, Arpita Patra, Divya Ravi, Pratik Sarkar
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence
Bingsheng Zhang, Roman Oliynykov, Hamed Balogun
Bingsheng Zhang, Roman Oliynykov, Hamed Balogun
Towards Tight Security of Cascaded LRW2
Bart Mennink
Bart Mennink
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
Guowen Xu, Hongwei Li
Guowen Xu, Hongwei Li
Hidden Shift Quantum Cryptanalysis and Implications
Xavier Bonnetain, María Naya-Plasencia
Xavier Bonnetain, María Naya-Plasencia
Lightweight ASIC Implementation of AEGIS-128
Anubhab Baksi, Vikramkumar Pudi, Swagata Mandal, Anupam Chattopadhyay
Anubhab Baksi, Vikramkumar Pudi, Swagata Mandal, Anupam Chattopadhyay
A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms
Faruk Göloğlu, Antoine Joux
Faruk Göloğlu, Antoine Joux
Amortized Complexity of Information-Theoretically Secure MPC Revisited
Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
Differential Fault Analysis of Rectangle-80
Shobhit Sinha, Sandip Karmakar
Shobhit Sinha, Sandip Karmakar
Secure Boot and Remote Attestation in the Sanctum Processor
Ilia Lebedev, Kyle Hogan, Srinivas Devadas
Ilia Lebedev, Kyle Hogan, Srinivas Devadas
Adaptively Secure Proxy Re-encryption
Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
Implementing RLWE-based Schemes Using an RSA Co-Processor
Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
Circumventing Cryptographic Deniability with Remote Attestation
Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan
Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan
Yes, There is an Oblivious RAM Lower Bound!
Kasper Green Larsen, Jesper Buus Nielsen
Kasper Green Larsen, Jesper Buus Nielsen
Message-locked Encryption with File Update
Suyash Kandele, Souradyuti Paul
Suyash Kandele, Souradyuti Paul
TFHE: Fast Fully Homomorphic Encryption over the Torus
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance
Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu
Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu
Homomorphic Secret Sharing: Optimizations and Applications
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, Joel Emer
Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, Joel Emer
On the Security of Two-Round Multi-Signatures
Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs
Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs
Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers
Nadim Kobeissi, Natalia Kulatova
Nadim Kobeissi, Natalia Kulatova
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains
Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
Aggregation of Gamma-Signatures and Applications to Bitcoin
Yunlei Zhao
Yunlei Zhao
Scaling Backend Authentication at Facebook
Kevin Lewi, Callen Rain, Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang
Kevin Lewi, Callen Rain, Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
Unsupervised Machine Learning on Encrypted Data
Angela Jäschke, Frederik Armknecht
Angela Jäschke, Frederik Armknecht
A Note On Clauser-Horne-Shimony-Holt Inequality
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Laconic Function Evaluation and Applications
Willy Quach, Hoeteck Wee, Daniel Wichs
Willy Quach, Hoeteck Wee, Daniel Wichs
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem
Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu
Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu
“Larger Keys, Less Complexity” A Strategic Proposition
Gideon Samid
Gideon Samid
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
Sankhanil Dey, Ranjan Ghosh
Sankhanil Dey, Ranjan Ghosh
Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
ABY3: A Mixed Protocol Framework for Machine Learning
Payman Mohassel, Peter Rindal
Payman Mohassel, Peter Rindal
Another Look at Relay and Distance-based Attacks in Contactless Payments
Ioana Boureanu, Anda Anda
Ioana Boureanu, Anda Anda
Lattice-based Direct Anonymous Attestation (LDAA)
Nada EL Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
Nada EL Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
Agreement with Satoshi – On the Formalization of Nakamoto Consensus
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl
Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl
On the Feasibility of an ECDLP Algorithm
Sergey Grebnev
Sergey Grebnev
Fun with Bitcoin smart contracts
Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino
Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino
Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards
Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
New Bleichenbacher Records: Fault Attacks on qDSA Signatures
Akira Takahashi, Mehdi Tibouchi, Masayuki Abe
Akira Takahashi, Mehdi Tibouchi, Masayuki Abe
Secure Computation with Constant Communication Overhead using Multiplication Embeddings
Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen
Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
Laasya Bangalore, Ashish Choudhury, Arpita Patra
Laasya Bangalore, Ashish Choudhury, Arpita Patra
AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM
Matvei Kotov, Anton Menshov, Alexander Ushakov
Matvei Kotov, Anton Menshov, Alexander Ushakov
Making AES great again: the forthcoming vectorized AES instruction
Nir Drucker, Shay Gueron, Vlad Krasnov
Nir Drucker, Shay Gueron, Vlad Krasnov
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
Romain Gay, Lucas Kowalczyk, Hoeteck Wee
Romain Gay, Lucas Kowalczyk, Hoeteck Wee
MILP-based Differential Attack on Round-reduced GIFT
Baoyu Zhu, Xiaoyang Dong, Hongbo Yu
Baoyu Zhu, Xiaoyang Dong, Hongbo Yu
Distributed SSH Key Management with Proactive RSA Threshold Signatures
Yotam Harchol, Ittai Abraham, Benny Pinkas
Yotam Harchol, Ittai Abraham, Benny Pinkas
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
Seyed Farhad Aghili, Hamid Mala
Seyed Farhad Aghili, Hamid Mala
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority
Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
Certificateless Public Key Signature Schemes from Standard Algorithms
Zhaohui Cheng, Liqun Chen
Zhaohui Cheng, Liqun Chen
Cryptographic Hashing From Strong One-Way Functions
Justin Holmgren, Alex Lombardi
Justin Holmgren, Alex Lombardi
Fine-Grained and Application-Ready Distance-Bounding Security
Ioana Boureanu, David Gerault, Pascal Lafourcade
Ioana Boureanu, David Gerault, Pascal Lafourcade
CSIDH: An Efficient Post-Quantum Commutative Group Action
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
Revocable Identity-based Encryption from Codes with Rank Metric
Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
Masking the GLP Lattice-Based Signature Scheme at Any Order
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution
Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune Jakobsen, Mary Maller
Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune Jakobsen, Mary Maller
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)
Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng
Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability
Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement
Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos
Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos
Arithmetic Considerations for Isogeny Based Cryptography
Joppe W. Bos, Simon Friedberger
Joppe W. Bos, Simon Friedberger
Witness Indistinguishability for any Single-Round Argument with Applications to Access Control
Zvika Brakerski, Yael Tauman Kalai
Zvika Brakerski, Yael Tauman Kalai
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
Zhenzhen Bao, Jian Guo, Lei Wang
Zhenzhen Bao, Jian Guo, Lei Wang
PanORAMa: Oblivious RAM with Logarithmic Overhead
Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
A. V. Menyachikhin
A. V. Menyachikhin
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
Hyung Tae Lee, Huaxiong Wang, Kai Zhang
Hyung Tae Lee, Huaxiong Wang, Kai Zhang
Encryption with Untrusted Keys: Security against Chosen Objects Attack
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
Cache-Timing Attacks on RSA Key Generation
Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley
Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley
Directional Distance-Bounding Identification Protocols
Ahmad Ahmadi, Reihaneh Safavi-Naini
Ahmad Ahmadi, Reihaneh Safavi-Naini
Anonymous Distance-Bounding Identification
Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
Perfectly Secure Oblivious Parallel RAM
T-H. Hubert Chan, Kartik Nayak, Elaine Shi
T-H. Hubert Chan, Kartik Nayak, Elaine Shi
Private Anonymous Data Access
Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs
Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs
Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin, Christian Janson, Sogol Mazaheri
Marc Fischlin, Christian Janson, Sogol Mazaheri
Two-message Key Exchange with Strong Security from Ideal Lattices
Zheng Yang, Yu Chen, Song Luo
Zheng Yang, Yu Chen, Song Luo
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel
Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel
Efficient Erasable PUFs from Programmable Logic and Memristors
Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne Burleson, Omid Kavehei, Marten van Dijk, Damith C. Ranasinghe, Ulrich Rührmair
Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne Burleson, Omid Kavehei, Marten van Dijk, Damith C. Ranasinghe, Ulrich Rührmair
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
In Praise of Twisted Embeddings
Jheyne N. Ortiz, Robson R. de Araujo, Diego F. Aranha, Sueli I. R. Costa, Ricardo Dahab
Jheyne N. Ortiz, Robson R. de Araujo, Diego F. Aranha, Sueli I. R. Costa, Ricardo Dahab
Differential Fault Attacks on Deterministic Lattice Signatures
Leon Groot Bruinderink, Peter Pessl
Leon Groot Bruinderink, Peter Pessl
Start your ENGINEs: dynamically loadable contemporary crypto
Nicola Tuveri, Billy B. Brumley
Nicola Tuveri, Billy B. Brumley
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
Xin Li
Xin Li
Cryptography with Disposable Backdoors
Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas
Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas
A Chosen Plaintext Attack on Offset Public Permutation Mode
Miloslav Homer
Miloslav Homer
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk
An Analysis of the NIST SP 800-90A Standard
Joanne Woodage, Dan Shumow
Joanne Woodage, Dan Shumow
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu
Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
Stanislaw Jarecki, Boyang Wei
Stanislaw Jarecki, Boyang Wei
Collusion Resistant Traitor Tracing from Learning with Errors
Rishab Goyal, Venkata Koppula, Brent Waters
Rishab Goyal, Venkata Koppula, Brent Waters
In-region Authentication
Mamunur Rashid Akand, Reihaneh Safavi-Naini
Mamunur Rashid Akand, Reihaneh Safavi-Naini
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
Duc Viet Le, Mahimna Kelkar, Aniket Kate
Duc Viet Le, Mahimna Kelkar, Aniket Kate
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Ralph Ankele, Florian Böhl, Simon Friedberger
Ralph Ankele, Florian Böhl, Simon Friedberger
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj
William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
Johannes Blömer, Jan Bobolz
Johannes Blömer, Jan Bobolz
Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme
Thomas Debris-Alazard, Jean-Pierre Tillich
Thomas Debris-Alazard, Jean-Pierre Tillich
Quantum FHE (Almost) As Secure As Classical
Zvika Brakerski
Zvika Brakerski
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin, Patrick Harasser
Marc Fischlin, Patrick Harasser
SoK: The Problem Landscape of SIDH
David Urbanik, David Jao
David Urbanik, David Jao
Fast modular squaring with AVX512IFMA
Nir Drucker, Shay Gueron
Nir Drucker, Shay Gueron
Impossible Differential Attack on QARMA Family of Block Ciphers
Dong Yang, Wen-feng Qi, Hua-jin Chen
Dong Yang, Wen-feng Qi, Hua-jin Chen
Breaking the Circuit-Size Barrier in Secret Sharing
Tianren Liu, Vinod Vaikuntanathan
Tianren Liu, Vinod Vaikuntanathan
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Ralph Ankele, Eik List
Ralph Ankele, Eik List
Estimate all the {LWE, NTRU} schemes!
Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
Symbolic Side-Channel Analysis for Probabilistic Programs
Pasquale Malacaria, MHR. Khouzani, Corina S. Păsăreanu, Quoc-Sang Phan, Kasper Luckow
Pasquale Malacaria, MHR. Khouzani, Corina S. Păsăreanu, Quoc-Sang Phan, Kasper Luckow
Improved High-Order Conversion From Boolean to Arithmetic Masking
Luk Bettale, Jean-Sebastien Coron, Rina Zeitoun
Luk Bettale, Jean-Sebastien Coron, Rina Zeitoun
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Verifier Non-Locality in Interactive Proofs
Claude Crepeau, Nan Yang
Claude Crepeau, Nan Yang
Multi-power Post-quantum RSA
John M. Schanck
John M. Schanck
ACPC: Efficient revocation of pseudonym certificates using activation codes
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
General State Channel Networks
Stefan Dziembowski, Sebastian Faust, Kristina Hostáková
Stefan Dziembowski, Sebastian Faust, Kristina Hostáková
HydRand: Practical Continuous Distributed Randomness
Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
Practical attacks against the Walnut digital signature scheme
Ward Beullens, Simon R. Blackburn
Ward Beullens, Simon R. Blackburn
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel, Avishai Wool
Dor Fledel, Avishai Wool
Non-Malleable Secret Sharing
Vipul Goyal, Ashutosh Kumar
Vipul Goyal, Ashutosh Kumar
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert
Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert
Secure top most significant genome variants search: iDASH 2017 competition
Sergiu Carpov, Thibaud Tortech
Sergiu Carpov, Thibaud Tortech
On the cost of computing isogenies between supersingular elliptic curves
Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez
Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez
Multilinear maps via secret ring
Chunsheng Gu
Chunsheng Gu
DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models
Bita Darvish Rouhani, Huili Chen, farinaz Koushanfar
Bita Darvish Rouhani, Huili Chen, farinaz Koushanfar
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi
Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi
Error Estimation of Practical Convolution Discrete Gaussian Sampling with Rejection Sampling
Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Chunhuan Zhao
Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Chunhuan Zhao
On perfectly secure 2PC in the OT-hybrid model
Bar Alon, Anat Paskin-Cherniavsky
Bar Alon, Anat Paskin-Cherniavsky
Isolated Curves and the MOV Attack
Travis Scholl
Travis Scholl
State Separation for Code-Based Game-Playing Proofs
Chris Brzuska, Antoine Delignat-Lavaud, Cedric Fournet, Konrad Kohbrok, Markulf Kohlweiss
Chris Brzuska, Antoine Delignat-Lavaud, Cedric Fournet, Konrad Kohbrok, Markulf Kohlweiss
Efficient four-dimensional GLV curve with high security
Olivier Bernard, Renaud Dubois, Simon Masson
Olivier Bernard, Renaud Dubois, Simon Masson
Geosocial Query with User-Controlled Privacy
Peizhao Hu, Sherman S. M. Chow, Asma Aloufi
Peizhao Hu, Sherman S. M. Chow, Asma Aloufi
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
Bernardo David, Rafael Dowsley, Mario Larangeira
Bernardo David, Rafael Dowsley, Mario Larangeira
Rethinking Large-Scale Consensus
Rafael Pass, Elaine Shi
Rafael Pass, Elaine Shi
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Pascal Mainini, Rolf Haenni
Pascal Mainini, Rolf Haenni
Clusters of Re-used Keys
Stephen Farrell
Stephen Farrell
In search of CurveSwap: Measuring elliptic curve implementations in the wild
Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger
Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger
Fine-Grained Secure Computation
Matteo Campanelli, Rosario Gennaro
Matteo Campanelli, Rosario Gennaro
Asynchronous ratcheted key exchange
Bertram Poettering, Paul Rösler
Bertram Poettering, Paul Rösler
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version)
Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta
Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta
Learning strikes again: the case of the DRS signature scheme
Léo Ducas, Yang Yu
Léo Ducas, Yang Yu
Privacy Amplification from Non-malleable Codes
Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Linear Biases in AEGIS Keystream
Brice Minaud
Brice Minaud
Simulations of Optical Emissions for Attacking AES and Masked AES
Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani
Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System
Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min (Jerry) Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati
Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min (Jerry) Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati
Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue
Phillipp Schoppmann, Lennart Vogelsang, Adrià Gascón, Borja Balle
Phillipp Schoppmann, Lennart Vogelsang, Adrià Gascón, Borja Balle
Constant Size Traceable Ring Signature Scheme without Random Oracles
Ke Gu, Na Wu
Ke Gu, Na Wu
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Atanu Basu, Indranil Sengupta
Atanu Basu, Indranil Sengupta
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Björn Haase, Benoît Labrique
Björn Haase, Benoît Labrique
Collateral Damage of Facebook Applications: a Comprehensive Study
Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel
Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel
Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Qichun Wang
Qichun Wang
Homomorphic Rank Sort Using Surrogate Polynomials
Gizem S. Çetin, Berk Sunar
Gizem S. Çetin, Berk Sunar
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Jason LeGrow, David Jao, Reza Azarderakhsh
Jason LeGrow, David Jao, Reza Azarderakhsh
Upgrading to Functional Encryption
Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters
Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs
Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs
Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs
Mixed-radix Naccache-Stern encryption
Rémi Géraud, David Naccache
Rémi Géraud, David Naccache
Approximate and Probabilistic Differential Privacy Definitions
Sebastian Meiser
Sebastian Meiser
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
Mark Zhandry
Mark Zhandry
Lattice-Based zk-SNARKs from Square Span Programs
Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions
Rachid El Bansarkhani, Rafael Misoczki
Rachid El Bansarkhani, Rafael Misoczki
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More
Prabhanjan Ananth, Xiong Fan, Elaine Shi
Prabhanjan Ananth, Xiong Fan, Elaine Shi
Multi-Theorem Preprocessing NIZKs from Lattices
Sam Kim, David J. Wu
Sam Kim, David J. Wu
MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public
Borching Su
Borching Su
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
Douglas R. Stinson
Douglas R. Stinson
Vault: Fast Bootstrapping for the Algorand Cryptocurrency
Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich
Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead
Michael Raskin, Mark Simkin
Michael Raskin, Mark Simkin
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Patrick Longa
Patrick Longa
Authenticated key exchange for SIDH
Steven D. Galbraith
Steven D. Galbraith
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O’Neill
Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O’Neill
Security proof for Quantum Key Recycling with noise
Daan Leermakers, Boris Skoric
Daan Leermakers, Boris Skoric
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
Seyyed Mahdi Sedaghat, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri, Mohammad Reza Aref
Seyyed Mahdi Sedaghat, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri, Mohammad Reza Aref
Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies
Joachim Zahnentferner
Joachim Zahnentferner
Post-Quantum EPID Signatures from Symmetric Primitives
Dan Boneh, Saba Eskandarian, Ben Fisch
Dan Boneh, Saba Eskandarian, Ben Fisch
MDS Matrices with Lightweight Circuits
Sébastien Duval, Gaëtan Leurent
Sébastien Duval, Gaëtan Leurent
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption
Zheng Yang, Kimmo Järvinen
Zheng Yang, Kimmo Järvinen
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
On Quantum Indifferentiability
Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh
Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh
QC-MDPC: A Timing Attack and a CCA2 KEM
Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
Topology-Hiding Computation Beyond Semi-Honest Adversaries
Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
Logistic Regression Model Training based on the Approximate Homomorphic Encryption
Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon
Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon
Capsule: A Protocol for Secure Collaborative Document Editing
Nadim Kobeissi
Nadim Kobeissi
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract
Yongge Wang, Qutaibah m. Malluhi
Yongge Wang, Qutaibah m. Malluhi
VeritasDB: High Throughput Key-Value Store with Integrity
Rohit Sinha, Mihai Christodorescu
Rohit Sinha, Mihai Christodorescu
Making Public Key Functional Encryption Function Private, Distributively
Xiong Fan, Qiang Tang
Xiong Fan, Qiang Tang
Analysis of Deutsch-Jozsa Quantum Algorithm
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
Peter Gaži, Aggelos Kiayias, Alexander Russell
Peter Gaži, Aggelos Kiayias, Alexander Russell
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz
Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz
Universally Verifiable MPC with Applications to IRV Ballot Counting
Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague
Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague
Secure Search via Multi-Ring Fully Homomorphic Encryption
Adi Akavia, Dan Feldman, Hayim Shaul
Adi Akavia, Dan Feldman, Hayim Shaul
Faster Homomorphic Linear Transformations in HElib
Shai Halevi, Victor Shoup
Shai Halevi, Victor Shoup
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Indra Deep Mastan, Souradyuti Paul
Indra Deep Mastan, Souradyuti Paul
A New Constant-size Accountable Ring Signature Scheme Without Random Oracles
Sudhakar Kumawat, Souradyuti Paul
Sudhakar Kumawat, Souradyuti Paul
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
Neha Narula, Willy Vasquez, Madars Virza
Neha Narula, Willy Vasquez, Madars Virza
Towards Non-Interactive Zero-Knowledge for NP from LWE
Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
RepuCoin: Your Reputation is Your Power
Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Esteves-Verissimo
Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Esteves-Verissimo
Private Set Intersection with Linear Communication from General Assumptions
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
On Tightly Secure Non-Interactive Key Exchange
Julia Hesse, Dennis Hofheinz, Lisa Kohl
Julia Hesse, Dennis Hofheinz, Lisa Kohl
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network
Yuval Marcus, Ethan Heilman, Sharon Goldberg
Yuval Marcus, Ethan Heilman, Sharon Goldberg
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
Julian Loss, Tal Moran
Julian Loss, Tal Moran
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
Hagen Sparka, Florian Tschorsch, Björn Scheuermann
Hagen Sparka, Florian Tschorsch, Björn Scheuermann
Privacy-Preserving Logistic Regression Training
Charlotte Bonte, Frederik Vercauteren
Charlotte Bonte, Frederik Vercauteren
Improved fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
Masahiro Yagisawa
Remarks on Bell's Inequality
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren
Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren
Optimizing polynomial convolution for NTRUEncrypt
Wei Dai, William Whyte, Zhenfei Zhang
Wei Dai, William Whyte, Zhenfei Zhang
Non-interactive zaps of knowledge
Georg Fuchsbauer, Michele Orrù
Georg Fuchsbauer, Michele Orrù
Can We Overcome the $n \log n$ Barrier for Oblivious Sorting?
Wei-Kai Lin, Elaine Shi, Tiancheng Xie
Wei-Kai Lin, Elaine Shi, Tiancheng Xie
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
Sandro Coretti, Yevgeniy Dodis, Siyao Guo
Sandro Coretti, Yevgeniy Dodis, Siyao Guo
A foundation for secret, verifiable elections
Ben Smyth
Ben Smyth
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin
Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin
Shorter double-authentication preventing signatures for small address spaces
Bertram Poettering
Bertram Poettering
Authentication with weaker trust assumptions for voting systems
Elizabeth A. Quaglia, Ben Smyth
Elizabeth A. Quaglia, Ben Smyth
Bandwidth-Hard Functions: Reductions and Lower Bounds
Jeremiah Blocki, Peiyuan Liu, Ling Ren, and Samson Zhou
Jeremiah Blocki, Peiyuan Liu, Ling Ren, and Samson Zhou
PRO-ORAM: Constant Latency Read-Only Oblivious RAM
Shruti Tople, Yaoqi Jia, Prateek Saxena
Shruti Tople, Yaoqi Jia, Prateek Saxena
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin
Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin
On Evaluating Fault Resilient Encoding Schemes in Software
Jakub Breier, Xiaolu Hou, Yang Liu
Jakub Breier, Xiaolu Hou, Yang Liu
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Mihir Bellare, Wei Dai
Mihir Bellare, Wei Dai
Secure Computation with Low Communication from Cross-checking
S. Dov Gordon, Samuel Ranellucci, Xiao Wang
S. Dov Gordon, Samuel Ranellucci, Xiao Wang
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang
Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang
RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices
Ahmad Khoureich Ka
Ahmad Khoureich Ka
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt
I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan
Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan
Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates
Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay
Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
CALYPSO: Private Data Management for Decentralized Ledgers
Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford
Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford
TinyKeys: A New Approach to Efficient Multi-Party Computation
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Non-Malleable Codes for Small-Depth Circuits
Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan
Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan
Reading in the Dark: Classifying Encrypted Digits with Functional Encryption
Edouard Dufour-Sans, Romain Gay, David Pointcheval
Edouard Dufour-Sans, Romain Gay, David Pointcheval
Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time
Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Serge Fehr, Pierre Karpman, Bart Mennink
Serge Fehr, Pierre Karpman, Bart Mennink
Impeccable Circuits
Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider
Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider
Doing Real Work with FHE: The Case of Logistic Regression
Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup
Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup
Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers
Jim Basilakis, Bahman Javadi
Jim Basilakis, Bahman Javadi
Hermes. A framework for cryptographically assured access control and data security
Eugene Pilyankevich, Ignat Korchagin, Andrey Mnatsakanov
Eugene Pilyankevich, Ignat Korchagin, Andrey Mnatsakanov
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
A Key-recovery Attack on 855-round Trivium
Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
Green Mining: toward a less energetic impact of cryptocurrencies
Philippe Jacquet, Bernard Mans
Philippe Jacquet, Bernard Mans
Non-Profiled Deep Learning-Based Side-Channel Attacks
Benjamin Timon
Benjamin Timon
Breach-Resistant Structured Encryption
Ghous Amjad, Seny Kamara, Tarik Moataz
Ghous Amjad, Seny Kamara, Tarik Moataz
Proofs of Catalytic Space
Krzysztof Pietrzak
Krzysztof Pietrzak
A New Family of Pairing-Friendly elliptic curves
Michael Scott, Aurore Guillevic
Michael Scott, Aurore Guillevic
SoK: unraveling Bitcoin smart contracts
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys
Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Sikhar Patranabis, Debdeep Mukhopadhyay
Sikhar Patranabis, Debdeep Mukhopadhyay
Threshold Implementation in Software - Case Study of PRESENT
Pascal Sasdrich, René Bock, Amir Moradi
Pascal Sasdrich, René Bock, Amir Moradi
Kissing numbers and transference theorems from generalized tail bounds
Stephen D. Miller, Noah Stephens-Davidowitz
Stephen D. Miller, Noah Stephens-Davidowitz
Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model
Sean Bowe, Ariel Gabizon
Sean Bowe, Ariel Gabizon
RKHD ElGamal signing and 1-way sums
Daniel R. L. Brown
Daniel R. L. Brown
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
Yongjun Zhao, Sherman S. M. Chow
Yongjun Zhao, Sherman S. M. Chow
Simple Proofs of Sequential Work
Bram Cohen, Krzysztof Pietrzak
Bram Cohen, Krzysztof Pietrzak
Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES
Lorenzo Grassi, Christian Rechberger
Lorenzo Grassi, Christian Rechberger
Rasta: A cipher with low ANDdepth and few ANDs per bit
Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, and Christian Rechberger
Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, and Christian Rechberger
Two-Round Multiparty Secure Computation Minimizing Public Key Operations
Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
Ken Goss, Wei Jiang
Ken Goss, Wei Jiang
--Withdrawn--
Zhi Hu, Lin Wang, Chang-An Zhao
Zhi Hu, Lin Wang, Chang-An Zhao
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
Houssem Maghrebi, Emmanuel Prouff
Houssem Maghrebi, Emmanuel Prouff
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
Kamil Kluczniak, Man Ho Au
Kamil Kluczniak, Man Ho Au
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys
Vincent Grosso
Vincent Grosso
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
Chen-Dong Ye, Tian Tian
Chen-Dong Ye, Tian Tian
Vectorizing Higher-Order Masking
Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen
Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen
A First-Order SCA Resistant AES without Fresh Randomness
Felix Wegener, Amir Moradi
Felix Wegener, Amir Moradi
On the Complexity of Simulating Auxiliary Input
Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao
Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao
On the Ring-LWE and Polynomial-LWE problems
Miruna Rosca, Damien Stehlé, Alexandre Wallet
Miruna Rosca, Damien Stehlé, Alexandre Wallet
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method
Srimanta Bhattacharya, Mridul Nandi
Srimanta Bhattacharya, Mridul Nandi
Statistical Witness Indistinguishability (and more) in Two Messages
Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
On the Existence of Three Round Zero-Knowledge Proofs
Nils Fleischhacker, Vipul Goyal, Abhishek Jain
Nils Fleischhacker, Vipul Goyal, Abhishek Jain
Optimal Forgeries Against Polynomial-Based MACs and GCM
Atul Luykx, Bart Preneel
Atul Luykx, Bart Preneel
The Wonderful World of Global Random Oracles
Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
Pavel Hubáček, Alon Rosen, Margarita Vald
Pavel Hubáček, Alon Rosen, Margarita Vald
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele, Martijn Stam
Jean Paul Degabriele, Martijn Stam
Boomerang Connectivity Table: A New Cryptanalysis Tool
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
The Missing Difference Problem, and its Applications to Counter Mode Encryption
Gaëtan Leurent, Ferdinand Sibleyras
Gaëtan Leurent, Ferdinand Sibleyras
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Bernardo David, Rafael Dowsley, Mario Larangeira
Bernardo David, Rafael Dowsley, Mario Larangeira
A New Approach to Black-Box Concurrent Secure Computation
Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
Memory Lower Bounds of Reductions Revisited
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Constrained PRFs for NC1 in Traditional Groups
Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
Bootstrapping for Approximate Homomorphic Encryption
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules
Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim
Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim
Adaptively Secure Garbling with Near Optimal Online Complexity
Sanjam Garg, Akshayaram Srinivasan
Sanjam Garg, Akshayaram Srinivasan
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann, Thomas Pöppelmann, Johanna Sepulveda
Tim Fritzmann, Thomas Pöppelmann, Johanna Sepulveda
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation
Ilan Komargodski, Eylon Yogev
Ilan Komargodski, Eylon Yogev
The Complexity of Multiparty PSM Protocols and Related Models
Amos Beimel, Eyal Kushilevitz, Pnina Nissim
Amos Beimel, Eyal Kushilevitz, Pnina Nissim
Sustained Space Complexity
Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
Léo Ducas, Cécile Pierrot
Léo Ducas, Cécile Pierrot
Fast Near Collision Attack on the Grain v1 Stream Cipher
Bin Zhang, Chao Xu, Willi Meier
Bin Zhang, Chao Xu, Willi Meier
The Communication Complexity of Private Simultaneous Messages, Revisited
Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz
Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz
Conjecturally Superpolynomial Lower Bound for Share Size
Shahram Khazaei
Shahram Khazaei
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
Rui Zong, Xiaoyang Dong
Rui Zong, Xiaoyang Dong
Symbolic security of garbled circuits
Baiyu Li, Daniele Micciancio
Baiyu Li, Daniele Micciancio
A Reaction Attack on LEDApkc
Tomas Fabsic, Viliam Hromada, Pavol Zajac
Tomas Fabsic, Viliam Hromada, Pavol Zajac
Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth
Wen-jie Lu, Jun Sakuma
Wen-jie Lu, Jun Sakuma
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
Naor-Reingold Goes Public: The Complexity of Known-key Security
Pratik Soni, Stefano Tessaro
Pratik Soni, Stefano Tessaro
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Priyanka Bose, Viet Tung Hoang, Stefano Tessaro
Priyanka Bose, Viet Tung Hoang, Stefano Tessaro
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT
Daniel Jost, Christian Badertscher, Fabio Banfi
Daniel Jost, Christian Badertscher, Fabio Banfi
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem
Ayan Mahalanobis, Vivek Mallick
Ayan Mahalanobis, Vivek Mallick
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs
Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields
Gora Adj, Omran Ahmadi, Alfred Menezes
Gora Adj, Omran Ahmadi, Alfred Menezes
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum
Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum
SMT-based Cube Attack on Simeck32/64
Mojtaba Zaheri, Babak Sadeghiyan
Mojtaba Zaheri, Babak Sadeghiyan
Multi-mode Cryptocurrency Systems
Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou
Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation
Charanjit S. Jutla
Charanjit S. Jutla
Accountability in Security Protocols
Robert Künnemann, Deepak Garg, Michael Backes
Robert Künnemann, Deepak Garg, Michael Backes
Onion-AE: Foundations of Nested Encryption
Phillip Rogaway, Yusi Zhang
Phillip Rogaway, Yusi Zhang
Challenges in cyber security - Ransomware Phenomenon
Pasca Vlad-Raul, Simion Emil
Pasca Vlad-Raul, Simion Emil
Evaluating the indistinguishability of the XTS mode in the proposed security model
Nguyen Tuan Anh, Nguyen Bui Cuong
Nguyen Tuan Anh, Nguyen Bui Cuong
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
Howard M. Heys
Howard M. Heys
BitML: A Calculus for Bitcoin Smart Contracts
Massimo Bartoletti, Roberto Zunino
Massimo Bartoletti, Roberto Zunino
ECC mod 8^91+5
Daniel R. L. Brown
Daniel R. L. Brown
Efficient Circuit-based PSI via Cuckoo Hashing
Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder
Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder
Drive-by Key-Extraction Cache Attacks from Portable Code
Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
Updatable Encryption with Post-Compromise Security
Anja Lehmann, Bjoern Tackmann
Anja Lehmann, Bjoern Tackmann
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
Shai Halevi, Yuriy Polyakov, Victor Shoup
Shai Halevi, Yuriy Polyakov, Victor Shoup
Unbounded ABE via Bilinear Entropy Expansion, Revisited
Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
An Improved Affine Equivalence Algorithm for Random Permutations
Itai Dinur
Itai Dinur
Offline Assisted Group Key Exchange
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
Classification of Balanced Quadratic Functions
Lauren De Meyer, Begül Bilgin
Lauren De Meyer, Begül Bilgin
Just in Time Hashing
Benjamin Harsha, Jeremiah Blocki
Benjamin Harsha, Jeremiah Blocki
MRHS Solver Based on Linear Algebra and Exhaustive Search
Håvard Raddum, Pavol Zajac
Håvard Raddum, Pavol Zajac
Rank Analysis of Cubic Multivariate Cryptosystems
John Baena, Daniel Cabarcas, Daniel Escudero, Karan Khathuria, Javier Verbel
John Baena, Daniel Cabarcas, Daniel Escudero, Karan Khathuria, Javier Verbel
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme
Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck
Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
F. Betül Durak, Serge Vaudenay
F. Betül Durak, Serge Vaudenay
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
Carsten Baum, Huang Lin, Sabine Oechsner
Carsten Baum, Huang Lin, Sabine Oechsner
On the Gold Standard for Security of Universal Steganography
Sebastian Berndt, Maciej Liśkiewicz
Sebastian Berndt, Maciej Liśkiewicz
Combining Private Set-Intersection with Secure Two-Party Computation
Michele Ciampi, Claudio Orlandi
Michele Ciampi, Claudio Orlandi
PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus
Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar
Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar
Decomposition of Permutations in a Finite Field
Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Grafting Trees: a Fault Attack against the SPHINCS framework
Laurent Castelnovi, Ange Martinelli, Thomas Prest
Laurent Castelnovi, Ange Martinelli, Thomas Prest
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin
Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples
Hart Montgomery
Hart Montgomery
Improved Bounds on the Threshold Gap in Ramp Secret Sharing
Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano
Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano
How to Reveal the Secrets of an Obscure White-Box Implementation
Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang
Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
Andrea Visconti, Federico Gorla
Andrea Visconti, Federico Gorla
Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More
Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, Ari Juels
Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, Ari Juels
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt
Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Linh Tung Vo
Linh Tung Vo
Statistical Attacks on Cookie Masking for RC4
Kenneth G. Paterson, Jacob C. N. Schuldt
Kenneth G. Paterson, Jacob C. N. Schuldt
Constructions of S-boxes with uniform sharing
Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Polynomial multiplication over binary finite fields: new upper bounds
Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo
Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo
Secure and Scalable Multi-User Searchable Encryption
Cédric Van Rompay, Refik Molva, Melek Önen
Cédric Van Rompay, Refik Molva, Melek Önen
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
Fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
Masahiro Yagisawa
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Claude Carlet, Xi Chen
Claude Carlet, Xi Chen
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher
Gideon Samid
Gideon Samid
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
Maki Yoshida, Satoshi Obana
Maki Yoshida, Satoshi Obana
Synchronized Aggregate Signatures from the RSA Assumption
Susan Hohenberger, Brent Waters
Susan Hohenberger, Brent Waters
How to validate the secret of a Ring Learning with Errors (RLWE) key
Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough
Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough
A Cryptographic Analysis of the WireGuard Protocol
Benjamin Dowling, Kenneth G. Paterson
Benjamin Dowling, Kenneth G. Paterson
Progressive lattice sieving
Thijs Laarhoven, Artur Mariano
Thijs Laarhoven, Artur Mariano
A Systematic Approach To Cryptocurrency Fees
Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
On the Bit Security of Cryptographic Primitives
Daniele Micciancio, Michael Walter
Daniele Micciancio, Michael Walter
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
Daniel Dinu, Ilya Kizhvatov
Daniel Dinu, Ilya Kizhvatov
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang
Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang
Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
Template-based Fault Injection Analysis of Block Ciphers
Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay
Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Craig Gentry, Adam O'Neill, Leonid Reyzin
Craig Gentry, Adam O'Neill, Leonid Reyzin
Reusing Nonces in Schnorr Signatures
Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud
Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud
Simple Schnorr Multi-Signatures with Applications to Bitcoin
Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille
Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping
Hao Chen, Kyoohyung Han
Hao Chen, Kyoohyung Han
Tweaking Generic OTR to Avoid Forgery Attacks
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
Non-Locality in Interactive Proofs
Claude Crépeau, Nan Yang
Claude Crépeau, Nan Yang
Systematization Of A 256-Bit Lightweight Block Cipher Marvin
Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya
Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya
The Viability of Post-quantum X.509 Certificates
Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest
Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest
Countermeasures against a side-channel attack in a kernel memory
Na-Young Ahn, Dong Hoon Lee
Na-Young Ahn, Dong Hoon Lee
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
Pratish Datta, Tatsuaki Okamoto, Junichi Tomida
Pratish Datta, Tatsuaki Okamoto, Junichi Tomida
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
Abhinav Aggarwal, Yue Guo
Abhinav Aggarwal, Yue Guo
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Chen-Dong Ye, Tian Tian
Chen-Dong Ye, Tian Tian
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
Efficient Noninteractive Certification of RSA Moduli and Beyond
Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi
Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi
SETLA: Signature and Encryption from Lattices
François Gérard, Keno Merckx
François Gérard, Keno Merckx
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures
Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan
Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, Cecile Dumas
Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, Cecile Dumas
Optimizing Trees for Static Searchable Encryption
Mohammad Etemad, Mohammad Mahmoody, David Evans
Mohammad Etemad, Mohammad Mahmoody, David Evans
Semantic Security Invariance under Variant Computational Assumptions
Eftychios Theodorakis, John C. Mitchell
Eftychios Theodorakis, John C. Mitchell
A Constructive Perspective on Signcryption Security
Christian Badertscher, Fabio Banfi, Ueli Maurer
Christian Badertscher, Fabio Banfi, Ueli Maurer
Attacks and Countermeasures for White-box Designs
Alex Biryukov, Aleksei Udovenko
Alex Biryukov, Aleksei Udovenko
Impossible Differential Cryptanalysis on Deoxys-BC-256
Alireza mehrdad, Farokhlagha Moazami, Hadi Soleimany
Alireza mehrdad, Farokhlagha Moazami, Hadi Soleimany
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
Boris Ryabko, Aleksandr Soskov
Boris Ryabko, Aleksandr Soskov
Scalable, transparent, and post-quantum secure computational integrity
Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev
Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials
Jonathan Bootle, Jens Groth
Jonathan Bootle, Jens Groth
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem
Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka
Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar
Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar
Improved (Almost) Tightly-Secure Structure-Preserving Signatures
Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
Related Randomness Security for Public Key Encryption, Revisited
Takahiro Matsuda, Jacob C. N. Schuldt
Takahiro Matsuda, Jacob C. N. Schuldt
An Analysis of Acceptance Policies For Blockchain Transactions
Seb Neumayer, Mayank Varia, Ittay Eyal
Seb Neumayer, Mayank Varia, Ittay Eyal
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
Gregor Seiler
Gregor Seiler
On the Message Complexity of Secure Multiparty Computation
Yuval Ishai, Manika Mittal, Rafail Ostrovsky
Yuval Ishai, Manika Mittal, Rafail Ostrovsky
Weakly Secure Equivalence-Class Signatures from Standard Assumptions
Georg Fuchsbauer, Romain Gay
Georg Fuchsbauer, Romain Gay
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs
Peter Scholl
Peter Scholl
A Linearly Homomorphic Signature Scheme From Weaker Assumptions
Lucas Schabhüser, Johannes Buchmann, Patrick Struck
Lucas Schabhüser, Johannes Buchmann, Patrick Struck
Constant-size Group Signatures from Lattices
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security
Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
Publicly Verifiable Proofs of Space
Markus Jakobsson
Markus Jakobsson
Secure Remote Attestation
Markus Jakobsson
Markus Jakobsson
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu
Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
Johannes Blömer, Fabian Eidens, Jakob Juhnke
Johannes Blömer, Fabian Eidens, Jakob Juhnke
Compact Energy and Delay-Aware Authentication
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
A verifiable shuffle for the GSW cryptosystem
Martin Strand
Martin Strand
Zero-Knowledge Proof of Decryption for FHE Ciphertexts
Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand
Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
KEM Combiners
Federico Giacon, Felix Heuer, Bertram Poettering
Federico Giacon, Felix Heuer, Bertram Poettering
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Benedikt Auerbach, Mihir Bellare, Eike Kiltz
Benedikt Auerbach, Mihir Bellare, Eike Kiltz
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
Ali El Kaafarani, Shuichi Katsumata
Ali El Kaafarani, Shuichi Katsumata
Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography
Yu Chen, Baodong Qin, Haiyang Xue
Yu Chen, Baodong Qin, Haiyang Xue
Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project
Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
Daniel P. Martin, Luke Mather, Elisabeth Oswald
Daniel P. Martin, Luke Mather, Elisabeth Oswald
Multi-Key Searchable Encryption, Revisited
Ariel Hamlin, abhi shelat, Mor Weiss, Daniel Wichs
Ariel Hamlin, abhi shelat, Mor Weiss, Daniel Wichs
Verifiability of Helios Mixnet
Ben Smyth
Ben Smyth
New Techniques for Public Key Encryption with Sender Recovery
Murali Godi, Roopa Vishwanathan
Murali Godi, Roopa Vishwanathan
On Composable Security for Digital Signatures
Christian Badertscher, Ueli Maurer, Björn Tackmann
Christian Badertscher, Ueli Maurer, Björn Tackmann
Ubiquitous Weak-key Classes of BRW-polynomial Function
Kaiyan Zheng, Peng Wang, Dingfeng Ye
Kaiyan Zheng, Peng Wang, Dingfeng Ye
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
Benedikt Auerbach, Bertram Poettering
Benedikt Auerbach, Bertram Poettering
An Inside Job: Remote Power Analysis Attacks on FPGAs
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
Graded Encoding Schemes from Obfuscation
Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
Interactively Secure Groups from Obfuscation
Thomas Agrikola, Dennis Hofheinz
Thomas Agrikola, Dennis Hofheinz
Evaluation of Resilience of randomized RNS implementation
Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard
Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
Yu-Ao Chen, Xiao-Shan Gao
Yu-Ao Chen, Xiao-Shan Gao
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Qiong Huang, Hongbo Li
Qiong Huang, Hongbo Li
Higher Order Side-Channel Attacks Resilient S-boxes
Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch
Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch
Simple and Efficient Two-Server ORAM
S. Dov Gordon, Jonathan Katz, Xiao Wang
S. Dov Gordon, Jonathan Katz, Xiao Wang
On the Performance of Convolutional Neural Networks for Side-channel Analysis
Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay
Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor, Benny Pinkas, Eyal Ronen
Moni Naor, Benny Pinkas, Eyal Ronen
The Multiplicative Complexity of 6-variable Boolean Functions
Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate
Benny Applebaum, Barak Arkis
Benny Applebaum, Barak Arkis
A New Index Calculus Algorithm for the Elliptic Curve Discrete Logarithm Problem and Summation Polynomial Evaluation
Gary McGuire, Daniela Mueller
Gary McGuire, Daniela Mueller
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
Sachin Kumar, Jawad Haj-Yahya, Mustafa Khairallah, Mahmoud A. Elmohr, Anupam Chattopadhyay
Sachin Kumar, Jawad Haj-Yahya, Mustafa Khairallah, Mahmoud A. Elmohr, Anupam Chattopadhyay
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise
Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
Cryptanalysis of HK17
Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project
Yongge Wang, Qutaibah m. Malluhi
Yongge Wang, Qutaibah m. Malluhi
A first-order chosen-plaintext DPA attack on the third round of DES
Oscar Reparaz, Benedikt Gierlichs
Oscar Reparaz, Benedikt Gierlichs
A Universally Composable Treatment of Network Time
Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia
Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia
On the Strategy and Behavior of Bitcoin Mining with N-attackers
Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia
Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices
Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savaş
Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savaş
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
Yann Le Corre, Johann Großschädl, Daniel Dinu
Yann Le Corre, Johann Großschädl, Daniel Dinu
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Jacqueline Brendel, Marc Fischlin, Felix Günther
Jacqueline Brendel, Marc Fischlin, Felix Günther
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Nir Drucker, Shay Gueron
Nir Drucker, Shay Gueron
Non-Interactive Delegation for Low-Space Non-Deterministic Computation
Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs
Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs
Quantum cryptanalysis on some Generalized Feistel Schemes
Xiaoyang Dong, Zheng Li, Xiaoyun Wang
Xiaoyang Dong, Zheng Li, Xiaoyun Wang
Foundations of Homomorphic Secret Sharing
Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
Block encryption of quantum messages
Min Liang, Li Yang
Min Liang, Li Yang
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
Alessandro Cilardo, Andrea Primativo
Alessandro Cilardo, Andrea Primativo
IntegriKey: End-to-End Integrity Protection of User Input
Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun
Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun
Corrections to ''Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity''
Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng
Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng
Augmented Black-Box Simulation and Zero Knowledge Argument for NP
Li Hongda, Pan Dongxue, Ni Peifang
Li Hongda, Pan Dongxue, Ni Peifang
Designing Proof of Transaction Puzzles for Cryptocurrency
Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei
Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)
Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu
Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks
Mridula Singh, Patrick Leu, Srdjan Capkun
Mridula Singh, Patrick Leu, Srdjan Capkun
An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain
Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie
Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie
Efficient Oblivious Data Structures for Database Services on the Cloud
Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz
Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Thang Hoang, Attila A. Yavuz, Jorge Guajardo
Thang Hoang, Attila A. Yavuz, Jorge Guajardo
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations
Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret
Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret
Practical Quantum-Safe Voting from Lattices
Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
High-Precision Privacy-Preserving Real-Valued Function Evaluation
Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric
Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric
Provably secure compilation of side-channel countermeasures
Gilles Barthe, Benjamin Grégoire, Vincent Laporte
Gilles Barthe, Benjamin Grégoire, Vincent Laporte
Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants
Motahhareh Gharahi, Shahram Khazaei
Motahhareh Gharahi, Shahram Khazaei
Integer Reconstruction Public-Key Encryption
Houda Ferradi, David Naccache
Houda Ferradi, David Naccache
Overdrive: Making SPDZ Great Again
Marcel Keller, Valerio Pastro, Dragos Rotaru
Marcel Keller, Valerio Pastro, Dragos Rotaru
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
Akinori Hosoyamada, Yu Sasaki
Akinori Hosoyamada, Yu Sasaki
Speed-ups and time-memory trade-offs for tuple lattice sieving
Gottfried Herold, Elena Kirshanova, Thijs Laarhoven
Gottfried Herold, Elena Kirshanova, Thijs Laarhoven
VerMI: Verification Tool for Masked Implementations
Victor Arribas, Svetla Nikova, Vincent Rijmen
Victor Arribas, Svetla Nikova, Vincent Rijmen
New (and Old) Proof Systems for Lattice Problems
Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
Fast Garbling of Circuits over 3-Valued Logic
Yehuda Lindell, Avishay Yanai
Yehuda Lindell, Avishay Yanai
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
Keita Xagawa
Keita Xagawa
Generic Low-Latency Masking in Hardware
Hannes Gross, Rinat Iusupov, Roderick Bloem
Hannes Gross, Rinat Iusupov, Roderick Bloem
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search
Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz
Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz
Weak-Unforgeable Tags for Secure Supply Chain Management
Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr
Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change
Lynn Batten, Xun Yi
Lynn Batten, Xun Yi
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
TERMinator Suite: Benchmarking Privacy-Preserving Architectures
Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos
Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos
Linear Regression Side Channel Attack Applied on Constant XOR
Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, An Wang
Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, An Wang
Probabilistic and Considerate Attestation of IoT Devices against Roving Malware
Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik
Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz
Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic
Michael Meyer, Steffen Reith, Fabio Campos
Michael Meyer, Steffen Reith, Fabio Campos
A New Crypto-Classifier Service for Energy Efficiency in Smart Cities
Oana Stan, Mohamed-Haykel Zayani, Renaud Sirdey, Amira Ben Hamida, Alessandro Ferreira Leite, Mallek Mziou-Sallami
Oana Stan, Mohamed-Haykel Zayani, Renaud Sirdey, Amira Ben Hamida, Alessandro Ferreira Leite, Mallek Mziou-Sallami
Zero-Sum Partitions of PHOTON Permutations
Qingju Wang, Lorenzo Grassi, Christian Rechberger
Qingju Wang, Lorenzo Grassi, Christian Rechberger
Two-Face: New Public Key Multivariate Schemes
Gilles Macario-Rat, Jacques Patarin
Gilles Macario-Rat, Jacques Patarin
Improvements for Finding Impossible Differentials of Block Cipher Structures
Yiyuan Luo, Xuejia Lai
Yiyuan Luo, Xuejia Lai
Security notions for cloud storage and deduplication
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum
Unconditionally secure multi-party quantum commitment scheme
Mingqiang Wang, Xue Wang, Tao Zhan
Mingqiang Wang, Xue Wang, Tao Zhan
Asymptotically faster quantum algorithms to solve multivariate quadratic equations
Daniel J. Bernstein, Bo-Yin Yang
Daniel J. Bernstein, Bo-Yin Yang
Connecting Legendre with Kummer and Edwards
Sabyasachi Karati, Palash Sarkar
Sabyasachi Karati, Palash Sarkar
Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version)
Erick Nascimento, Lukasz Chmielewski
Erick Nascimento, Lukasz Chmielewski
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More
David Derler, Sebastian Ramacher, Daniel Slamanig
David Derler, Sebastian Ramacher, Daniel Slamanig
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs
Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities
Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box
Lorenzo Grassi
Lorenzo Grassi
Quantum Key-recovery Attack on Feistel Structures
Xiaoyang Dong, Xiaoyun Wang
Xiaoyang Dong, Xiaoyun Wang
Computing isogenies between Montgomery curves using the action of (0,0)
Joost Renes
Joost Renes
Reassessing Security of Randomizable Signatures
David Pointcheval, Olivier Sanders
David Pointcheval, Olivier Sanders
Post-Quantum Secure Remote Password Protocol from RLWE Problem
Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
CAPA: The Spirit of Beaver against Physical Attacks
Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Ivan Tjuawinata, Tao Huang, Hongjun Wu
Ivan Tjuawinata, Tao Huang, Hongjun Wu
Rhythmic Keccak: SCA Security and Low Latency in HW
Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen
Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu
Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu
Data Is a Stream: Security of Stream-Based Channels
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson
EPIC: Efficient Private Image Classification (or: Learning from the Masters)
Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
Return Of Bleichenbacher's Oracle Threat (ROBOT)
Hanno Böck, Juraj Somorovsky, Craig Young
Hanno Böck, Juraj Somorovsky, Craig Young
Signature Schemes with a Fuzzy Private Key
Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
On the Round Complexity of OT Extension
Sanjam Garg, Mohammad Mahmoody, Daniel Masny, Izaak Meckler
Sanjam Garg, Mohammad Mahmoody, Daniel Masny, Izaak Meckler
On Multiparty Garbling of Arithmetic Circuits
Aner Ben-Efraim
Aner Ben-Efraim
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
Jintai Ding, Scott Fluhrer, Saraswathy RV
Jintai Ding, Scott Fluhrer, Saraswathy RV
EFLASH: A New Multivariate Encryption Scheme
Ryann Cartor, Daniel Smith-Tone
Ryann Cartor, Daniel Smith-Tone
Round2: KEM and PKE based on GLWR
Hayo Baan, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Zhenfei Zhang
Hayo Baan, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Zhenfei Zhang
Distributed Algorithms Made Secure: A Graph Theoretic Approach
Merav Parter, Eylon Yogev
Merav Parter, Eylon Yogev
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs
Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang
Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang, Jakub Szefer, Ruben Niederhagen
Wen Wang, Jakub Szefer, Ruben Niederhagen
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
Claude Carlet, Stjepan Picek
Claude Carlet, Stjepan Picek
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu
Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu
Reusable Authentication from the Iris
Benjamin Fuller, Sailesh Simhadri, James Steel
Benjamin Fuller, Sailesh Simhadri, James Steel
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, Hai Zhou
Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, Hai Zhou
Short Solutions to Nonlinear Systems of Equations
Alan Szepieniec, Bart Preneel
Alan Szepieniec, Bart Preneel
Efficient Optimal Ate Pairing at 128-bit Security Level
Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera
Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
Osmanbey Uzunkol, Öznur Kalkar, İsa Sertkaya
Osmanbey Uzunkol, Öznur Kalkar, İsa Sertkaya
A Note on Stream Ciphers that Continuously Use the IV
Matthias Hamann, Matthias Krause, Willi Meier
Matthias Hamann, Matthias Krause, Willi Meier
Attacks on the AJPS Mersenne-based cryptosystem
Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
SAT-based Bit-flipping Attack on Logic Encryptions
Yuanqi Shen, Amin Rezaei, Hai Zhou
Yuanqi Shen, Amin Rezaei, Hai Zhou
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
David Berend, Bernhard Jungk, Shivam Bhasin
David Berend, Bernhard Jungk, Shivam Bhasin
Itsuku: a Memory-Hardened Proof-of-Work Scheme
Fabien Coelho, Arnaud Larroche, Baptiste Colin
Fabien Coelho, Arnaud Larroche, Baptiste Colin
Cryptocurrency Voting Games
Sanjay Bhattacherjee, Palash Sarkar
Sanjay Bhattacherjee, Palash Sarkar
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers
Jakub Breier, Dirmanto Jap, Shivam Bhasin
Jakub Breier, Dirmanto Jap, Shivam Bhasin
Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security
Megha Byali, Arpita Patra, Divya Ravi, Pratik Sarkar
Megha Byali, Arpita Patra, Divya Ravi, Pratik Sarkar
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
MILP-aided Cryptanalysis of Round Reduced ChaCha
Najwa Aaraj, Florian Caullery, Marc Manzano
Najwa Aaraj, Florian Caullery, Marc Manzano
Kayawood, a Key Agreement Protocol
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes.
Sankhanil Dey, Ranjan Ghosh
Sankhanil Dey, Ranjan Ghosh
A Practical Cryptanalysis of WalnutDSA
Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual Perez, Christophe Petit, Yuxuan Quek
Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual Perez, Christophe Petit, Yuxuan Quek
Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals
Gu Chunsheng
Gu Chunsheng
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM
Thang Hoang, Attila A. Yavuz, Betul F. Durak, Jorge Guajardo
Thang Hoang, Attila A. Yavuz, Betul F. Durak, Jorge Guajardo
ARM2GC: Succinct Garbled Processor for Secure Computation
Ebrahim M Songhori, M Sadegh Riazi, Siam U Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
Ebrahim M Songhori, M Sadegh Riazi, Siam U Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
Two-Round Multiparty Secure Computation from Minimal Assumptions
Sanjam Garg, Akshayaram Srinivasan
Sanjam Garg, Akshayaram Srinivasan
A Survey and Refinement of Repairable Threshold Schemes
Thalia M. Laing, Douglas R. Stinson
Thalia M. Laing, Douglas R. Stinson
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives
David Derler, Sebastian Ramacher, Daniel Slamanig
David Derler, Sebastian Ramacher, Daniel Slamanig
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware
Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels
Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption
Catherine Meadows
Catherine Meadows
Shorter Linear Straight-Line Programs for MDS Matrices
Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer
Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer
SWiM: Secure Wildcard Pattern Matching From OT Extension
Vladimir Kolesnikov, Mike Rosulek, Ni Trieu
Vladimir Kolesnikov, Mike Rosulek, Ni Trieu
Improved Cryptanalysis of HFEv- via Projection
Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone
Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone
Improvements to the Linear Operations of LowMC: A Faster Picnic
Daniel Kales, Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
Daniel Kales, Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
Under Pressure: Security of Caesar Candidates beyond their Guarantees
Serge Vaudenay, Damian Vizár
Serge Vaudenay, Damian Vizár
A Zero-Knowledge Version of vSQL
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
How Far Can We Reach? Breaking Masked AES Smartcard Implementation Using One Trace
Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage
Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage
Faster key compression for isogeny-based cryptosystems
Gustavo H. M. Zanon, Marcos A. Simplicio Jr, Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto
Gustavo H. M. Zanon, Marcos A. Simplicio Jr, Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto
PIR with compressed queries and amortized query processing
Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty
Sebastian Angel, Hao Chen, Kim Laine, and Srinath Setty
Cryptanalysis of Bivium using a Boolean all solution solver
Virendra Sule, Anmol Yadav
Virendra Sule, Anmol Yadav
Lattice Klepto: Turning Post-Quantum Crypto Against Itself
Robin Kwant, Tanja Lange, Kimberley Thissen
Robin Kwant, Tanja Lange, Kimberley Thissen
Decoding Linear Codes with High Error Rate and its Impact for LPN Security
Leif Both, Alexander May
Leif Both, Alexander May
The Parallel Repetition of Non-Signaling Games: Counterexamples and Dichotomy
Justin Holmgren, Lisa Yang
Justin Holmgren, Lisa Yang
Note on the Robustness of CAESAR Candidates
Daniel Kales, Maria Eichlseder, Florian Mendel
Daniel Kales, Maria Eichlseder, Florian Mendel
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Maria Eichlseder and Daniel Kales
Maria Eichlseder and Daniel Kales
On the Complexity of the Hybrid Approach on HFEv-
Albrecht Petzoldt
Albrecht Petzoldt
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
Jeroen Delvaux
Jeroen Delvaux
Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom
Anton Muehlemann
Anton Muehlemann
Doubly-efficient zkSNARKs without trusted setup
Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, Michael Walfish
Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, Michael Walfish
A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption
Mikhail Anokhin
Mikhail Anokhin
Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio
Daniel Jost, Ueli Maurer, Joao L. Ribeiro
Daniel Jost, Ueli Maurer, Joao L. Ribeiro
Probabilistic solution of Yao's millionaires' problem
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices
Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
On the Leakage Resilience of Ring-LWE Based Public Key Encryption
Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
Privacy Games for Syntactic Privacy Notions
Robin Ankele, Andrew Simpson
Robin Ankele, Andrew Simpson
k-Round MPC from k-Round OT via Garbled Interactive Circuits
Fabrice Benhamouda, Huijia Lin
Fabrice Benhamouda, Huijia Lin
A formal model of Bitcoin transactions
Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino
Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs
Cecilia Boschini, Jan Camenisch, Gregory Neven
Cecilia Boschini, Jan Camenisch, Gregory Neven
On post-processing in the quantum algorithm for computing short discrete logarithms
Martin Ekerå
Martin Ekerå
Differential Attacks on LILLIPUT Cipher
Valérie Nachef, Nicolas Marrière, Emmanuel Volte
Valérie Nachef, Nicolas Marrière, Emmanuel Volte
A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage
David Cash, Cong Zhang
David Cash, Cong Zhang
Detection of cryptographic algorithms with grap
Léonard Benedetti, Aurélien Thierry, Julien Francq
Léonard Benedetti, Aurélien Thierry, Julien Francq
Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman
Risky Traitor Tracing and New Differential Privacy Negative Results
Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters
Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
Hardware Aspects of Montgomery Modular Multiplication
Colin D. Walter
Colin D. Walter
Fast Homomorphic Evaluation of Deep Discretized Neural Networks
Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
The Discrete-Logarithm Problem with Preprocessing
Henry Corrigan-Gibbs, Dmitry Kogan
Henry Corrigan-Gibbs, Dmitry Kogan
Manifold Learning Towards Masking Implementations: A First Study
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng
Fuzzy Password-Authenticated Key Exchange
Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, and Sophia Yakoubov
Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, and Sophia Yakoubov
A Systematic Evaluation of Profiling Through Focused Feature Selection
Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina
Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation for Machine Learning
Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi
Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi
Cryptographic Pairings
Kristin Lauter, Michael Naehrig
Kristin Lauter, Michael Naehrig
Hardness of Non-Interactive Differential Privacy from One-Way Functions
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Daniel Wichs
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Daniel Wichs
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)
Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng
Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance
Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang
Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang
Efficient provable-secure NTRUEncrypt over any cyclotomic field
Yang Wang, Mingqiang Wang
Yang Wang, Mingqiang Wang
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
Vahid Amin Ghafari, Honggang Hu
Vahid Amin Ghafari, Honggang Hu
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang
Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method
Sadegh Jamshidpour, Zahra Ahmadian
Sadegh Jamshidpour, Zahra Ahmadian
The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage
David Pouliot, Scott Griffy, Charles V. Wright
David Pouliot, Scott Griffy, Charles V. Wright
Non-malleable Randomness Encoders and their Applications
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited
Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
Analysis of the Bitcoin UTXO set
Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
Privately Constraining and Programming PRFs, the LWE Way
Chris Peikert, Sina Shiehian
Chris Peikert, Sina Shiehian
Proposal for Protocol on a Quorum Blockchain with Zero Knowledge
Thomas Espel, Laurent Katz, Guillaume Robin
Thomas Espel, Laurent Katz, Guillaume Robin
Universally Composable Secure Computation with Corrupted Tokens
Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards
Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers
Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels
Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels
Secure Deduplication of Encrypted Data: Refined Model and New Constructions
Jian Liu, Li Duan, Yong Li, N. Asokan
Jian Liu, Li Duan, Yong Li, N. Asokan
Promise Zero Knowledge and its Applications to Round Optimal MPC
Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
General purpose integer factoring
Arjen K. Lenstra
Arjen K. Lenstra
Order-Revealing Encryption: File-Injection Attack and Forward Security
Xingchen Wang, Yunlei Zhao
Xingchen Wang, Yunlei Zhao
Improving Side-channel Analysis through Semi-supervised Learning
Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond
Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version)
Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim
Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Zhi Chen, Junjie Shen, Alex Nicolau, Alex Veidenbaum, Nahid Farhady Ghalaty, Rosario Cammarota
Zhi Chen, Junjie Shen, Alex Nicolau, Alex Veidenbaum, Nahid Farhady Ghalaty, Rosario Cammarota
Instruction Duplication: Leaky and Not Too Fault-Tolerant!
Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers
Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers
The Montgomery and Joye Powering Ladders are Dual
Colin D. Walter
Colin D. Walter
Quantum Lightning Never Strikes the Same State Twice
Mark Zhandry
Mark Zhandry
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
Andreas Wiemers, Dominik Klein
Andreas Wiemers, Dominik Klein
The Tao of Inference in Privacy-Protected Databases
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov
A New Generalization of the KMOV Cryptosystem
Maher Boudabra, Abderrahmane Nitaj
Maher Boudabra, Abderrahmane Nitaj
A generalized attack on RSA type cryptosystems
Martin Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Martin Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20
S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi
S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers
Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
Settling the mystery of $Z_r=r$ in RC4
Sabyasachi Dey, Santanu Sarkar
Sabyasachi Dey, Santanu Sarkar
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks
Le Dong, Yongxia Mao
Le Dong, Yongxia Mao
The Transaction Graph for Modeling Blockchain Semantics
Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolić
Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolić
Non-Malleability vs. CCA-Security: The Case of Commitments
Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp
Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data
Marie-Sarah Lacharité, Kenneth G. Paterson
Marie-Sarah Lacharité, Kenneth G. Paterson
Regulating Storage Overhead in Existing PoW-based Blockchains
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
--Withdrawn--
Reyhaneh Rabaninejad, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian Attari, Mohammad Reza Aref
Reyhaneh Rabaninejad, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian Attari, Mohammad Reza Aref
An Algebraic Approach to Maliciously Secure Private Set Intersection
Satrajit Ghosh, Tobias Nilges
Satrajit Ghosh, Tobias Nilges
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (Full Version)
Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
Towards Breaking the Exponential Barrier for General Secret Sharing
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
Raphael Bost, Pierre-Alain Fouque
Raphael Bost, Pierre-Alain Fouque
CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite
Lijing Zhou, Licheng Wang, Yiru Sun
Lijing Zhou, Licheng Wang, Yiru Sun
Optimal Key Consensus in Presence of Noise
Zhengzhong Jin, Yunlei Zhao
Zhengzhong Jin, Yunlei Zhao
Montgomery Arithmetic from a Software Perspective
Joppe W. Bos, Peter L. Montgomery
Joppe W. Bos, Peter L. Montgomery
Round-Optimal Secure Multi-Party Computation
Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Cellular Automata Based S-boxes
Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic
Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic
On the security of another CRC based ultralightweight RFID authentication protocol
Seyed Farhad Aghili, Hamid Mala
Seyed Farhad Aghili, Hamid Mala
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'
Gilles Barthe, François Dupressoir, Benjamin Grégoire
Gilles Barthe, François Dupressoir, Benjamin Grégoire
Early Detection and Analysis of Leakage Abuse Vulnerabilities
Charles V. Wright, David Pouliot
Charles V. Wright, David Pouliot
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model
Sean Bowe, Ariel Gabizon, Ian Miers
Sean Bowe, Ariel Gabizon, Ian Miers
A Practical Implementation of Identity-Based Encryption over NTRU Lattices
Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
Non-malleable Codes against Lookahead Tampering
Divya Gupta, Hemanta K. Maji, Mingyuan Wang
Divya Gupta, Hemanta K. Maji, Mingyuan Wang
Consolidating Inner Product Masking
Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
Approximate Thumbnail Preserving Encryption
Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba
Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba
Tightly-Secure PAK(E)
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
Strain: A Secure Auction for Blockchains
Erik-Oliver Blass, Florian Kerschbaum
Erik-Oliver Blass, Florian Kerschbaum
An E-voting Protocol Based on Blockchain
Yi Liu, Qi Wang
Yi Liu, Qi Wang
On one-round reliable message transmission
René Bødker Christensen
René Bødker Christensen
Compact Zero-Knowledge Proofs of Small Hamming Weight
Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin
Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin
Threshold Implementations of GIFT: A Trade-off Analysis
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya, Donghoon Chang
Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya, Donghoon Chang
Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones
Muslum Ozgur Ozmen, Attila A. Yavuz
Muslum Ozgur Ozmen, Attila A. Yavuz
Embedded Proofs for Verifiable Neural Networks
Hervé Chabanne, Julien Keuffer, Refik Molva
Hervé Chabanne, Julien Keuffer, Refik Molva
DAGS: Key Encapsulation using Dyadic GS Codes
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
Rotational-XOR Cryptanalysis of Reduced-round SPECK
Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur
Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur
Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications
Tassos Dimitriou
Tassos Dimitriou
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy
Sebastian Meiser, Esfandiar Mohammadi
Sebastian Meiser, Esfandiar Mohammadi
Foundations of Differentially Oblivious Algorithms
T-H. Hubert Chan, Kai-Min Chung, Bruce Maggs, Elaine Shi
T-H. Hubert Chan, Kai-Min Chung, Bruce Maggs, Elaine Shi
Performing Computations on Hierarchically Shared Secrets
Giulia Traverso, Denise Demirel, Johannes Buchmann
Giulia Traverso, Denise Demirel, Johannes Buchmann
Lightweight Design Choices for LED-like Block Ciphers
Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay
Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-based Constructions
Ling Song, Jian Guo, Danping Shi, San Ling
Ling Song, Jian Guo, Danping Shi, San Ling
Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge
Pyrros Chaidos, Geoffroy Couteau
Pyrros Chaidos, Geoffroy Couteau
Cryptanalysis of 1-Round KECCAK
Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda AlKhzaimi
Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda AlKhzaimi
Eliminating Variables in Boolean Equation Systems
Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus
Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus
Cube Attack against Full Kravatte
Jian Guo, Ling Song
Jian Guo, Ling Song
Rounded Gaussians -- Fast and Secure Constant-Time Sampling for Lattice-Based Crypto
Andreas Hülsing, Tanja Lange, Kit Smeets
Andreas Hülsing, Tanja Lange, Kit Smeets
Revisiting a Masked Lookup-Table Compression Scheme
Srinivas Vivek
Srinivas Vivek
Several Masked Implementations of the Boyar-Peralta AES S-Box
Ashrujit Ghoshal, Thomas De Cnudde
Ashrujit Ghoshal, Thomas De Cnudde
Direct Anonymous Attestation from Lattices
Rachid El Bansarkhani, Ali El Kaafarani
Rachid El Bansarkhani, Ali El Kaafarani
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round
Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves
Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li
Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin
Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin
A Fair Protocol for Data Trading Based on Bitcoin Transactions
Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart\'ı
Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart\'ı
Differential Cryptanalysis of 18-Round PRIDE
Virginie Lallemand, Shahram Rasoolzadeh
Virginie Lallemand, Shahram Rasoolzadeh
Differentially Private Access Patterns in Secure Computation
Sahar Mazloom, S. Dov Gordon
Sahar Mazloom, S. Dov Gordon
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
Armando Faz-Hernández, Julio López, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
Armando Faz-Hernández, Julio López, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
Attacking Deterministic Signature Schemes using Fault Attacks
Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler
Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler
Homomorphic SIM$^2$D Operations: Single Instruction Much More Data
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Conditional Cube Attack on Round-Reduced River Keyak
Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang
Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang
Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption
Eduard Hauck, Julian Loss
Eduard Hauck, Julian Loss
A New Digital Rights Management Solution Based on White-Box Cryptography
Jun Liu, Yupu Hu
Jun Liu, Yupu Hu
Architecture level Optimizations for Kummer based HECC on FPGAs
Gabriel Gallin, Turku Ozlum Celik, Arnaud Tisserand
Gabriel Gallin, Turku Ozlum Celik, Arnaud Tisserand
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta
Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Herman Galteland, Kristian Gjøsteen
Herman Galteland, Kristian Gjøsteen
Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network
Ashish Choudhury, Arpita Patra, Divya Ravi
Ashish Choudhury, Arpita Patra, Divya Ravi
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa
Garbled Protocols and Two-Round MPC from Bilinear Maps
Sanjam Garg, Akshayaram Srinivasan
Sanjam Garg, Akshayaram Srinivasan
Secure Multi-Party Computation in Large Networks
Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani
Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications
Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo
Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo
Impossibility of Order-Revealing Encryption in Idealized Models
Mark Zhandry, Cong Zhang
Mark Zhandry, Cong Zhang
No right to remain silent: Isolating Malicious Mixes
Hemi Leibowitz, Ania Piotrowska, George Danezis, Amir Herzberg
Hemi Leibowitz, Ania Piotrowska, George Danezis, Amir Herzberg
Shortest Vector from Lattice Sieving: a Few Dimensions for Free
Léo Ducas
Léo Ducas
A Comparative Investigation of Approximate Attacks on Logic Encryptions
Yuanqi Shen, Amin Rezaei, Hai Zhou
Yuanqi Shen, Amin Rezaei, Hai Zhou
Hash Proof Systems over Lattices Revisited
Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach
Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach
Large FHE gates from Tensored Homomorphic Accumulator
Guillaume Bonnoron, Léo Ducas, Max Fillinger
Guillaume Bonnoron, Léo Ducas, Max Fillinger
A signature scheme from Learning with Truncation
Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
Separable Statistics and Multidimensional Linear Cryptanalysis
S. Fauskanger, I. Semaev
S. Fauskanger, I. Semaev
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
Leakage Bounds for Gaussian Side Channels
Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank Gürkaynak, Michael Muehlberghuber
Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank Gürkaynak, Michael Muehlberghuber
Secure Code Updates for Smart Embedded Devices based on PUFs
Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
Bounds on Differential and Linear Branch Number of Permutations
Sumanta Sarkar, Habeeb Syed
Sumanta Sarkar, Habeeb Syed
Decentralized Multi-Client Functional Encryption for Inner Product
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers
Yusong Du, Baodian Wei
Yusong Du, Baodian Wei
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Fuyuki Kitagawa, Keisuke Tanaka
Fuyuki Kitagawa, Keisuke Tanaka
On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves
Kirsten Eisentraeger, Sean Hallgren, Travis Morrison
Kirsten Eisentraeger, Sean Hallgren, Travis Morrison
Breaking Ed25519 in WolfSSL
Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella
Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin, Sogol Mazaheri
Marc Fischlin, Sogol Mazaheri
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
Katriel Cohn-Gordon, Cas Cremers
Katriel Cohn-Gordon, Cas Cremers
Efficient Maliciously Secure Multiparty Computation for RAM
Marcel Keller, Avishay Yanai
Marcel Keller, Avishay Yanai
Yoyo Tricks with AES
Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth
Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption
Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations
Akinori Hosoyamada, Yu Sasaki
Akinori Hosoyamada, Yu Sasaki
Improvements for Gate-Hiding Garbled Circuits
Mike Rosulek
Mike Rosulek
Differential Attacks on Deterministic Signatures
Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray
Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray
Obscuro: A Bitcoin Mixer using Trusted Execution Environments
Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena
Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena
Symmetric Searchable Encryption with Sharing and Unsharing
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation
Abdelrahaman Aly, Sara Cleemput
Abdelrahaman Aly, Sara Cleemput
A New Functional Encryption for Multidimensional Range Query
Jia Xu, Ee-Chien Chang, Jianying Zhou
Jia Xu, Ee-Chien Chang, Jianying Zhou
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Bei Liang, Aikaterini Mitrokotsa
Bei Liang, Aikaterini Mitrokotsa
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls
Sarani Bhattacharya, Clementine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay
Sarani Bhattacharya, Clementine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
Optimal Parameters for XMSS^MT
Andreas Hülsing, Lea Rausch, Johannes Buchmann
Andreas Hülsing, Lea Rausch, Johannes Buchmann
WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes
Andreas Hülsing
Andreas Hülsing
Recursive ORAMs with Practical Constructions
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Sarvar Patel, Giuseppe Persiano, Kevin Yeo
Non-Interactive Proofs of Proof-of-Work
Aggelos Kiayias, Andrew Miller, Dionysis Zindros
Aggelos Kiayias, Andrew Miller, Dionysis Zindros
Hard and Easy Problems for Supersingular Isogeny Graphs
Christophe Petit, Kristin Lauter
Christophe Petit, Kristin Lauter
An Offline Dictionary Attack against zkPAKE Protocol
Jose Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot
Jose Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot
Unforgeable Quantum Encryption
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU
Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
Two-Message, Oblivious Evaluation of Cryptographic Functionalities
Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder
Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder
From Selective IBE to Full IBE and Selective HIBE
Nico Döttling, Sanjam Garg
Nico Döttling, Sanjam Garg
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption
Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai
Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai
Towards Practical Privacy-Preserving Genome-Wide Association Study
Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency---Choose Two
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures
George Teseleanu
George Teseleanu
Secure Two-Party Computation with Fairness -- A Necessary Design Principle
Yehuda Lindell, Tal Rabin
Yehuda Lindell, Tal Rabin
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Saeed Mahloujifar, Mohammad Mahmoody
Saeed Mahloujifar, Mohammad Mahmoody
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
Evolving Secret Sharing: Dynamic Thresholds and Robustness
Ilan Komargodski, Anat Paskin-Cherniavsky
Ilan Komargodski, Anat Paskin-Cherniavsky
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model
Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks
Fermi Ma, Mark Zhandry
Fermi Ma, Mark Zhandry
Moderately Hard Functions: Definition, Instantiations, and Applications
Joël Alwen, Björn Tackmann
Joël Alwen, Björn Tackmann
A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models
Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
When does Functional Encryption Imply Obfuscation?
Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
On Secure Two-Party Computation in Three Rounds
Prabhanjan Ananth, Abhishek Jain
Prabhanjan Ananth, Abhishek Jain
CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage
Reyhaneh Rabaninejad, Mahmoud Ahmadian Attari, Maryam Rajabzadeh Asaar, Mohammad Reza Aref
Reyhaneh Rabaninejad, Mahmoud Ahmadian Attari, Maryam Rajabzadeh Asaar, Mohammad Reza Aref
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
Amos Beimel, Oriol Farràs, Yuval Mintz, Naty Peter
Amos Beimel, Oriol Farràs, Yuval Mintz, Naty Peter
Towards Optimal Pre-processing in Leakage Detection
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
On the security of the WOTS-PRF signature scheme
Philip Lafrance, Alfred Menezes
Philip Lafrance, Alfred Menezes
Random Oracles and Non-Uniformity
Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John Steinberger
Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John Steinberger
A tight security reduction in the quantum random oracle model for code-based signature schemes
André Chailloux, Thomas Debris-Alazard
André Chailloux, Thomas Debris-Alazard
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal, Vipul Goyal
Rishab Goyal, Vipul Goyal
Adaptively Indistinguishable Garbled Circuits
Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs
Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs
Improving Stateless Hash-Based Signatures
Jean-Philippe Aumasson, Guillaume Endignoux
Jean-Philippe Aumasson, Guillaume Endignoux
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin
Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Four-state Non-malleable Codes with Explicit Constant Rate
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
How to Securely Compute with Noisy Leakage in Quasilinear Complexity
Dahmun Goudarzi, Antoine Joux, Matthieu Rivain
Dahmun Goudarzi, Antoine Joux, Matthieu Rivain
Environmental Authentication in Malware
Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bulent Yener
Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bulent Yener
Near-Optimal Secret Sharing and Error Correcting Codes in AC0
Kuan Cheng, Yuval Ishai, Xin Li
Kuan Cheng, Yuval Ishai, Xin Li
How to Construct a Leakage-Resilient (Stateless) Trusted Party
Daniel Genkin, Yual Ishai, Mor Weiss
Daniel Genkin, Yual Ishai, Mor Weiss
Resettably-Sound Resettable Zero Knowledge in Constant Rounds
Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM
T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension
Long Chen, Zhenfeng Zhang, Xueqing Wang
Long Chen, Zhenfeng Zhang, Xueqing Wang
On the impossibility of entropy reversal, and its application to zero-knowledge proofs
Shachar Lovett, Jiapeng Zhang
Shachar Lovett, Jiapeng Zhang
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu
Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Oriol Farràs, Tarik Kaced, Sebastià Martín, Carles Padró
Oriol Farràs, Tarik Kaced, Sebastià Martín, Carles Padró
Linear Repairing Codes and Side-Channel Attacks
Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff
Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff
A practical, perfectly secure password scheme in the bounded retrieval model
Moses Liskov
Moses Liskov
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model
Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work
Lisa Eckey, Sebastian Faust, Julian Loss
Lisa Eckey, Sebastian Faust, Julian Loss
Cache-Oblivious and Data-Oblivious Sorting and Applications
T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass, Elaine Shi
Rafael Pass, Elaine Shi
On Two Round Rerunnable MPC Protocols
Paul Laird
Paul Laird
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh
Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey
Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey
Clarifying the subset-resilience problem
Jean-Philippe Aumasson, Guillaume Endignoux
Jean-Philippe Aumasson, Guillaume Endignoux
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
Ivan Damgård, Claudio Orlandi, Mark Simkin
Ivan Damgård, Claudio Orlandi, Mark Simkin
On the differential equivalence of APN functions
Anastasiya Gorodilova
Anastasiya Gorodilova
Notes On GGH13 Without The Presence Of Ideals
Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet--Mary
Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet--Mary
Shorter Ring Signatures from Standard Assumptions
Alonso González
Alonso González
On Iterative Collision Search for LPN and Subset Sum
Srinivas Devadas, Ling Ren, Hanshen Xiao
Srinivas Devadas, Ling Ren, Hanshen Xiao
On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments
Omer Paneth, Guy N. Rothblum
Omer Paneth, Guy N. Rothblum
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors
Essam Ghadafi
Essam Ghadafi
Stateful Multi-Client Verifiable Computation
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
Proof of a shuffle for lattice-based cryptography (Full version)
Núria Costa, Ramiro Martínez, Paz Morillo
Núria Costa, Ramiro Martínez, Paz Morillo
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement
Bernardo David, Rafael Dowsley, Mario Larangeira
Bernardo David, Rafael Dowsley, Mario Larangeira
Putting Wings on SPHINCS
Stefan Kölbl
Stefan Kölbl
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Roderick Bloem, Hannes Gross, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter
Roderick Bloem, Hannes Gross, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
Ashokkumar C, M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes
Ashokkumar C, M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes
Linear Cryptanalysis of DES with Asymmetries
Andrey Bogdanov, Philip S. Vejre
Andrey Bogdanov, Philip S. Vejre
An Efficient Pairing-Based Shuffle Argument
Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac
Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space
Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin
Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin
The Iterated Random Function Problem
Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi
Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi
Finding Bugs in Cryptographic Hash Function Implementations
Nicky Mouha, Mohammad S Raunak, D. Richard Kuhn, Raghu Kacker
Nicky Mouha, Mohammad S Raunak, D. Richard Kuhn, Raghu Kacker
On the One-Per-Message Unforgeability of (EC)DSA and its Variants
Manuel Fersch, Eike Kiltz, Bertram Poettering
Manuel Fersch, Eike Kiltz, Bertram Poettering
On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2)
Alexander Maximov, Helena Sjoberg
Alexander Maximov, Helena Sjoberg
Asynchronous provably-secure hidden services
Philippe Camacho, Fernando Krell
Philippe Camacho, Fernando Krell
Succinct Spooky Free Compilers Are Not Black Box Sound
Zvika Brakerski, Yael Tauman Kalai, Renen Perlman
Zvika Brakerski, Yael Tauman Kalai, Renen Perlman
Compression for trace zero points on twisted Edwards curves
Giulia Bianco, Elisa Gorla
Giulia Bianco, Elisa Gorla
PermuteRam: Optimizing Oblivious Computation for Efficiency
Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang
Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang
Scalar multiplication in compressed coordinates in the trace-zero subgroup
Giulia Bianco, Elisa Gorla
Giulia Bianco, Elisa Gorla
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs
Ilya Mironov, Gil Segev, Ido Shahaf
Ilya Mironov, Gil Segev, Ido Shahaf
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Baptiste Olivier, Tony Quertier
Baptiste Olivier, Tony Quertier
Möbius: Trustless Tumbling for Transaction Privacy
Sarah Meiklejohn, Rebekah Mercer
Sarah Meiklejohn, Rebekah Mercer
Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version)
Danielle Morgan, Arnis Parsovs
Danielle Morgan, Arnis Parsovs
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations
Jean-Sebastien Coron
Jean-Sebastien Coron
Raziel: Private and Verifiable Smart Contracts on Blockchains
David Cerezo Sánchez
David Cerezo Sánchez
Identity-Based Format-Preserving Encryption
Mihir Bellare, Viet Tung Hoang
Mihir Bellare, Viet Tung Hoang
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
Benoit Libert, Amin Sakzad, Damien Stehle, Ron Steinfeld
Benoit Libert, Amin Sakzad, Damien Stehle, Ron Steinfeld
Instantaneous Decentralized Poker
Iddo Bentov, Ranjit Kumaresan, Andrew Miller
Iddo Bentov, Ranjit Kumaresan, Andrew Miller
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelegue, Daniel Wichs
Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelegue, Daniel Wichs
Cycle Slicer: An Algorithm for Building Permutations on Special Domains
Sarah Miracle, Scott Yilek
Sarah Miracle, Scott Yilek
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability
Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, Sune K. Jakobsen
Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, Sune K. Jakobsen
Non-Interactive Multiparty Computation without Correlated Randomness
Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev
Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev
Tightly-Secure Signatures from Five-Move Identification Protocols
Eike Kiltz, Julian Loss, Jiaxin Pan
Eike Kiltz, Julian Loss, Jiaxin Pan
Amortizing Randomness Complexity in Private Circuits
Sebastian Faust, Clara Paglialonga, Tobias Schneider
Sebastian Faust, Clara Paglialonga, Tobias Schneider
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
Takanori Isobe, Kyoji Shibutani
Takanori Isobe, Kyoji Shibutani
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
Enhanced Modelling of Authenticated Key Exchange Security
Papa B. Seye, Augustin P. Sarr
Papa B. Seye, Augustin P. Sarr
The First Thorough Side-Channel Hardware Trojan
Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada, Yu Sasaki, Keita Xagawa
Akinori Hosoyamada, Yu Sasaki, Keita Xagawa
The Minimum Number of Cards in Practical Card-based Protocols
Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
Efficient Scalable Constant-Round MPC via Garbled Circuits
Aner Ben-Efraim, Yehuda Lindell, Eran Omri
Aner Ben-Efraim, Yehuda Lindell, Eran Omri
On the Depth of Oblivious Parallel RAM
T-H. Hubert Chan, Kai-Min Chung, Elaine Shi
T-H. Hubert Chan, Kai-Min Chung, Elaine Shi
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Ling Sun, Wei Wang, Meiqin Wang
Ling Sun, Wei Wang, Meiqin Wang
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Jie Chen, Junqing Gong
Jie Chen, Junqing Gong
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
Image Classification using non-linear Support Vector Machines on Encrypted Data
Anthony Barnett, Jay Santokhi, Michael Simpson, Nigel P. Smart, Charlie Stainton-Bygrave, Srnivas Vivek, Adrian Waller
Anthony Barnett, Jay Santokhi, Michael Simpson, Nigel P. Smart, Charlie Stainton-Bygrave, Srnivas Vivek, Adrian Waller
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash
Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Fault Attack on ACORN v3
Xiaojuan Zhang, Xiutao Feng, Dongdai Lin
Xiaojuan Zhang, Xiutao Feng, Dongdai Lin
Zero-Knowledge Password Policy Check from Lattices
Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
Generic Forward-Secure Key Agreement Without Signatures
Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
Blockcipher-based MACs: Beyond the Birthday Bound without Message Length
Yusuke Naito
Yusuke Naito
How to Use Metaheuristics for Design of Symmetric-Key Primitives
Ivica Nikolić
Ivica Nikolić
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs
Evgenios M. Kornaropoulos, Petros Efstathopoulos
Evgenios M. Kornaropoulos, Petros Efstathopoulos
FAST: Disk Encryption and Beyond
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
Single Key Variant of PMAC_Plus
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography
André Chailloux, María Naya-Plasencia, André Schrottenloher
André Chailloux, María Naya-Plasencia, André Schrottenloher
How to Prove Megabytes (Per Second)
Yaron Gvili
Yaron Gvili
Improved Security for OCB3
Ritam Bhaumik, Mridul Nandi
Ritam Bhaumik, Mridul Nandi
Implementing Conjunction Obfuscation under Entropic Ring LWE
David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
Hybrid Encryption in a Multi-User Setting, Revisited
Federico Giacon, Eike Kiltz, Bertram Poettering
Federico Giacon, Eike Kiltz, Bertram Poettering
Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators
Darren Hurley-Smith, Julio Hernandez-Castro
Darren Hurley-Smith, Julio Hernandez-Castro
Efficient Length Doubling From Tweakable Block Ciphers
Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
Saud Al Musa, Guangwu Xu
Saud Al Musa, Guangwu Xu
Noiseless Fully Homomorphic Encryption
Jing Li, Licheng Wang
Jing Li, Licheng Wang
Two-Round PAKE from Approximate SPH and Instantiations from Lattices
Jiang Zhang, Yu Yu
Jiang Zhang, Yu Yu
Tight Security Analysis of EHtM MAC
Avijit Dutta, Ashwin Jha, Mridul Nandi
Avijit Dutta, Ashwin Jha, Mridul Nandi
Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials
Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi
Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi
Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA
Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan
Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan
Authentication from Weak PRFs with Hidden Auxiliary Input
Daniel Masny
Daniel Masny
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation
Steven Myers, Adam Shull
Steven Myers, Adam Shull
Mixture Differential Cryptanalysis and Structural Truncated Differential Attacks on round-reduced AES
Lorenzo Grassi
Lorenzo Grassi
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases
Geng Wang, Haiyang Zhang, Fengmei Liu
Geng Wang, Haiyang Zhang, Fengmei Liu
Security proof for Round Robin Differential Phase Shift QKD
Daan Leermakers, Boris Skoric
Daan Leermakers, Boris Skoric
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code
Jakub Breier, Xiaolu Hou, Yang Liu
Jakub Breier, Xiaolu Hou, Yang Liu
Standardizing Bad Cryptographic Practice - A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property
Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic J Forte, Mark Tehranipoor
Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic J Forte, Mark Tehranipoor
Scaling ORAM for Secure Computation
Jack Doerner, abhi shelat
Jack Doerner, abhi shelat
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
Brent Carmer, Alex J. Malozemoff, Mariana Raykova
Brent Carmer, Alex J. Malozemoff, Mariana Raykova
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Syed Mahbub Hafiz, Ryan Henry
Syed Mahbub Hafiz, Ryan Henry
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Ela Lee
Ela Lee
Revive: Rebalancing Off-Blockchain Payment Networks
Rami Khalil, Arthur Gervais
Rami Khalil, Arthur Gervais
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
A Fast and Verified Software Stack for Secure Function Evaluation
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial
Yong Li, Sven Schäge
Yong Li, Sven Schäge
A Universal Designated Verifier Signature Scheme with Non-Delegatability in the Standard Model
Parvin Rastegari, Mehdi Berenjkoub
Parvin Rastegari, Mehdi Berenjkoub
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority
Yehuda Lindell, Ariel Nof
Yehuda Lindell, Ariel Nof
Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
Industrial Feasibility of Private Information Retrieval
Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad
Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad
Optimal PRFs from Blockcipher Designs
Bart Mennink, Samuel Neves
Bart Mennink, Samuel Neves
Reassessing Grover's Algorithm
Scott Fluhrer
Scott Fluhrer
The TypTop System: Personalized Typo-Tolerant Password Checking
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
High-Precision Arithmetic in Homomorphic Encryption
Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications
Shuichi Katsumata
Shuichi Katsumata
FAME: Fast Attribute-based Message Encryption
Shashank Agrawal, Melissa Chase
Shashank Agrawal, Melissa Chase
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
Daniel Genkin, Luke Valenta, Yuval Yarom
Daniel Genkin, Luke Valenta, Yuval Yarom
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost, Brice Minaud, Olga Ohrimenko
Raphael Bost, Brice Minaud, Olga Ohrimenko
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method
Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang
Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang
Role-Based Ecosystem for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications
Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen
Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Gottfried Herold, Max Hoffmann, Michael Kloo\ss, Carla Ràfols, Andy Rupp
Gottfried Herold, Max Hoffmann, Michael Kloo\ss, Carla Ràfols, Andy Rupp
Short Attribute-Based Signatures for Arbitrary Turing Machines from Standard Assumptions
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160
Fukang Liu, Florian Mendel, Gaoli Wang
Fukang Liu, Florian Mendel, Gaoli Wang
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
More Efficient Universal Circuit Constructions
Daniel Günther, Ágnes Kiss, Thomas Schneider
Daniel Günther, Ágnes Kiss, Thomas Schneider
Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
Parvin Rastegari, Mehdi Berenjkoub
Parvin Rastegari, Mehdi Berenjkoub
Lightweight Symmetric-Key Hidden Vector Encryption without Pairings
Sikhar Patranabis, Debdeep Mukhopadhyay
Sikhar Patranabis, Debdeep Mukhopadhyay
Private Constrained PRFs (and More) from LWE
Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
Anonymous Single-Round Server-Aided Verification
Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka
Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka
McBits Revisited
Tung Chou
Tung Chou
Gimli, Lord of the Glittering TRS-80
Jean-Marie Chauvet
Jean-Marie Chauvet
Merged Mining: Curse of Cure?
Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation
Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
Low-communication parallel quantum multi-target preimage search
Gustavo Banegas, Daniel J. Bernstein
Gustavo Banegas, Daniel J. Bernstein
Attack on AES Implementation Exploiting Publicly-visible Partial Result
William Diehl
William Diehl
When Are Opaque Predicates Useful?
Lukas Zobernig, Steven D. Galbraith, Giovanni Russello
Lukas Zobernig, Steven D. Galbraith, Giovanni Russello
A Cryptographic Look at Multi-Party Channels
Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering
Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering
What about Bob? The Inadequacy of CPA Security for Proxy Reencryption
Aloni Cohen
Aloni Cohen
Secure Channels and Termination: The Last Word on TLS
Colin Boyd, Britta Hale
Colin Boyd, Britta Hale
HAL — The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage
Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR
Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
New Algorithms for Solving LPN
Bin Zhang, Xinxin Gong
Bin Zhang, Xinxin Gong
Efficient Random Grid Visual Cryptographic Schemes having Essential Members
Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari
Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari
MCMix: Anonymous Messaging via Secure Multiparty Computation
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
Encrypting Messages for Incomplete Chains of Certificates
Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald
Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald
Field lifting for smaller UOV public keys
Ward Beullens, Bart Preneel
Ward Beullens, Bart Preneel
Consensus from Signatures of Work
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
Computational problems in supersingular elliptic curve isogenies
Steven D. Galbraith, Frederik Vercauteren
Steven D. Galbraith, Frederik Vercauteren
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
Locality-Preserving Oblivious RAM
Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi
Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi
Post-quantum security of the sponge construction
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
Angelo Massimo Perillo, Emiliano De Cristofaro
Angelo Massimo Perillo, Emiliano De Cristofaro
Malicious-Secure Private Set Intersection via Dual Execution
Peter Rindal, Mike Rosulek
Peter Rindal, Mike Rosulek
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing
S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
Quantum Key-Recovery on full AEZ
Xavier Bonnetain
Xavier Bonnetain
GLYPH: A New Instantiation of the GLP Digital Signature Scheme
Arjun Chopra
Arjun Chopra
Necessary conditions for designing secure stream ciphers with the minimal internal states
Vahid Amin Ghafari, Honggang Hu, Mohammadsadegh alizadeh
Vahid Amin Ghafari, Honggang Hu, Mohammadsadegh alizadeh
Categorising and Comparing Cluster-Based DPA Distinguishers
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
Improved Fully Homomorphic Encryption without Bootstrapping
Masahiro Yagisawa
Masahiro Yagisawa
Private Collaborative Neural Network Learning
Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal
Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal
Anti-SAT: Mitigating SAT Attack on Logic Locking
Yang Xie, Ankur Srivastava
Yang Xie, Ankur Srivastava
GIFT: A Small Present (Full version)
Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings
Carsten Baum, Vadim Lyubashevsky
Carsten Baum, Vadim Lyubashevsky
On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation
Fabrice Boudot
Fabrice Boudot
CAKE: Code-based Algorithm for Key Encapsulation
Paulo S. L. M. Barreto, Shay Gueron, Tim Gueneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
Paulo S. L. M. Barreto, Shay Gueron, Tim Gueneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
Verifiable Private Polynomial Evaluation
Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade
Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade
Efficient, Reusable Fuzzy Extractors from LWE
Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Ahto Buldas, Matthias Geihs, Johannes Buchmann
Ahto Buldas, Matthias Geihs, Johannes Buchmann
CryptHOL: Game-based Proofs in Higher-order Logic
David A. Basin, Andreas Lochbihler, S. Reza Sefidgar
David A. Basin, Andreas Lochbihler, S. Reza Sefidgar
A Note on Attribute-Based Group Homomorphic Encryption
Michael Clear, Ciaran McGoldrick
Michael Clear, Ciaran McGoldrick
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers
Rémi Géraud, David Naccache, Răzvan Roşie
Rémi Géraud, David Naccache, Răzvan Roşie
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
Răzvan Roşie
Răzvan Roşie
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou
Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes
Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca
Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives
Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong
Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong
On the Tightness of Forward-Secure Signature Reductions
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
A Quantum ``Magic Box'' for the Discrete Logarithm Problem
Burton S. Kaliski Jr.
Burton S. Kaliski Jr.
Binary Hash Tree based Certificate Access Management
Virendra Kumar, Jonathan Petit, William Whyte
Virendra Kumar, Jonathan Petit, William Whyte
Cryptanalysis of 22 1/2 rounds of Gimli
Mike Hamburg
Mike Hamburg
Cryptanalysis of Compact-LWE
Jonathan Bootle, Mehdi Tibouchi
Jonathan Bootle, Mehdi Tibouchi
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security
Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin
Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing --
Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
Secure Storage with Replication and Transparent Deduplication
Iraklis Leontiadis, Reza Curtmola
Iraklis Leontiadis, Reza Curtmola
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions
Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
SGX Remote Attestation is not Sufficient
Yogesh Swami
Yogesh Swami
Faster Bootstrapping with Multiple Addends
TanPing ZHOU, XiaoYuan YANG, LongFei LIU, Wei ZHANG, YiTao DING
TanPing ZHOU, XiaoYuan YANG, LongFei LIU, Wei ZHANG, YiTao DING
Round Optimal Concurrent Non-Malleability from Polynomial Hardness
Dakshita Khurana
Dakshita Khurana
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme
Yongge Wang
Yongge Wang
Privacy-Preserving Ridge Regression Without Garbled Circuits
Marc Joye
Marc Joye
Revisiting Difficulty Control for Blockchain Systems
Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
Second Order Statistical Behavior of LLL and BKZ
Yang Yu, Léo Ducas
Yang Yu, Léo Ducas
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
A note on the implementation of the Number Theoretic Transform
Michael Scott
Michael Scott
Proposal of primitive polynomials for Linux kernel PRNG
David FONTAINE, Olivier VIVOLO
David FONTAINE, Olivier VIVOLO
AS$^3$: Adaptive Social Secret Sharing for Distributed Storage Systems
Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
Dynamic and Verifiable Hierarchical Secret Sharing
Giulia Traverso, Denise Demirel, Johannes Buchmann
Giulia Traverso, Denise Demirel, Johannes Buchmann
An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both
Rotem Tsabary
Rotem Tsabary
A Simpler Rate-Optimal CPIR Protocol
Helger Lipmaa, Kateryna Pavlyk
Helger Lipmaa, Kateryna Pavlyk
On Making U2F Protocol Leakage-Resilient via Re-keying
Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh
Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh
Computing Low-Weight Discrete Logarithms
Bailey Kacsmar, Sarah Plosker, Ryan Henry
Bailey Kacsmar, Sarah Plosker, Ryan Henry
Efficient Proactive Secret Sharing
Jacqueline Brendel, Denise Demirel
Jacqueline Brendel, Denise Demirel
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
Anonymous Post-Quantum Cryptocash
Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au
Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
The Edited Truth
Shafi Goldwasser, Saleet Klein, Daniel Wichs
Shafi Goldwasser, Saleet Klein, Daniel Wichs
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema
Paul Rösler, Christian Mainka, Jörg Schwenk
Paul Rösler, Christian Mainka, Jörg Schwenk
On desynchronised El Gamal algorithm
Vasyl Ustimenko
Vasyl Ustimenko
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model
Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert
Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert
Distributed Computing with Channel Noise
Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
spKEX: An optimized lattice-based key exchange
Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen
Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen
Reconsidering the Security Bound of AES-GCM-SIV
Tetsu Iwata, Yannick Seurin
Tetsu Iwata, Yannick Seurin
Privacy-Preserving Ridge Regression on Distributed Data
Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon
Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon
SCATTER : A New Dimension in Side-Channel
Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier
Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier
Multi-Hop Distance Estimation: How Far are You?
Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera
Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera
A Key Backup Scheme Based on Bitcoin
Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang
Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang
Optimally Sound Sigma Protocols Under DCRA
Helger Lipmaa
Helger Lipmaa
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
Shay Gueron, Yehuda Lindell
Shay Gueron, Yehuda Lindell
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck
Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
δ-subgaussian Random Variables in Cryptography
Sean Murphy, Rachel Player
Sean Murphy, Rachel Player
On Internal Re-keying
Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev
Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev
A Humble Theory and Application for Logic Encryption
Hai Zhou
Hai Zhou
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
Atomically Trading with Roger: Gambling on the success of a hardfork
Patrick McCorry, Ethan Heilman, Andrew Miller
Patrick McCorry, Ethan Heilman, Andrew Miller
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
Towards Characterizing Securely Computable Two-Party Randomized Functions
Deepesh Data, Manoj Prabhakaran
Deepesh Data, Manoj Prabhakaran
Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak
Fanbao Liu, Fengmei Liu
Fanbao Liu, Fengmei Liu
High Performance Post-Quantum Key Exchange on FPGAs
Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang
Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang
On the security of HMFEv
Yasufumi Hashimoto
Yasufumi Hashimoto
Quantum Collision-Finding in Non-Uniform Random Functions
Marko Balogh, Edward Eaton, Fang Song
Marko Balogh, Edward Eaton, Fang Song
Impossibility of Secure Multi-Party Products in Non-Abelian Groups
Jessica Covington, Megan Golbek, Mike Rosulek
Jessica Covington, Megan Golbek, Mike Rosulek
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
Ren Zhang, Bart Preneel
Ren Zhang, Bart Preneel
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication
Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal
Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal
Z-Channel: Scalable and Efficient Scheme in Zerocash
Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu
Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu
Efficient Privacy-Preserving General Edit Distance and Beyond
Ruiyu Zhu, Yan Huang
Ruiyu Zhu, Yan Huang
Conditional Blind Signatures
Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis
Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis
Logical loophole in random 3-bit sequence generator
Alexandre de Castro
Alexandre de Castro
SOFIA: MQ-based signatures in the QROM
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Searchable Encryption with Access Control
Nils Löken
Nils Löken
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Akhilesh Anilkumar Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay
Akhilesh Anilkumar Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay
Faster Unbalanced Private Set Intersection
Amanda Cristina Davi Resende, Diego de Freitas Aranha
Amanda Cristina Davi Resende, Diego de Freitas Aranha
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC
Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya
Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya
Memory-Tight Reductions
Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz
Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz
Transparent Memory Encryption and Authentication
Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard
Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard
Differential Fault Analysis Automation
Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta
Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta
Coding for interactive communication beyond threshold adversaries
Anat Paskin-Cherniavsky, Slava Radune
Anat Paskin-Cherniavsky, Slava Radune
Guru: Universal Reputation Module for Distributed Consensus Protocols
Alex Biryukov, Daniel Feher, Dmitry Khovratovich
Alex Biryukov, Daniel Feher, Dmitry Khovratovich
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong
Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Sikhar Patranabis, Debdeep Mukhopadhyay
Sikhar Patranabis, Debdeep Mukhopadhyay
High-speed key encapsulation from NTRU
Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe
Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner
Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
Michael Raskin
Michael Raskin
Message Franking via Committing Authenticated Encryption
Paul Grubbs, Jiahui Lu, Thomas Ristenpart
Paul Grubbs, Jiahui Lu, Thomas Ristenpart
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Thomas Unterluggauer, Mario Werner, Stefan Mangard
Thomas Unterluggauer, Mario Werner, Stefan Mangard
The problem with the SURF scheme
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
MuSE: Multimodal Searchable Encryption for Cloud Applications
Bernardo Ferreira, João Leitão, Henrique Domingos
Bernardo Ferreira, João Leitão, Henrique Domingos
Profiling Good Leakage Models For Masked Implementations
Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou
Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Russell W. F. Lai, Sherman S. M. Chow
Russell W. F. Lai, Sherman S. M. Chow
Privacy for Targeted Advertising
Avradip Mandal, John Mitchell, Hart Montgomery, Arnab Roy
Avradip Mandal, John Mitchell, Hart Montgomery, Arnab Roy
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit
Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit
A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan, Hong-Sheng Zhou
Lei Fan, Hong-Sheng Zhou
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
Jiao Hu, Ruilin Li, Chaojing Tang
Jiao Hu, Ruilin Li, Chaojing Tang
A Secure and Private Billing Protocol for Smart Metering
Tom Eccles, Basel Halak
Tom Eccles, Basel Halak
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Fanbao Liu, Fengmei Liu
Fanbao Liu, Fengmei Liu
Pseudorandom Functions: Three Decades Later
Andrej Bogdanov, Alon Rosen
Andrej Bogdanov, Alon Rosen
Rescuing LoRaWAN 1.0
Gildas Avoine, Loïc Ferreira
Gildas Avoine, Loïc Ferreira
Efficient Public Trace and Revoke from Standard Assumptions
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada
Blockcipher-based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford
Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford
A TMDTO Attack Against Lizard
Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay
Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay
Rational Trust Modeling
Mehrdad Nojoumian
Mehrdad Nojoumian
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Shay Gueron, Nicky Mouha
Shay Gueron, Nicky Mouha
On Space-Scarce Economy In Blockchain Systems
Alexander Chepurnoy, Dmitry Meshkov
Alexander Chepurnoy, Dmitry Meshkov
Private Data Aggregation on a Budget
Morten Dahl, Valerio Pastro, Mathieu Poumeyrol
Morten Dahl, Valerio Pastro, Mathieu Poumeyrol
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
Integer Version of Ring-LWE and its Applications
Gu Chunsheng
Gu Chunsheng
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache
Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Very High Order Masking: Efficient Implementation and Security Evaluation
Anthony Journault, François-Xavier Standaert
Anthony Journault, François-Xavier Standaert
Implementing 128-bit Secure MPKC Signatures
Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng
Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng
Perun: Virtual Payment Hubs over Cryptocurrencies
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
Leo Ducas, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
Leo Ducas, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek
Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek
Certifying Trapdoor Permutations, Revisited
Ran Canetti, Amit Lichtenberg
Ran Canetti, Amit Lichtenberg
Gimli: a cross-platform permutation
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
Middle-Product Learning With Errors
Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehle
Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehle
Sliding right into disaster: Left-to-right sliding windows leak
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
Hai Zhou, Ruifeng Jiang, Shuyu Kong
Hai Zhou, Ruifeng Jiang, Shuyu Kong
How to Break Secure Boot on FPGA SoCs through Malicious Hardware
Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl
Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl
Fast Leakage Assessment
Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
Back to Massey: Impressively fast, scalable and tight security evaluation tools
Marios O. Choudary, P. G. Popescu
Marios O. Choudary, P. G. Popescu
GIFT: A Small Present
Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
The Algebraic Group Model and its Applications
Georg Fuchsbauer, Eike Kiltz, Julian Loss
Georg Fuchsbauer, Eike Kiltz, Julian Loss
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
Qiong Huang, Jianye Huang
Qiong Huang, Jianye Huang
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
Secure Arithmetic Computation with Constant Computational Overhead
Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron
Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron
Statement Voting
Bingsheng Zhang, Hong-Sheng Zhou
Bingsheng Zhang, Hong-Sheng Zhou
A Framework to Select Parameters for Lattice-Based Cryptography
Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer
Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
Mathias Wagner, Stefan Heyse, Charles Guillemet
Mathias Wagner, Stefan Heyse, Charles Guillemet
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
Large Modulus Ring-LWE $\geq$ Module-LWE
Martin R. Albrecht, Amit Deo
Martin R. Albrecht, Amit Deo
Multi-Rate Threshold FlipThem
David Leslie, Chris Sherfield, Nigel P. Smart
David Leslie, Chris Sherfield, Nigel P. Smart
Differential Attacks: Using Alternative Operations
Céline Blondeau, Roberto Civino, Massimiliano Sala
Céline Blondeau, Roberto Civino, Massimiliano Sala
On the discrete logarithm problem for prime-field elliptic curves
Alessandro Amadori, Federico Pintore, Massimiliano Sala
Alessandro Amadori, Federico Pintore, Massimiliano Sala
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
Vincent Immler, Robert Specht, Florian Unterstein
Vincent Immler, Robert Specht, Florian Unterstein
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
Edward Eaton
Edward Eaton
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
Xavier Bultel, Pascal Lafourcade
Xavier Bultel, Pascal Lafourcade
A Modular Analysis of the Fujisaki-Okamoto Transformation
Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
Sean Bowe, Ariel Gabizon, Matthew D. Green
Sean Bowe, Ariel Gabizon, Matthew D. Green
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
Wei Dai, Yarkın Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savaş, Berk Sunar
Wei Dai, Yarkın Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savaş, Berk Sunar
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
Jeremy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
Jeremy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
A Subversion-Resistant SNARK
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac
Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin Lauter
Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin Lauter
Round Optimal Concurrent MPC via Strong Simulation
Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai
Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai
A Side-Channel Assisted Cryptanalytic Attack Against QcBits
Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang, Jakub Szefer, Ruben Niederhagen
Wen Wang, Jakub Szefer, Ruben Niederhagen
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Robert Primas, Peter Pessl, Stefan Mangard
Robert Primas, Peter Pessl, Stefan Mangard
Solving multivariate polynomial systems and an invariant from commutative algebra
Alessio Caminata, Elisa Gorla
Alessio Caminata, Elisa Gorla
Speeding up lattice sieve with Xeon Phi coprocessor
Anja Becker, Dusan Kostic
Anja Becker, Dusan Kostic
On the Security of Carrier Phase-based Ranging
Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
Constant bandwidth ORAM with small block size using PIR operations
Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu
Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu
An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
Juay Guan Hee
Juay Guan Hee
Renyi Entropy Estimation Revisited
Maciej Obremski, Maciej Skorski
Maciej Obremski, Maciej Skorski
Subversion-zero-knowledge SNARKs
Georg Fuchsbauer
Georg Fuchsbauer
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
Internet Voting Using Zcash
Pavel Tarasov, Hitesh Tewari
Pavel Tarasov, Hitesh Tewari
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
Angela Jäschke, Frederik Armknecht
Angela Jäschke, Frederik Armknecht
Time-Memory Trade-offs for Parallel Collision Search Algorithms
Monika Trimoska, Sorina Ionica, Gilles Dequen
Monika Trimoska, Sorina Ionica, Gilles Dequen
Analysing Relations involving small number of Monomials in AES S- Box
Riddhi Ghosal
Riddhi Ghosal
Birthday Attack on Dual EWCDM
Mridul Nandi
Mridul Nandi
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser
Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser
The Security of SIMON-like Ciphers Against Linear Cryptanalysis
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
Ehsan Ebrahimi, Dominique Unruh
Ehsan Ebrahimi, Dominique Unruh
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Hamidreza Yazdanpanah, Mahdi Azizi, Seyed Morteza Pournaghi
Hamidreza Yazdanpanah, Mahdi Azizi, Seyed Morteza Pournaghi
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David, Peter Gaži, Aggelos Kiayias, Alexander Russell
Bernardo David, Peter Gaži, Aggelos Kiayias, Alexander Russell
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk
Faster Algorithms for Isogeny Problems using Torsion Point Images
Christophe Petit
Christophe Petit
Can You Trust Your Encrypted Cloud? An Assessment of SpiderOakONE’s Security
Anders P. K. Dalskov, Claudio Orlandi
Anders P. K. Dalskov, Claudio Orlandi
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
Towards Doubly Efficient Private Information Retrieval
Ran Canetti, Justin Holmgren, Silas Richelson
Ran Canetti, Justin Holmgren, Silas Richelson
Can We Access a Database Both Locally and Privately?
Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters
Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
A Formal Foundation for Secure Remote Execution of Enclaves
Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia
Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
Weak is Better: Tightly Secure Short Signatures from Weak PRFs
Jacob Alperin-Sheriff, Daniel Apon
Jacob Alperin-Sheriff, Daniel Apon
Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
Björn Haase, Benoît Labrique
Björn Haase, Benoît Labrique
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
Yashvanth Kondi, Arpita Patra
Yashvanth Kondi, Arpita Patra
Notes on the design and analysis of SIMON and SPECK
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval
Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval
Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware
Mehmet Sabir Kiraz, Ziya Alper Genç, Erdinç Öztürk
Mehmet Sabir Kiraz, Ziya Alper Genç, Erdinç Öztürk
Watermarking Public-key Cryptographic Functionalities and Implementations
Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$).
Sankhanil Dey, Ranjan Ghosh
Sankhanil Dey, Ranjan Ghosh
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin
Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin
Trapping ECC with Invalid Curve Bug Attacks
Renaud Dubois
Renaud Dubois
Further Analysis of a Proposed Hash-Based Signature Standard
Scott Fluhrer
Scott Fluhrer
Fast Secure Two-Party ECDSA Signing
Yehuda Lindell
Yehuda Lindell
A Fourier Analysis Based Attack against Physically Unclonable Functions
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments
Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai
Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai
ZeroTrace : Oblivious Memory Primitives from Intel SGX
Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher
Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
Yarkın Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang
Yarkın Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Seyed Farhad Aghili, Hamid Mala
Seyed Farhad Aghili, Hamid Mala
X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI
Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry
Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry
Resource-efficient OT combiners with active security
Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
Identity-Based Encryption from the Diffie-Hellman Assumption
Nico Döttling, Sanjam Garg
Nico Döttling, Sanjam Garg
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart
Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
Snarky Signatures: \\ Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
Jens Groth, Mary Maller
Jens Groth, Mary Maller
Public-Seed Pseudorandom Permutations
Pratik Soni, Stefano Tessaro
Pratik Soni, Stefano Tessaro
New security notions and feasibility results for authentication of quantum data
Sumegha Garg, Henry Yuen, Mark Zhandry
Sumegha Garg, Henry Yuen, Mark Zhandry
Information-theoretic Indistinguishability via the Chi-squared Method
Wei Dai, Viet Tung Hoang, Stefano Tessaro
Wei Dai, Viet Tung Hoang, Stefano Tessaro
HACL*: A Verified Modern Cryptographic Library
Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin
Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu
Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu
Quantum non-malleability and authentication
Gorjan Alagic, Christian Majenz
Gorjan Alagic, Christian Majenz
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
Xavier Boyen, Qinyi Li
Xavier Boyen, Qinyi Li
Template Attack vs Bayes Classifier
Stjepan Picek, Annelie Heuser, Sylvain Guilley
Stjepan Picek, Annelie Heuser, Sylvain Guilley
Non-Malleable Codes for Space-Bounded Tampering
Sebastian Faust, Kristina Hostakova, Pratyay Mukherjee, Daniele Venturi
Sebastian Faust, Kristina Hostakova, Pratyay Mukherjee, Daniele Venturi
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
Ling Song, Guohong Liao, Jian Guo
Ling Song, Guohong Liao, Jian Guo
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
Claude Carlet
Claude Carlet
Key Rotation for Authenticated Encryption
Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, Sam Scott
Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, Sam Scott
Evaluating web PKIs - A Survey
Jiangshan Yu, Mark Ryan
Jiangshan Yu, Mark Ryan
Kurosawa-Desmedt Meets Tight Security
Romain Gay, Dennis Hofheinz, Lisa Kohl
Romain Gay, Dennis Hofheinz, Lisa Kohl
Compact Structure-preserving Signatures with Almost Tight Security
Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan
Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan
Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs
Vadim Lyubashevsky, Gregor Seiler
Vadim Lyubashevsky, Gregor Seiler
On the Hardness of the Mersenne Low Hamming Ratio Assumption
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains
F. Betül Durak, Serge Vaudenay
F. Betül Durak, Serge Vaudenay
The Price of Low Communication in Secure Multi-Party Computation
Juan Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
Juan Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala
Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
Joost Renes, Benjamin Smith
Joost Renes, Benjamin Smith
PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
Claude Carlet
Claude Carlet
Be Adaptive, Avoid Overcommitting
Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
Identity-based Encryption from Codes with Rank Metric
Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$
Patrick Holzer, Thomas Wunderer
Patrick Holzer, Thomas Wunderer
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
Dr. M. AMUTHA PRABAKAR, Dr. B. INDRANI, M. KARTHIGAI VENI
Dr. M. AMUTHA PRABAKAR, Dr. B. INDRANI, M. KARTHIGAI VENI
State of the Art in Lightweight Symmetric Cryptography
Alex Biryukov, Leo Perrin
Alex Biryukov, Leo Perrin
Hedging Public-Key Encryption in the Real World
Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
Quantum Security of NMAC and Related Constructions
Fang Song, Aaram Yun
Fang Song, Aaram Yun
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Victor Cauchois, Clément Gomez, Reynald Lercier
Victor Cauchois, Clément Gomez, Reynald Lercier
Inverted Leftover Hash Lemma
Maciej Obremski, Maciej Skórski
Maciej Obremski, Maciej Skórski
Optimal Overcoming Weak Expectations
Maciej Skorski
Maciej Skorski
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
A simple and compact algorithm for SIDH with arbitrary degree isogenies
Craig Costello, Huseyin Hisil
Craig Costello, Huseyin Hisil
Encryption Switching Protocols Revisited: Switching modulo $p$
Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
DeepSecure: Scalable Provably-Secure Deep Learning
Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
A Formal Treatment of Multi-key Channels
Felix Günther, Sogol Mazaheri
Felix Günther, Sogol Mazaheri
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample
Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu
Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu
Full-State Keyed Duplex With Built-In Multi-User Support
Joan Daemen, Bart Mennink, Gilles Van Assche
Joan Daemen, Bart Mennink, Gilles Van Assche
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
Itai Dinur, Niv Nadler
Itai Dinur, Niv Nadler
Modes of Operation Suitable for Computing on Encrypted Data
Dragos Rotaru, Nigel P. Smart, Martijn Stam
Dragos Rotaru, Nigel P. Smart, Martijn Stam
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
Tomas Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson
Tomas Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Georg T. Becker
Georg T. Becker
Reducing Communication Channels in MPC
Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
Laconic Oblivious Transfer and its Applications
Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou
Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
Multi Collision Resistant Hash Functions and their Applications
Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
Nir Bitansky, Yael Tauman Kalai, Omer Paneth
Nir Bitansky, Yael Tauman Kalai, Omer Paneth
New Linear Attacks on Block Cipher GOST
Yi LU
Yi LU
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
Ilan Komargodski, Moni Naor, Eylon Yogev
Ilan Komargodski, Moni Naor, Eylon Yogev
Authenticating compromisable storage systems
Jiangshan Yu, Mark Ryan, Liqun Chen
Jiangshan Yu, Mark Ryan, Liqun Chen
Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
Jung Hee Cheon, Minki Hhan, Changmin Lee
Jung Hee Cheon, Minki Hhan, Changmin Lee
A multi-start heuristic for multiplicative depth minimization of boolean circuits
Sergiu Carpov, Pascal Aubry, Renaud Sirdey
Sergiu Carpov, Pascal Aubry, Renaud Sirdey
On the Statistical Leak of the GGH13 Multilinear Map and some Variants
Léo Ducas, Alice Pellet--Mary
Léo Ducas, Alice Pellet--Mary
A New Public-Key Cryptosystem via Mersenne Numbers
Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha
Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha
Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence
Thomas Prest
Thomas Prest
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Keita Emura
Keita Emura
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
Constrained Keys for Invertible Pseudorandom Functions
Dan Boneh, Sam Kim, David J. Wu
Dan Boneh, Sam Kim, David J. Wu
Forward-Security under Continual Leakage
Mihir Bellare, Adam O'Neill, Igors Stepanovs
Mihir Bellare, Adam O'Neill, Igors Stepanovs
Security of Even--Mansour Ciphers under Key-Dependent Messages
Pooya Farshim, Louiza Khati, Damien Vergnaud
Pooya Farshim, Louiza Khati, Damien Vergnaud
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
Bart Mennink
Bart Mennink
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
Bart Mennink, Samuel Neves
Bart Mennink, Samuel Neves
A Unified Framework for Secure Search Over Encrypted Cloud Data
Cengiz Orencik, Erkay Savas, Mahmoud Alewiwi
Cengiz Orencik, Erkay Savas, Mahmoud Alewiwi
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith Tone
Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith Tone
On the Relation Between SIM and IND-RoR Security Models for PAKEs
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot
Short CCA-Secure Attribute-Based Encryption
Hiroaki Anada, Seiko Arita
Hiroaki Anada, Seiko Arita
Why Your Encrypted Database Is Not Secure
Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
Access Control Encryption for General Policies from Standard Assumptions
Sam Kim, David J. Wu
Sam Kim, David J. Wu
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
Yusuke Naito
Yusuke Naito
Lelantos: A Blockchain-based Anonymous Physical Delivery System
Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong
Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong
On the Structure of Unconditional UC Hybrid Protocols
Mike Rosulek, Morgan Shirley
Mike Rosulek, Morgan Shirley
Proving Resistance against Invariant Attacks: How to Choose the Round Constants
Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella
Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella
Leakage-Resilient Tweakable Encryption from One-Way Functions
Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan
Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan
Security Definitions For Hash Functions: Combining UCE and Indifferentiability
Daniel Jost, Ueli Maurer
Daniel Jost, Ueli Maurer
Transitioning to a Quantum-Resistant Public Key Infrastructure
Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
Fully Homomorphic Encryption Using Multivariate Polynomials
Matthew Tamayo-Rios, Jean-Charles Faugère, Ludovic Perret, Peng Hui How, Robin Zhang
Matthew Tamayo-Rios, Jean-Charles Faugère, Ludovic Perret, Peng Hui How, Robin Zhang
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority
Masahito Hayashi, Takeshi Koshiba
Masahito Hayashi, Takeshi Koshiba
Proxy Re-Encryption and Re-Signatures from Lattices
Xiong Fan, Feng-Hao Liu
Xiong Fan, Feng-Hao Liu
Vector Encoding over Lattices and Its Applications
Daniel Apon, Xiong Fan, Feng-Hao Liu
Daniel Apon, Xiong Fan, Feng-Hao Liu
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich
Subtleties in Security Definitions for Predicate Encryption with Public Index
Johannes Blömer, Gennadij Liske
Johannes Blömer, Gennadij Liske
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu, Mika Juuti, Yao Lu, N. Asokan
Jian Liu, Mika Juuti, Yao Lu, N. Asokan
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
Privacy-preserving biometric authentication: challenges and directions
Elena Pagnin, Aikaterini Mitrokotsa
Elena Pagnin, Aikaterini Mitrokotsa
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
Shihui Fu, Xiutao Feng, Baofeng Wu
Shihui Fu, Xiutao Feng, Baofeng Wu
Obfuscation of Bloom Filter Queries from Ring-LWE
Alex Davidson
Alex Davidson
Block Chain based Searchable Symmetric Encryption
Huige Li, Haibo Tian, Fangguo Zhang
Huige Li, Haibo Tian, Fangguo Zhang
Secretly Embedding Trapdoors into Contract Signing Protocols
Diana Maimut, George Teseleanu
Diana Maimut, George Teseleanu
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing
Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng
Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Joel Alwen, Jeremiah Blocki, Ben Harsha
Joel Alwen, Jeremiah Blocki, Ben Harsha
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
Jeremiah Blocki, Samson Zhou
Jeremiah Blocki, Samson Zhou
New Approach to Practical Leakage-Resilient Public-Key Cryptography
Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan
Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan
Cryptographic Security Analysis of T-310
Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi
Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi
Practically Efficient Secure Single-Commodity Multi-Market Auctions
Abdelrahaman Aly, Mathieu Van Vyve
Abdelrahaman Aly, Mathieu Van Vyve
GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
James Howe, Máire O'Neill
James Howe, Máire O'Neill
Slothful reduction
Michael Scott
Michael Scott
A Uniform Class of Weak Keys for Universal Hash Functions
Kaiyan Zheng, Peng Wang
Kaiyan Zheng, Peng Wang
Analyzing Multi-Key Security Degradation
Atul Luykx, Bart Mennink, Kenneth G. Paterson
Atul Luykx, Bart Mennink, Kenneth G. Paterson
FourQ on embedded devices with strong countermeasures against side-channel attacks
Zhe Liu, Patrick Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
Zhe Liu, Patrick Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia
Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia
Statistical and Linear Independence of Binary Random Variables
Kaisa Nyberg
Kaisa Nyberg
Understanding RUP Integrity of COLM
Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
Strengthening Access Control Encryption
Christian Badertscher, Christian Matt, Ueli Maurer
Christian Badertscher, Christian Matt, Ueli Maurer
Optimal Ramp Schemes and Related Combinatorial Objects
Douglas R. Stinson
Douglas R. Stinson
Grover Meets Simon - Quantumly Attacking the FX-construction
Gregor Leander, Alexander May
Gregor Leander, Alexander May
FHPKE based on multivariate discrete logarithm problem
Masahiro Yagisawa
Masahiro Yagisawa
Card-Based Protocols Using Unequal Division Shuffles
Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Foundations for Actively Secure Card-based Cryptography
Alexander Koch, Stefan Walzer
Alexander Koch, Stefan Walzer
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh Prabhu
Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh Prabhu
Exploring Naccache-Stern Knapsack Encryption
Éric Brier, Rémi Géraud, David Naccache
Éric Brier, Rémi Géraud, David Naccache
Construction and Filtration of Lightweight Formalized MDS Matrices
Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang
Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang
Efficient hash maps to \mathbb{G}_2 on BLS curves
Alessandro Budroni, Federico Pintore
Alessandro Budroni, Federico Pintore
Strong Authenticated Key Exchange with Auxiliary Inputs
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
A Proof-of-Stake protocol for consensus on Bitcoin subchains
Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda
Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda
Breaking and Fixing the HB+DB protocol
Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
Symmetrically and Asymmetrically Hard Cryptography (Full Version)
Alex Biryukov, Leo Perrin
Alex Biryukov, Leo Perrin
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
Improved Attack on Full-round Grain-128
Ximing Fu, Xiaoyun Wang, Jiazhe Chen, Marc Stevens, Xiaoyang Dong
Ximing Fu, Xiaoyun Wang, Jiazhe Chen, Marc Stevens, Xiaoyang Dong
A New Algorithm for Inversion mod $p^k$
Çetin Kaya Koç
Çetin Kaya Koç
Fast Proxy Re-Encryption for Publish/Subscribe Systems
Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanthan
Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanthan
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
Jihye Kim, Jiwon Lee, Seunghwa Lee, Hyunok Oh
Jihye Kim, Jiwon Lee, Seunghwa Lee, Hyunok Oh
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
Peter Rindal, Roberto Trifiletti
Peter Rindal, Roberto Trifiletti
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
Jingjing Wang, Xiaoyu Zhang, Jingjing guo, Jianfeng Wang
Jingjing Wang, Xiaoyu Zhang, Jingjing guo, Jianfeng Wang
Short generators without quantum computers: the case of multiquadratics
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
Condition on composite numbers easily factored with elliptic curve method
Masaaki Shirase
Masaaki Shirase
A New Approach to Round-Optimal Secure Multiparty Computation
Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
Synthesis of Adaptive Side-Channel Attacks
Quoc-Sang Phan, Lucas Bang, Corina S. Păsăreanu, Pasquale Malacaria, Tevfik Bultan
Quoc-Sang Phan, Lucas Bang, Corina S. Păsăreanu, Pasquale Malacaria, Tevfik Bultan
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
Cédric Van Rompay, Refik Molva, Melek Önen
Cédric Van Rompay, Refik Molva, Melek Önen
Practical Evaluation of Masking Software Countermeasures on an IoT processor
David McCann, Elisabeth Oswald
David McCann, Elisabeth Oswald
Post-Quantum Security of Fiat-Shamir
Dominique Unruh
Dominique Unruh
Efficient One-Time Signatures from Quasi-Cyclic Codes: a Full Treatment
Edoardo Persichetti
Edoardo Persichetti
SecureML: A System for Scalable Privacy-Preserving Machine Learning
Payman Mohassel, Yupeng Zhang
Payman Mohassel, Yupeng Zhang
Higher-Order Side-Channel Protected Implementations of Keccak
Hannes Gross, David Schaffenrath, Stefan Mangard
Hannes Gross, David Schaffenrath, Stefan Mangard
Double-spending Prevention for Bitcoin zero-confirmation transactions
Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartı́
Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartı́
Privacy-Preserving Interdomain Routing at Internet Scale
Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE
Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey
Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey
Another Look at Success Probability in Linear Cryptanalysis
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
On the Security of Classic Protocols for Unique Witness Relations
Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
Decentralized Blacklistable Anonymous Credentials with Reputation
Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu
Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu
Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
Silvan Streit, Fabrizio De Santis
Silvan Streit, Fabrizio De Santis
Homomorphically Encrypted Arithmetic Operations over the Integer Ring
Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
Four Round Secure Computation without Setup
Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou
Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou
Garbled Circuits as Randomized Encodings of Functions: a Primer
Benny Applebaum
Benny Applebaum
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang
Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang
Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
Travis Scholl
Travis Scholl
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
Steven Cavanaugh
Steven Cavanaugh
Quantum one-way permutation over the finite field of two elements
Alexandre de Castro
Alexandre de Castro
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
Sam Kim, David J. Wu
Sam Kim, David J. Wu
Fault attack on Supersingular Isogeny Cryptosystems
Yan Bo Ti
Yan Bo Ti
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
Stefan Wüller, Ulrike Meyer, Susanne Wetzel
Stefan Wüller, Ulrike Meyer, Susanne Wetzel
Determining the Minimum Degree of an S-box
P. R. Mishra, Sumanta Sarkar, Indivar Gupta
P. R. Mishra, Sumanta Sarkar, Indivar Gupta
Do you need a Blockchain?
Karl Wüst, Arthur Gervais
Karl Wüst, Arthur Gervais
Loop-abort faults on supersingular isogeny cryptosystems
Alexandre Gélin, Benjamin Wesolowski
Alexandre Gélin, Benjamin Wesolowski
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
Ryo Hiromasa, Yutaka Kawai
Ryo Hiromasa, Yutaka Kawai
A crossbred algorithm for solving Boolean polynomial systems
Antoine Joux, Vanessa Vitse
Antoine Joux, Vanessa Vitse
On the Construction of Lightweight Orthogonal MDS Matrices
Lijing Zhou, Licheng Wang, Yiru Sun
Lijing Zhou, Licheng Wang, Yiru Sun
"The Simplest Protocol for Oblivious Transfer'' Revisited
Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial
Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
Analysis of Toeplitz MDS Matrices
Sumanta Sarkar, Habeeb Syed
Sumanta Sarkar, Habeeb Syed
Fork-Free Hybrid Consensus with Flexible Proof-of-Activity
Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long
Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long
BitFlip: A Randomness-Rich Cipher
Gideon Samid, Serguei Popov
Gideon Samid, Serguei Popov
The Complexity of Public-Key Cryptography
Boaz Barak
Boaz Barak
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
Universally Composable Zero-Knowledge Proof of Membership
Jesper Buus Nielsen
Jesper Buus Nielsen
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
Conditional Disclosure of Secrets via Non-Linear Reconstruction
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
Almost Optimal Oblivious Transfer from QA-NIZK
Olivier Blazy, Céline Chevalier, Paul Germouty
Olivier Blazy, Céline Chevalier, Paul Germouty
Continuous Non-Malleable Codes in the 8-Split-State Model
Divesh Aggarwal, Nico Dottling, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto
Divesh Aggarwal, Nico Dottling, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto
XOR of PRPs in a Quantum World
Bart Mennink, Alan Szepieniec
Bart Mennink, Alan Szepieniec
White-Box Cryptography: Don't Forget About Grey Box Attacks
Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
A low-resource quantum factoring algorithm
Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
Post-quantum RSA
Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
The Montgomery ladder on binary elliptic curves
Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
LMS vs XMSS: Comparion of two Hash-Based Signature Standards
Panos Kampanakis, Scott Fluhrer
Panos Kampanakis, Scott Fluhrer
Removal Attacks on Logic Locking and Camouflaging Techniques
Muhammad Yasin, Bodhisatwa Mazumdar, Ozugr Sinanoglu, Jeyavijayan Rajendran
Muhammad Yasin, Bodhisatwa Mazumdar, Ozugr Sinanoglu, Jeyavijayan Rajendran
Predictive Aging of Reliability of two Delay PUFs
Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'h, Sylvain Guilley
Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'h, Sylvain Guilley
Some cryptanalytic results on Lizard
Subhadeep Banik, Takanori Isobe
Subhadeep Banik, Takanori Isobe
Mind the Gap: Towards Secure 1st-order Masking in Software
Kostas Papagiannopoulos, Nikita Veshchikov
Kostas Papagiannopoulos, Nikita Veshchikov
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Essam Ghadafi, Jens Groth
Essam Ghadafi, Jens Groth
Multilinear Maps Using a Variant of Ring-LWE
Gu Chunsheng
Gu Chunsheng
Steganography techniques
Dragoş Dumitrescu, Ioan-Mihail Stan, Emil Simion
Dragoş Dumitrescu, Ioan-Mihail Stan, Emil Simion
Enhancing Security by Combining Biometrics and Cryptography
Diana Popa, Emil Simion
Diana Popa, Emil Simion
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
Alan Kaminsky
A Traceability Analysis of Monero's Blockchain
Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena
Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena
Authentication of Outsourced Linear Function Query with Efficient Updates
Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu
Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu
NIST RANDOMNESS TESTS (IN)DEPENDENCE
Carmina GEORGESCU, Alina PETRESCU-NITA, Emil SIMION, Antonela TOMA
Carmina GEORGESCU, Alina PETRESCU-NITA, Emil SIMION, Antonela TOMA
Privacy-Preserving Linear Regression on Distributed Data
Irene Giacomelli, Somesh Jha, C. David Page
Irene Giacomelli, Somesh Jha, C. David Page
Updating key size estimations for pairings
Razvan Barbulescu, Sylvain Duquesne
Razvan Barbulescu, Sylvain Duquesne
Faster Homomorphic Function Evaluation using Non-Integral Base Encoding
Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Reforgeability of Authenticated Encryption Schemes
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Optimal attacks on qubit-based Quantum Key Recycling
Daan Leermakers, Boris Skoric
Daan Leermakers, Boris Skoric
Distinguisher-Dependent Simulation in Two Rounds and its Applications
Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum
Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum
Maliciously Secure Multi-Client ORAM
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
Evaluating Bernstein-Rabin-Winograd Polynomials
Sebati Ghosh, Palash Sarkar
Sebati Ghosh, Palash Sarkar
MQ Signatures for PKI
Alan Szepieniec, Ward Beullens, Bart Preneel
Alan Szepieniec, Ward Beullens, Bart Preneel
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data
Manuel Barbosa, Dario Catalano, Dario Fiore
Manuel Barbosa, Dario Catalano, Dario Fiore
CHVote Protocol Specification
Rolf Haenni, Reto E. Koenig, Philipp Locher, and Eric Dubuis
Rolf Haenni, Reto E. Koenig, Philipp Locher, and Eric Dubuis
Family of PRGs based on Collections of Arithmetic Progressions
Ch. Srikanth, C. E. Veni Madhavan
Ch. Srikanth, C. E. Veni Madhavan
Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More
Atsushi Takayasu, Yohei Watanabe
Atsushi Takayasu, Yohei Watanabe
Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
Jun Xu, Santanu Sarkar, Lei Hu
Jun Xu, Santanu Sarkar, Lei Hu
How Fast Can We Obfuscate Using Ideal Graded Encoding Schemes
Dingfeng Ye, Peng Liu, Jun Xu
Dingfeng Ye, Peng Liu, Jun Xu
Speeding up Huff Form of Elliptic Curves
Neriman Gamze Orhon, Huseyin Hisil
Neriman Gamze Orhon, Huseyin Hisil
Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
Sikhar Patranabis, Debdeep Mukhopadhyay
Sikhar Patranabis, Debdeep Mukhopadhyay
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Sikhar Patranabis, Debdeep Mukhopadhyay
Sikhar Patranabis, Debdeep Mukhopadhyay
Solidus: Confidential Distributed Ledger Transactions via PVORM
Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi
Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi
Exploring Potential 6LoWPAN Traffic Side Channels
Yan Yan, Elisabeth Oswald, Theo Tryfonas
Yan Yan, Elisabeth Oswald, Theo Tryfonas
Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)
Bernardo Ferreira, Joaão Leitão, Henrique Domingos
Bernardo Ferreira, Joaão Leitão, Henrique Domingos
Post-quantum cryptography---dealing with the fallout of physics success
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Yanqing Yao, Hua Guo, Zhoujun Li
Yanqing Yao, Hua Guo, Zhoujun Li
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari
Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari
Constructing Multidimensional Differential Addition Chains and their Applications
Aaron Hutchinson, Koray Karabina
Aaron Hutchinson, Koray Karabina
KDM-Secure Public-Key Encryption from Constant-Noise LPN
Shuai Han, Shengli Liu
Shuai Han, Shengli Liu
Perfectly Secure Message Transmission Scheme against Rational Adversaries
Maiki Fujita, Takeshi Koshiba
Maiki Fujita, Takeshi Koshiba
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus
Nicholas Genise, Daniele Micciancio
Nicholas Genise, Daniele Micciancio
Efficient Synchronous Byzantine Consensus
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
Cube Attacks on Non-Blackbox Polynomials Based on Division Property (Full Version)
Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
A Zero Knowledge Sumcheck and its Applications
Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
Provably Secure NTRUEncrypt over More General Cyclotomic Rings
Yang Yu, Guangwu Xu, Xiaoyun Wang
Yang Yu, Guangwu Xu, Xiaoyun Wang
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
Quantum preimage, 2nd-preimage, and collision resistance of SHA3
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner
Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Alex Lombardi, Vinod Vaikuntanathan
Alex Lombardi, Vinod Vaikuntanathan
Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
Iddo Bentov, Pavel Hubáček, Tal Moran, Asaf Nadler
Iddo Bentov, Pavel Hubáček, Tal Moran, Asaf Nadler
Fast Private Set Intersection from Homomorphic Encryption
Hao Chen, Kim Laine, Peter Rindal
Hao Chen, Kim Laine, Peter Rindal
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling
Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O’Sullivan, Tim Güneysu, Francesco Regazzoni
Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O’Sullivan, Tim Güneysu, Francesco Regazzoni
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
Topology-Hiding Computation on all Graphs
Adi Akavia, Rio LaVigne, Tal Moran
Adi Akavia, Rio LaVigne, Tal Moran
Improved key-reconciliation method
Ludo Tolhuizen, Ronald Rietman, Oscar Garcia-Morchon
Ludo Tolhuizen, Ronald Rietman, Oscar Garcia-Morchon
Secure searching of biomarkers through hybrid homomorphic encryption scheme
Miran Kim, Yongsoo Song, Jung Hee Cheon
Miran Kim, Yongsoo Song, Jung Hee Cheon
Montgomery curves and the Montgomery ladder
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Involutory Differentially 4-Uniform Permutations from Known Constructions
Shihui Fu, Xiutao Feng
Shihui Fu, Xiutao Feng
How to Achieve Non-Malleability in One or Two Rounds
Dakshita Khurana, Amit Sahai
Dakshita Khurana, Amit Sahai
Double DIP: Re-Evaluating Security of Logic Encryption Algorithms
Yuanqi Shen, Hai Zhou
Yuanqi Shen, Hai Zhou
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Matthias Krause
Matthias Krause
Security of Symmetric Primitives under Incorrect Usage of Keys
Pooya Farshim, Claudio Orlandi, Răzvan Roşie
Pooya Farshim, Claudio Orlandi, Răzvan Roşie
Towards Sound and Optimal Leakage Detection Procedure
Liwei Zhang, A. Adam Ding, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
Liwei Zhang, A. Adam Ding, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
Impossible Differential Attack on Midori128 Using Rebound-like Technique
Wenquan Bi, Zheng Li, Xiaoyang Dong, Xiaoyun Wang
Wenquan Bi, Zheng Li, Xiaoyang Dong, Xiaoyun Wang
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
Maik Ender, Alexander Wild, Amir Moradi
Maik Ender, Alexander Wild, Amir Moradi
On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos, Amir Moradi
Thorben Moos, Amir Moradi
Collapsing sponges: Post-quantum security of the sponge construction
Dominique Unruh
Dominique Unruh
Practical Secure Aggregation for Privacy Preserving Machine Learning
Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth
Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth
Amortization with Fewer Equations for Proving Knowledge of Small Secrets
Rafael del Pino, Vadim Lyubashevsky
Rafael del Pino, Vadim Lyubashevsky
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
New Observations on Invariant Subspace Attack
Yunwen Liu, Vincent Rijmen
Yunwen Liu, Vincent Rijmen
Minimizing the Complexity of Goldreich's Pseudorandom Generator
Alex Lombardi, Vinod Vaikuntanathan
Alex Lombardi, Vinod Vaikuntanathan
Obfuscating Compute-and-Compare Programs under LWE
Daniel Wichs, Giorgos Zirdelis
Daniel Wichs, Giorgos Zirdelis
Simple and Generic Constructions of Succinct Functional Encryption
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
Lockable Obfuscation
Rishab Goyal, Venkata Koppula, Brent Waters
Rishab Goyal, Venkata Koppula, Brent Waters
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles
Huijia Lin, Rafael Pass, Pratik Soni
Huijia Lin, Rafael Pass, Pratik Soni
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht
Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht
High Order Masking of Look-up Tables with Common Shares
Jean-Sebastien Coron, Franck Rondepierre, Rina Zeitoun
Jean-Sebastien Coron, Franck Rondepierre, Rina Zeitoun
Rational Proofs against Rational Verifiers
Keita Inasawa, Kenji Yasunaga
Keita Inasawa, Kenji Yasunaga
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
Okan Seker, Thomas Eisenbarth, Rainer Steinwandt
Okan Seker, Thomas Eisenbarth, Rainer Steinwandt
Efficient Sanitizable Signatures without Random Oracles
Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder
Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
Seungkwang Lee
Seungkwang Lee
From Higher-Order Differentials to Polytopic Cryptanalysis
Tyge Tiessen
Tyge Tiessen
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
Kamalesh Acharya, Ratna Dutta
Kamalesh Acharya, Ratna Dutta
A note on how to (pre-)compute a ladder
Thomaz Oliveira, Julio López, Hüseyin Hışıl, Armando Faz-Hernández, Francisco Rodrıíguez-Henrıíquez
Thomaz Oliveira, Julio López, Hüseyin Hışıl, Armando Faz-Hernández, Francisco Rodrıíguez-Henrıíquez
Bivariate attacks and confusion coefficients
Sylvain Guilley, Liran Lerman
Sylvain Guilley, Liran Lerman
When It’s All Just Too Much: Outsourcing MPC-Preprocessing
Peter Scholl, Nigel P. Smart, Tim Wood
Peter Scholl, Nigel P. Smart, Tim Wood
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
Message-Recovery MACs and Verification-Unskippable AE
Shoichi Hirose, Yu Sasaki, Kan Yasuda
Shoichi Hirose, Yu Sasaki, Kan Yasuda
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
Daniele Micciancio, Michael Walter
Daniele Micciancio, Michael Walter
Pseudorandomness of Ring-LWE for Any Ring and Modulus
Chris Peikert, Oded Regev, Noah Stephens-Davidowitz
Chris Peikert, Oded Regev, Noah Stephens-Davidowitz
Threshold Fully Homomorphic Encryption
Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
A Framework for Universally Composable Diffie-Hellman Key Exchange
Ralf Kuesters, Daniel Rausch
Ralf Kuesters, Daniel Rausch
New and Old Limits for AES Known-Key Distinguishers
Lorenzo Grassi, Christian Rechberger
Lorenzo Grassi, Christian Rechberger
Towards Easy Key Enumeration
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
A Modular Security Analysis of EAP and IEEE 802.11
Chris Brzuska, Håkon Jacobsen
Chris Brzuska, Håkon Jacobsen
High-Order Conversion From Boolean to Arithmetic Masking
Jean-Sebastien Coron
Jean-Sebastien Coron
A Lattice-Based Universal Thresholdizer for Cryptographic Systems
Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim
Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
Huijia Lin, Stefano Tessaro
Huijia Lin, Stefano Tessaro
Proof of Luck: an Efficient Blockchain Consensus Protocol
Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal
Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal
IPcore implementation susceptibility: A case study of Low latency ciphers
Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai
Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai
Efficient Multivariate Ring Signature Schemes
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
An Analysis of FV Parameters Impact Towards its Hardware Acceleration
Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux
Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux
Cache-Base Application Detection in the Cloud Using Machine Learning
Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
Model-counting Approaches For Nonlinear Numerical Constraints
Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Păsăreanu
Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Păsăreanu
Key Recovery: Inert and Public
Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
Full accounting for verifiable outsourcing
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies
Linear Consistency for Proof-of-Stake Blockchains
Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
Boosting Authenticated Encryption Robustness With Minimal Modifications
Tomer Ashur, Orr Dunkelman, Atul Luykx
Tomer Ashur, Orr Dunkelman, Atul Luykx
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
Tim Ruffing, Pedro Moreno-Sanchez
Tim Ruffing, Pedro Moreno-Sanchez
Switch Commitments: A Safety Switch for Confidential Transactions
Tim Ruffing, Giulio Malavolta
Tim Ruffing, Giulio Malavolta
A new rank metric codes based encryption scheme
Pierre Loidreau
Pierre Loidreau
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
Isheeta Nargis
Isheeta Nargis
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
Shashank Agrawal, Melissa Chase
Shashank Agrawal, Melissa Chase
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou
Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou
EHE: nonce misuse-resistant message authentication
Sergey Agievich
Sergey Agievich
Smart Contracts Make Bitcoin Mining Pools Vulnerable
Yaron Velner, Jason Teutsch, Loi Luu
Yaron Velner, Jason Teutsch, Loi Luu
Multi-Prover Interactive Proofs: Unsound Foundations
Claude Crépeau, Nan Yang
Claude Crépeau, Nan Yang
Efficient and Secure Outsourcing of Genomic Data Storage
João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar, Marc-Olivier Killijian, Jean-Pierre Hubaux
João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar, Marc-Olivier Killijian, Jean-Pierre Hubaux
Towards Shared Ownership in the Cloud
Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes
Ruiyu Zhu, Yan Huang
Ruiyu Zhu, Yan Huang
Bandwidth Hard Functions for ASIC Resistance
Ling Ren, Srinivas Devadas
Ling Ren, Srinivas Devadas
Simple Encrypted Arithmetic Library - SEAL v2.1
Hao Chen, Kim Laine, Rachel Player
Hao Chen, Kim Laine, Rachel Player
0-RTT Key Exchange with Full Forward Secrecy
Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin
Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
Cryptanalysis of PMACx, PMAC2x, and SIVx
Kazuhiko Minematsu, Tetsu Iwata
Kazuhiko Minematsu, Tetsu Iwata
Attribute-Based Encryption from Identity-Based Encryption
Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin
Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin
Repeated Games for Generating Randomness in Encryption
Kenji Yasunaga, Kosuke Yuzawa
Kenji Yasunaga, Kosuke Yuzawa
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
Kuo-Hui Yeh
Kuo-Hui Yeh
SCRAPE: Scalable Randomness Attested by Public Entities
Ignacio Cascudo, Bernardo David
Ignacio Cascudo, Bernardo David
SEVDSI: Secure, Efficient and Verifiable Data Set Intersection
Ozgur Oksuz, Iraklis Leontiadis, Sixia Chen, Alexander Russell, Qiang Tang, Bing Wang
Ozgur Oksuz, Iraklis Leontiadis, Sixia Chen, Alexander Russell, Qiang Tang, Bing Wang
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
Quantum Information Set Decoding Algorithms
Ghazal Kachigar, Jean-Pierre Tillich
Ghazal Kachigar, Jean-Pierre Tillich
Montgomery curves and their arithmetic: The case of large characteristic fields
Craig Costello, Benjamin Smith
Craig Costello, Benjamin Smith
Multi-level Access in Searchable Symmetric Encryption
James Alderman, Keith M. Martin, Sarah Louise Renwick
James Alderman, Keith M. Martin, Sarah Louise Renwick
Public Key Cryptosystems with Noisy Secret Keys
Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas
Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
Qipeng Liu, Mark Zhandry
Qipeng Liu, Mark Zhandry
SoK: Security Models for Pseudo-Random Number Generators
Sylvain Ruhault
Sylvain Ruhault
Private Queries on Encrypted Genomic Data
Gizem S Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
Gizem S Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
Yongge Wang
Yongge Wang
ZETA: Towards Tagless Authenticated Encryption
Anindya Shankar Bhandari, Dipanwita Roy Chowdhury
Anindya Shankar Bhandari, Dipanwita Roy Chowdhury
Linear Cryptanalysis Using Low-bias Linear Approximations
Tomer Ashur, Daniël Bodden, Orr Dunkelman
Tomer Ashur, Daniël Bodden, Orr Dunkelman
Proofs of Useful Work
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
Average-Case Fine-Grained Hardness
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers
Gabriel Kaptchuk, Ian Miers, Matthew Green
Gabriel Kaptchuk, Ian Miers, Matthew Green
Anonymous Attestation with Subverted TPMs
Jan Camenisch, Manu Drijvers, Anja Lehmann
Jan Camenisch, Manu Drijvers, Anja Lehmann
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
Dustin Moody, Ray Perlner, Daniel Smith-Tone
Dustin Moody, Ray Perlner, Daniel Smith-Tone
FHE with Recursive Ciphertext
Masahiro Yagisawa
Masahiro Yagisawa
A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group
Wenying Zhang, Zhaohui Xing, Keqin Feng
Wenying Zhang, Zhaohui Xing, Keqin Feng
Attribute-based concurrent signatures
BaoHong Li, Guoqing Xu, Yinliang Zhao
BaoHong Li, Guoqing Xu, Yinliang Zhao
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
Chaoyun Li, Qingju Wang
Chaoyun Li, Qingju Wang
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)
Andrea Visconti, Chiara Valentina Schiavo, René Peralta
Andrea Visconti, Chiara Valentina Schiavo, René Peralta
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
Shuwen Deng, Doğuhan Gümüşoğlu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer
Shuwen Deng, Doğuhan Gümüşoğlu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer
Improved Hybrid Consensus Scheme with Privacy-preserving Property
Shuyang Tang, Zhiqiang Liu, Zhen Liu, Yu Long, Shengli Liu
Shuyang Tang, Zhiqiang Liu, Zhen Liu, Yu Long, Shengli Liu
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun
David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun
The first collision for full SHA-1
Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov
Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov
Global-Scale Secure Multiparty Computation
Xiao Wang, Samuel Ranellucci, Jonathan Katz
Xiao Wang, Samuel Ranellucci, Jonathan Katz
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
Wenying Zhang, Vincent Rijmen
Wenying Zhang, Vincent Rijmen
The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives
H. Gopalakrishna Gadiyar, R. Padma
H. Gopalakrishna Gadiyar, R. Padma
A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies
Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
A Virtual Wiretap Channel for Secure MessageTransmission
Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Guillaume Endignoux, Damian Vizár
Guillaume Endignoux, Damian Vizár
Analysis of Software Countermeasures for Whitebox Encryption
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
The Approximate $k$-List Problem
Leif Both, Alexander May
Leif Both, Alexander May
New techniques for trail bounds and application to differential trails in Keccak
Silvia Mella, Joan Daemen, Gilles Van Assche
Silvia Mella, Joan Daemen, Gilles Van Assche
Robust P2P Primitives Using SGX Enclaves
Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
REM: Resource-Efficient Mining for Blockchains
Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
Optimal Differential Trails in SIMON-like Ciphers
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets
Navid Nasr Esfahani, Ian Goldberg, D. R. Stinson
Navid Nasr Esfahani, Ian Goldberg, D. R. Stinson
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
Yuval Ishai, Mor Weiss
Yuval Ishai, Mor Weiss
Analysis of Burn-in period for RC4 State Transition
Goutam Paul, Souvik Ray
Goutam Paul, Souvik Ray
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes
Ruiyu Zhu, Yan Huang
Ruiyu Zhu, Yan Huang
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
Marc Stevens, Dan Shumow
Marc Stevens, Dan Shumow
On The Exact Security of Message Authentication Using Pseudorandom Functions
Ashwin Jha, Avradip Mandal, Mridul Nandi
Ashwin Jha, Avradip Mandal, Mridul Nandi
Quantum Key Search with Side Channel Advice
Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan Shepherd
Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan Shepherd
Error-free protection of EC point multiplication by modular extension
Martin Seysen
Martin Seysen
UFace: Your Universal Password That No One Can See
Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
AES-GCM-SIV: Specification and Analysis
Shay Gueron, Adam Langley, Yehuda Lindell
Shay Gueron, Adam Langley, Yehuda Lindell
Cloud Storage File Recoverability
Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid
Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid
A roadmap to fully homomorphic elections: Stronger security, better verifiability
Kristian Gjøsteen, Martin Strand
Kristian Gjøsteen, Martin Strand
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan
Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan
Homomorphic Encryption without Gaussian Noise
Anamaria Costache, Nigel P. Smart
Anamaria Costache, Nigel P. Smart
Analysis of AES, SKINNY, and Others with Constraint Programming
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
Security Notions for Bidirectional Channels
Giorgia Azzurra Marson, Bertram Poettering
Giorgia Azzurra Marson, Bertram Poettering
Conditional Cube Attack on Round-Reduced ASCON
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
Martin Potthast, Christian Forler, Eik List, Stefan Lucks
Martin Potthast, Christian Forler, Eik List, Stefan Lucks
Detecting General Algebraic Manipulation Attacks
Kim Ramchen
Kim Ramchen
Trust Is Risk: A Decentralized Financial Trust Platform
Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros
Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
Yoshinori Aono, Phong Q. Nguyen
Yoshinori Aono, Phong Q. Nguyen
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Thorsten Kranz, Friedrich Wiemer, Gregor Leander
Thorsten Kranz, Friedrich Wiemer, Gregor Leander
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis, Ming Li
Iraklis Leontiadis, Ming Li
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
Fermi Ma, Mark Zhandry
Fermi Ma, Mark Zhandry
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay
Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Elette Boyle, Niv Gilboa, Yuval Ishai
Elette Boyle, Niv Gilboa, Yuval Ishai
Bitcoin as a Transaction Ledger: A Composable Treatment
Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas
Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas
Pattern Matching on Encrypted Streams
Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders
Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders
Ad Hoc PSM Protocols: Secure Computation Without Coordination
Amos Beimel, Yuval Ishai, Eyal Kushilevitz
Amos Beimel, Yuval Ishai, Eyal Kushilevitz
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Mohammad Hajiabadi, Bruce M. Kapron
Mohammad Hajiabadi, Bruce M. Kapron
The Multi-User Security of Double Encryption
Viet Tung Hoang, Stefano Tessaro
Viet Tung Hoang, Stefano Tessaro
Privacy-Preserving Search of Similar Patients in Genomic Data
Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin
Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin
Constraint-hiding Constrained PRFs for NC1 from LWE
Ran Canetti, Yilei Chen
Ran Canetti, Yilei Chen
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme
Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
Partitioned Group Password-Based Authenticated Key Exchange
Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente
Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt
Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt
Revisiting AES Related-Key Differential Attacks with Constraint Programming
David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon
David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon
How (not) to Use Welch's T-test in Side-Channel Security Evaluations
François-Xavier Standaert
François-Xavier Standaert
Modifying an Enciphering Scheme after Deployment
Paul Grubbs, Thomas Ristenpart, Yuval Yarom
Paul Grubbs, Thomas Ristenpart, Yuval Yarom
Dispersed Cryptography and the Quotient Ring Transform
Anna Johnston
Anna Johnston
Hashing Garbled Circuits for Free
Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov
Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes
Ryan Stanley-Oakes
Ryan Stanley-Oakes
Composable and Robust Outsourced Storage
Christian Badertscher, Ueli Maurer
Christian Badertscher, Ueli Maurer
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
Roel Peeters, Jens Hermans, Aysajan Abidin
Roel Peeters, Jens Hermans, Aysajan Abidin
A Practical Multivariate Blind Signature Scheme
Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
Topology-Hiding Computation Beyond Logarithmic Diameter
Adi Akavia, Tal Moran
Adi Akavia, Tal Moran
Sublinear Zero-Knowledge Arguments for RAM Programs
Payman Mohassel, Mike Rosulek, Alessandra Scafuro
Payman Mohassel, Mike Rosulek, Alessandra Scafuro
New Collision Attacks on Round-Reduced Keccak
Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo
Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
Prabhanjan Ananth, Aayush Jain, Amit Sahai
Prabhanjan Ananth, Aayush Jain, Amit Sahai
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
Seny Kamara, Tarik Moataz
Seny Kamara, Tarik Moataz
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings
Payman Mohassel, Mike Rosulek
Payman Mohassel, Mike Rosulek
On the Exact Round Complexity of Self-Composable Two-Party Computation
Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Rishab Goyal, Venkata Koppula, Brent Waters
Rishab Goyal, Venkata Koppula, Brent Waters
One-Shot Verifiable Encryption from Lattices
Vadim Lyubashevsky, Gregory Neven
Vadim Lyubashevsky, Gregory Neven
Twisted $\mu_4$-normal form for elliptic curves
David Kohel
David Kohel
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
Rishab Goyal, Venkata Koppula, Brent Waters
Rishab Goyal, Venkata Koppula, Brent Waters
Quantum Authentication with Key Recycling
Christopher Portmann
Christopher Portmann
A New Structural-Differential Property of 5-Round AES
Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
The SM9 Cryptographic Schemes
Zhaohui Cheng
Zhaohui Cheng
Masking Proofs are Tight (and How to Exploit it in Security Evaluations)
Vincent Grosso, François-Xavier Standaert
Vincent Grosso, François-Xavier Standaert
An efficient self-blindable attribute-based credential scheme
Sietse Ringers, Eric Verheul, Jaap-Henk Hoepman
Sietse Ringers, Eric Verheul, Jaap-Henk Hoepman
Zero-Knowledge Proofs of Proximity
Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan
Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan
Algebraic Fault Analysis of SHA-3
Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl
Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl
Zero-Knowledge Proxy Re-Identification Revisited
Xavier Bultel, Pascal Lafourcade
Xavier Bultel, Pascal Lafourcade
EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves
Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska
Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Patrick McCorry, Siamak F. Shahandashti, Feng Hao
Patrick McCorry, Siamak F. Shahandashti, Feng Hao
Unilaterally-Authenticated Key Exchange
Yevgeniy Dodis, Dario Fiore
Yevgeniy Dodis, Dario Fiore
Photonic Side Channel Attacks Against RSA
Elad Carmon, Jean-Pierre Seifert, Avishai Wool
Elad Carmon, Jean-Pierre Seifert, Avishai Wool
Secure Logging with Crash Tolerance
Erik-Oliver Blass, Guevara Noubir
Erik-Oliver Blass, Guevara Noubir
$\mu$chain: How to Forget without Hard Forks
Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
Ling Yang, Fuyang Fang, Xianhui Lu, Wen-Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan
Ling Yang, Fuyang Fang, Xianhui Lu, Wen-Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan
Implementing BP-Obfuscation Using Graph-Induced Encoding
Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz
Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz
Reconciling d+1 Masking in Hardware and Software
Hannes Gross, Stefan Mangard
Hannes Gross, Stefan Mangard
Quantum Authentication and Encryption with Key Recycling
Serge Fehr, Louis Salvail
Serge Fehr, Louis Salvail
Optimizing Implementations of Lightweight Building Blocks
Jeremy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
Jeremy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
Private Puncturable PRFs From Standard Lattice Assumptions
Dan Boneh, Sam Kim, Hart Montgomery
Dan Boneh, Sam Kim, Hart Montgomery
Making NSEC5 Practical for DNSSEC
Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Včelák, Leonid Reyzin, Sharon Goldberg
Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Včelák, Leonid Reyzin, Sharon Goldberg
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
Vanesa Daza, Nikolaos Makriyannis
Vanesa Daza, Nikolaos Makriyannis
Boolean functions with restricted input and their robustness; application to the FLIP cipher
Claude Carlet, Pierrick Méaux, Yann Rotella
Claude Carlet, Pierrick Méaux, Yann Rotella
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
Shota Yamada
Shota Yamada
Attacks on Secure Logging Schemes
Gunnar Hartung
Gunnar Hartung
Quantum Tokens for Digital Signatures
Shalev Ben-David, Or Sattath
Shalev Ben-David, Or Sattath
On new multivariate cryptosystems based on hidden Eulerian equations over finite fields
Vasyl Ustimenko
Vasyl Ustimenko
Small CRT-Exponent RSA Revisited
Atsushi Takayasu, Yao Lu, Liqiang Peng
Atsushi Takayasu, Yao Lu, Liqiang Peng
Design and Implementation of Low Depth Pairing-based Homomorphic Encryption Scheme
Vincent Herbert, Bhaskar Biswas, Caroline Fontaine
Vincent Herbert, Bhaskar Biswas, Caroline Fontaine
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Saiyu Qi, Yuanqing Zheng
Saiyu Qi, Yuanqing Zheng
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov
Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov
A Differential Fault Attack on Plantlet
Subhamoy Maitra, Akhilesh Siddhanti
Subhamoy Maitra, Akhilesh Siddhanti
Cryptanalysis of full round Fruit
Sabyasachi Dey, Santanu Sarkar
Sabyasachi Dey, Santanu Sarkar
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
David Derler, Sebastian Ramacher, Daniel Slamanig
David Derler, Sebastian Ramacher, Daniel Slamanig
Information Security Applications of Bit-Mixers
Laszlo Hars
Laszlo Hars
Hardware Bit-Mixers
Laszlo Hars
Laszlo Hars
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders
Anna Johnston
Anna Johnston
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
Marc Fischlin, Felix Günther
Estonian Voting Verification Mechanism Revisited Again
Ivo Kubjas, Tiit Pikma, Jan Willemson
Ivo Kubjas, Tiit Pikma, Jan Willemson
From Minicrypt to Obfustopia via Private-Key Functional Encryption
Ilan Komargodski, Gil Segev
Ilan Komargodski, Gil Segev
Faster Bootstrapping of FHE over the Integers
Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
LPN Decoded
Andre Esser, Robert Kübler, Alexander May
Andre Esser, Robert Kübler, Alexander May
Quantum algorithms for computing short discrete logarithms and factoring RSA integers
Martin Ekerå, Johan Håstad
Martin Ekerå, Johan Håstad
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey
Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey
A First DFA on PRIDE: from Theory to Practice (extended version)
Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey
Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
Joo-Im Kim, Ji Won Yoon
Joo-Im Kim, Ji Won Yoon
Visual Honey Encryption: Application to Steganography
Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee
Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes
Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki
Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
Symbolic Models for Isolated Execution Environments
Charlie Jacomme, Steve Kremer, Guillaume Scerri
Charlie Jacomme, Steve Kremer, Guillaume Scerri
The Exact Security of PMAC
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Authenticated Encryption in the Face of Protocol and Side Channel Leakage
Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
Computation of a 768-bit prime field discrete logarithm
Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke
Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke
Subring Homomorphic Encryption
Seiko Arita, Sari Handa
Seiko Arita, Sari Handa
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
Fast Montgomery-like Square Root Computation over $GF(2^m)$ for All Trinomials
Yin Li, Yu Zhang
Yin Li, Yu Zhang
Optimal Extension Protocols for Byzantine Broadcast and Agreement
Chaya Ganesh, Arpita Patra
Chaya Ganesh, Arpita Patra
Efficient Maliciously Secure Two Party Computation for Mixed Programs
Arash Afshar, Payman Mohassel, Mike Rosulek
Arash Afshar, Payman Mohassel, Mike Rosulek
Short Digital Signatures and ID-KEMs via Truncation Collision Resistance
Tibor Jager, Rafael Kurek
Tibor Jager, Rafael Kurek
Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel, Marc Fischlin
Jacqueline Brendel, Marc Fischlin
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
Kamalesh Acharya, Ratna Dutta
Kamalesh Acharya, Ratna Dutta
WalnutDSA(TM): A Quantum-Resistant Digital Signature Algorithm
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
Mathias Wagner, Stefan Heyse
Mathias Wagner, Stefan Heyse
Verifiable Classroom Voting in Practice
Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti
Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti
A Probabilistic Baby-Step Giant-Step Algorithm
Prabhat Kushwaha, Ayan Mahalanobis
Prabhat Kushwaha, Ayan Mahalanobis
Attribute-Based Encryption Implies Identity-Based Encryption
Javier Herranz
Javier Herranz
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
Dimitar Jetchev, Benjamin Wesolowski
Dimitar Jetchev, Benjamin Wesolowski
A short note on the security of Round-Robin Differential Phase-Shift QKD
Boris Skoric
Boris Skoric
A note on VRFs from Verifiable Functional Encryption
Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
An Obfuscating Compiler
Peter T. Breuer
Peter T. Breuer
LARA - A Design Concept for Lattice-based Encryption
El Bansarkhani Rachid
El Bansarkhani Rachid
ROTE: Rollback Protection for Trusted Execution
Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Martin R. Albrecht
Martin R. Albrecht
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
Efficient Round-Optimal Blind Signatures in the Standard Model
Essam Ghadafi
Essam Ghadafi
Anonymous contribution of data
Matthew McKague, David Eyers
Matthew McKague, David Eyers
Accumulators with Applications to Anonymity-Preserving Revocation
Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
Yuanxi Dai, Yannick Seurin, John Steinberger, Aishwarya Thiruvengadam
Yuanxi Dai, Yannick Seurin, John Steinberger, Aishwarya Thiruvengadam
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
Yongge Wang, Qutaibah m. Malluhi
Yongge Wang, Qutaibah m. Malluhi
Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
Double-base scalar multiplication revisited
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
Low-Complexity Cryptographic Hash Functions
Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan
Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan
Privacy-Preserving Classification on Deep Neural Network
Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff
Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff
Analysis of the NORX Core Permutation
Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov
Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Peter Pessl
Peter Pessl
Cryptanalysis of GlobalPlatform Secure Channel Protocols
Mohamed Sabt, Jacques Traoré
Mohamed Sabt, Jacques Traoré
Honey Encryption for Language
Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
Xiao Wang, Samuel Ranellucci, Jonathan Katz
Xiao Wang, Samuel Ranellucci, Jonathan Katz
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
A Decentralized PKI In A Mobile Ecosystem
Varun Chandrasekaran, Lakshminarayanan Subramanian
Varun Chandrasekaran, Lakshminarayanan Subramanian
Scalable Multi-Party Private Set-Intersection
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Improved Structure Preserving Signatures under Standard Bilinear Assumptions
Charanjit S. Jutla, Arnab Roy
Charanjit S. Jutla, Arnab Roy
Searchable Encrypted Relational Databases: Risks and Countermeasures
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
Nuttapong Attrapadung
Nuttapong Attrapadung
Privacy for Distributed Databases via (Un)linkable Pseudonyms
Jan Camenisch, Anja Lehmann
Jan Camenisch, Anja Lehmann
A Generic Approach to Constructing and Proving Verifiable Random Functions
Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters
Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
Olivier Levillain, Maxence Tury, Nicolas Vivet
Olivier Levillain, Maxence Tury, Nicolas Vivet
SmartPool: Practical Decentralized Pooled Mining
Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs
Nir Bitansky
Nir Bitansky
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
Gottfried Herold, Elena Kirshanova
Gottfried Herold, Elena Kirshanova
Provable Security of Substitution-Permutation Networks
Yevgeniy Dodis, Jonathan Katz, John Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
Yevgeniy Dodis, Jonathan Katz, John Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
ORAMs in a Quantum World
Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser
Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
Meilof Veeningen
Meilof Veeningen
Universal Samplers with Fast Verification
Venkata Koppula, Andrew Poelstra, Brent Waters
Venkata Koppula, Andrew Poelstra, Brent Waters
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Circuit-Private Multi-Key FHE
Wutichai Chongchitmate, Rafail Ostrovsky
Wutichai Chongchitmate, Rafail Ostrovsky
Access Control Encryption for Equality, Comparison, and More
Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
Externally Verifiable Oblivious RAM
Joshua Gancher, Adam Groce, Alex Ledger
Joshua Gancher, Adam Groce, Alex Ledger
Algebraic Attack Efficiency versus S-box Representation
Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk
Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk
Reduced Mumford divisors of a genus 2 curve through its jacobian function field
Eduardo Ruiz Duarte
Eduardo Ruiz Duarte
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves
Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
A New Approach for Practical Function-Private Inner Product Encryption
Sungwook Kim, Jinsu Kim, Jae Hong Seo
Sungwook Kim, Jinsu Kim, Jae Hong Seo
The STROBE protocol framework
Mike Hamburg
Mike Hamburg
Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption
Ping Zhang, Honggang Hu, Peng Wang
Ping Zhang, Honggang Hu, Peng Wang
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
Jorge Luis Villar
Jorge Luis Villar
MASCAT: Stopping Microarchitectural Attacks Before Execution
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Constant-Time Callees with Variable-Time Callers
Cesar Pereida Garcïa, Billy Bob Brumley
Cesar Pereida Garcïa, Billy Bob Brumley
Efficient Encryption from Random Quasi-Cyclic Codes
Carlos Aguilar, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor
Carlos Aguilar, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor
The Secret Processor Will Go to The Ball: Benchmark Insider-Proof Encrypted Computing
P. T. Breuer, J. P. Bowen, E. Palomar, Z. Liu
P. T. Breuer, J. P. Bowen, E. Palomar, Z. Liu
Non-Malleable Codes with Split-State Refresh
Antonio Faonio, Jesper Buus Nielsen
Antonio Faonio, Jesper Buus Nielsen
On the Security of Practical and Complete Homomorphic Encrypted Computation
P. T. Breuer, J. P. Bowen
P. T. Breuer, J. P. Bowen
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
On the Bit Security of Elliptic Curve Diffie--Hellman
Barak Shani
Barak Shani
Farfalle: parallel permutation-based cryptography
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Computing Optimal Ate Pairings on Elliptic Curves with Embedding Degree $9,15$ and $27$
Emmanuel Fouotsa, Nadia El Mrabet, Aminatou Pecha
Emmanuel Fouotsa, Nadia El Mrabet, Aminatou Pecha
On the Complexity of Breaking Pseudoentropy
Maciej Skorski
Maciej Skorski
A Digital Signature Scheme Based On Supersingular Isogeny Problem
Kisoon Yoon, Jihoon Kwon, Suhri Kim
Kisoon Yoon, Jihoon Kwon, Suhri Kim
Bitcoin Private Key Locked Transactions
Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas
Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas
Some Results on the Known Classes of Quadratic APN Functions
Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun
Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun
Public Key Encryption with Equality Test in the Standard Model
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Yu Sasaki, Yosuke Todo
Yu Sasaki, Yosuke Todo
How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity
Sumit Kumar Debnath, Ratna Dutta
Sumit Kumar Debnath, Ratna Dutta
Updatable Functional Encryption
Afonso Arriaga, Vincenzo Iovino, Qiang Tang
Afonso Arriaga, Vincenzo Iovino, Qiang Tang
Implementing and Proving the TLS 1.3 Record Layer
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Jean Karim Zinzindohoué
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Jean Karim Zinzindohoué
Efficient Slide Attacks
Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
Leakage of Signal function with reused keys in RLWE key exchange
Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, Xiaodong Lin
Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, Xiaodong Lin
On the Security Notions for Homomorphic Signatures
Dario Catalano, Dario Fiore, Luca Nizzardo
Dario Catalano, Dario Fiore, Luca Nizzardo
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
Eik List, Mridul Nandi
Eik List, Mridul Nandi
Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring
Lijing Zhou, Licheng Wang, Yiru Sun
Lijing Zhou, Licheng Wang, Yiru Sun
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Ping Zhang, Honggang Hu
Ping Zhang, Honggang Hu
A Salad of Block Ciphers
Roberto Avanzi
Roberto Avanzi
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
Christoph Dobraunig, Eik List
Christoph Dobraunig, Eik List
LWE from Non-commutative Group Rings
Qi Cheng, Jun Zhang, Jincheng Zhuang
Qi Cheng, Jun Zhang, Jincheng Zhuang
Generic Zero-Knowledge and Multivariate Quadratic Systems
Alan Szepieniec, Bart Preneel
Alan Szepieniec, Bart Preneel
Mobile Commerce: Secure Multi-party Computation & Financial Cryptography
Sumit Chakraborty
Sumit Chakraborty
Group key exchange protocols withstanding ephemeral-key reveals
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Adriana Suarez Corona
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Adriana Suarez Corona
Efficient Transparent Redactable Signatures with a Single Signature Invocation
Stuart Haber, William Horne, Miaomiao Zhang
Stuart Haber, William Horne, Miaomiao Zhang
Attacking FHE-based applications by software fault injections
Ilaria Chillotti, Nicolas Gama, Louis Goubin
Ilaria Chillotti, Nicolas Gama, Louis Goubin
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
Wen-jie Lu, Shohei Kawasaki, Jun Sakuma
Wen-jie Lu, Shohei Kawasaki, Jun Sakuma
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
Impossible Differential Attack on Simpira v2
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
Meet-in-the-Middle Attack on QARMA Block Cipher
Rui Zong, Xiaoyang Dong
Rui Zong, Xiaoyang Dong
SPECTRE: A Fast and Scalable Cryptocurrency Protocol
Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar
Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar
Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
Eric R. Verheul
Eric R. Verheul
NewHope without reconciliation
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
Scripting smart contracts for distributed ledger technology
Pablo Lamela Seijas, Simon Thompson, Darryl McAdams
Pablo Lamela Seijas, Simon Thompson, Darryl McAdams
Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks
Mathias Wagner, Yongbo Hu, Chen Zhang, Yeyang Zheng
Mathias Wagner, Yongbo Hu, Chen Zhang, Yeyang Zheng
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems
Steven D. Galbraith, Christophe Petit, Javier Silva
Steven D. Galbraith, Christophe Petit, Javier Silva
Attacks against search Poly-LWE
Momonari Kudo
Momonari Kudo
Leak Me If You Can: Does TVLA Reveal Success Rate?
Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay
Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay
A Novel Multi-factor ID-based Designated Verifier Signature scheme
Mike Scott
Mike Scott
Simple Homomorphisms of Cocks IBE and Applications
Rio LaVigne
Rio LaVigne
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Splinter: Practical Private Queries on Public Data
Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia
Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia
Cryptanalysis of a certificateless aggregate signature scheme
Nasrollah Pakniat, Mahnaz Noroozi
Nasrollah Pakniat, Mahnaz Noroozi
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
Zengpeng Li, Steven D. Galbraith, Chunguang Ma
Zengpeng Li, Steven D. Galbraith, Chunguang Ma
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
Merrielle Spain, Mayank Varia
Merrielle Spain, Mayank Varia
Private Projections & Variants
Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik
Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik
Ciphertext and Plaintext Leakage Reveals the Entire TDES Key
Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner
Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner
New construction of single-cycle T-function families
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup
Kartik Nayak, Jonathan Katz
Kartik Nayak, Jonathan Katz
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong
Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong
Comments on “Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof”
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups
Takeshi Koshiba, Katsuyuki Takashima
Takeshi Koshiba, Katsuyuki Takashima
New Impossible Differential Characteristic of SPECK64 using MILP
HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
Cryptography During the French and American Wars in Vietnam
Phan Duong Hieu, Neal Koblitz
Phan Duong Hieu, Neal Koblitz
Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
Thorben Moos, Amir Moradi, Bastian Richter
Thorben Moos, Amir Moradi, Bastian Richter
Privacy-preserving Hybrid Recommender System
Qiang Tang, Husen Wang
Qiang Tang, Husen Wang
Implementing Complete Formulas on Weierstrass Curves in Hardware
Pedro Maat C. Massolino, Joost Renes, Lejla Batina
Pedro Maat C. Massolino, Joost Renes, Lejla Batina
Some results on ACORN
Dibyendu Roy, Sourav Mukhopadhyay
Dibyendu Roy, Sourav Mukhopadhyay
New construction of single cycle T-function families
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
Are RNGs Achilles’ heel of RFID Security and Privacy Protocols ?
Atakan Arslan, Suleyman Kardas, Sultan Aldirmaz, Sarp Erturk
Atakan Arslan, Suleyman Kardas, Sultan Aldirmaz, Sarp Erturk
Certificateless Public Key Encryption with Equality Test
Xi-Jun Lin, Zhen Yan, Qi Zhang, Haipeng Qu
Xi-Jun Lin, Zhen Yan, Qi Zhang, Haipeng Qu
Modifying Shor’s algorithm to compute short discrete logarithms
Martin Ekerå
Martin Ekerå
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song
Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song
Estonian Voting Verification Mechanism Revisited
Koksal Mus, Mehmet Sabir Kiraz, Murat Cenk, Isa Sertkaya
Koksal Mus, Mehmet Sabir Kiraz, Murat Cenk, Isa Sertkaya
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata
Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata
Dude, is my code constant time?
Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede
Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought)
B. Skoric, M. de Vries
B. Skoric, M. de Vries
Insecurity of RCB: Leakage-Resilient Authenticated Encryption
Farzaneh abed, Francesco Berti, Stefan Lucks
Farzaneh abed, Francesco Berti, Stefan Lucks
Cryptanalysis of Reduced round SKINNY Block Cipher
Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri
Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri
A Code-Based Group Signature Scheme
Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit
Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit
Designing Optimal Implementations of Linear Layers (Full Version)
Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang
Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang
Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling
Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure
Maciej Skorski
Maciej Skorski
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
Full Disk Encryption: Bridging Theory and Practice
Louiza Khati, Nicky Mouha, Damien Vergnaud
Louiza Khati, Nicky Mouha, Damien Vergnaud
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures
Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari
Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari
Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes
Victor Cauchois, Pierre Loidreau, Nabil Merkiche
Victor Cauchois, Pierre Loidreau, Nabil Merkiche
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
Pascal Sasdrich, Amir Moradi, Tim Güneysu
Pascal Sasdrich, Amir Moradi, Tim Güneysu
Efficient Post-Quantum Zero-Knowledge and Signatures
Steven Goldfeder, Melissa Chase, Greg Zaverucha
Steven Goldfeder, Melissa Chase, Greg Zaverucha
Practical CCA2-Secure and Masked Ring-LWE Implementation
Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
Security Analysis of SKINNY under Related-Tweakey Settings
Guozhen Liu, Mohona Ghosh, Ling Song
Guozhen Liu, Mohona Ghosh, Ling Song
Magic Adversaries Versus Individual Reduction: Science Wins Either Way
Yi Deng
Yi Deng
Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption
Romain Gay
Romain Gay
Generic Transformations of Predicate Encodings: Constructions and Applications
Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
Practical Functional Encryption for Bilinear Forms
Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore
Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore
A Fast Single-Key Two-Level Universal Hash Function
Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
Alfred Menezes, Palash Sarkar, Shashank Singh
Alfred Menezes, Palash Sarkar, Shashank Singh
MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher
Ling Sun, Wei Wang, Ru Liu, Meiqin Wang
Ling Sun, Wei Wang, Ru Liu, Meiqin Wang
Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability
Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri
Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri
Improved Parameters for the Ring-TESLA Digital Signature Scheme
Arjun Chopra
Arjun Chopra
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps
Prabhanjan Ananth, Amit Sahai
Prabhanjan Ananth, Amit Sahai
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
Huijia Lin
Huijia Lin
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
Noboru Kunihiro, Yuki Takahashi
Noboru Kunihiro, Yuki Takahashi
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
Yohei Watanabe, Keita Emura, Jae Hong Seo
Yohei Watanabe, Keita Emura, Jae Hong Seo
Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing
Siva Nishok Dhanuskodi, Daniel Holcomb
Siva Nishok Dhanuskodi, Daniel Holcomb
Parametrizations for Families of ECM-friendly curves
Alexandre Gélin, Thorsten Kleinjung, Arjen K. Lenstra
Alexandre Gélin, Thorsten Kleinjung, Arjen K. Lenstra
On the Entropy of Oscillator-Based True Random Number Generators
Yuan Ma, Jingqiang Lin, Jiwu Jing
Yuan Ma, Jingqiang Lin, Jiwu Jing
OleF: An Inverse-Free Online Cipher
Ritam Bhaumik, Mridul Nandi
Ritam Bhaumik, Mridul Nandi
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
Jérémy Chotard, Duong Hieu Phan, David Pointcheval
Jérémy Chotard, Duong Hieu Phan, David Pointcheval
How to infinitely share a secret more efficiently
Anat Paskin-Cherniavsky
Anat Paskin-Cherniavsky
CENC is Optimally Secure
Tetsu Iwata, Bart Mennink, Damian Vizár
Tetsu Iwata, Bart Mennink, Damian Vizár
An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model
Reyhaneh Rabaninejad, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri
Reyhaneh Rabaninejad, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri
Digital Signatures from Symmetric-Key Primitives
David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig
David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig
Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs
T-H. Hubert Chan, Elaine Shi
T-H. Hubert Chan, Elaine Shi
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
Dingding Jia, Xianhui Lu, Bao Li
Dingding Jia, Xianhui Lu, Bao Li
My traces learn what you did in the dark: recovering secret signals without key guesses
Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma
Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption
David Nuñez, Isaac Agudo, Javier Lopez
David Nuñez, Isaac Agudo, Javier Lopez
Does Coupling Affect the Security of Masked Implementations?
Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen
Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen
Revisiting the Cubic UOV Signature Scheme
Dung Hoang Duong, Takanori Yasuda, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi
Dung Hoang Duong, Takanori Yasuda, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi
Construction of $n$-variable ($n\equiv 2 \bmod 4$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $< 2^{\frac n2}$
Deng Tang, Subhamoy Maitra
Deng Tang, Subhamoy Maitra
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture
N. P. Karvelas, Andreas Peter, Stefan Katzenbeisser
N. P. Karvelas, Andreas Peter, Stefan Katzenbeisser
A Note on Quantum-Secure PRPs
Mark Zhandry
Mark Zhandry
Cryptanalysis of Simple Matrix Scheme for Encryption
Gu Chunsheng
Gu Chunsheng
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Thomas Unterluggauer, Mario Werner, Stefan Mangard
Thomas Unterluggauer, Mario Werner, Stefan Mangard
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
Game-Theoretic Security for Two-Party Protocols
Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
Iron: Functional Encryption using Intel SGX
Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
Preventing CLT Attacks on Obfuscation with Linear Overhead
Rex Fernando, Peter M. R. Rasmussen, Amit Sahai
Rex Fernando, Peter M. R. Rasmussen, Amit Sahai
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO
Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti
Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti
On Finding Short Cycles in Cryptographic Algorithms
Elena Dubrova, Maxim Teslenko
Elena Dubrova, Maxim Teslenko
Scalable Bias-Resistant Distributed Randomness
Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford
Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
Aner Ben-Efraim, Yehuda Lindell, Eran Omri
Aner Ben-Efraim, Yehuda Lindell, Eran Omri
Revisiting the Efficient Key Generation of ZHFE
Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi
Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
David Derler, Stephan Krenn, Daniel Slamanig
David Derler, Stephan Krenn, Daniel Slamanig
Authenticated LSM Trees with Minimal Trust
Yuzhe (Richard) Tang, Ju Chen, Kai Li
Yuzhe (Richard) Tang, Ju Chen, Kai Li
Catena: Efficient Non-equivocation via Bitcoin
Alin Tomescu, Srinivas Devadas
Alin Tomescu, Srinivas Devadas
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
Joan Daemen
Joan Daemen
On Analyzing Program Behavior Under Fault Injection Attacks
Jakub Breier
Jakub Breier
The INT-RUP Security of OCB with Intermediate (Parity) Checksum
Ping Zhang, Peng Wang, Honggang Hu
Ping Zhang, Peng Wang, Honggang Hu
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Secure Multiparty Computation from SGX
Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi
Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi
A Tool Kit for Partial Key Exposure Attacks on RSA
Atsushi Takayasu, Noboru Kunihiro
Atsushi Takayasu, Noboru Kunihiro
A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE
Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, Yongha Son
Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, Yongha Son
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
Ashutosh Dhar Dwivedi, Miloš Klouček, Pawel Morawiecki, Ivica Nikolic̈, Josef Pieprzyk, Sebastian Wöjtowicz
Ashutosh Dhar Dwivedi, Miloš Klouček, Pawel Morawiecki, Ivica Nikolic̈, Josef Pieprzyk, Sebastian Wöjtowicz
Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System
Shuai Han, Shengli Liu, Lin Lyu
Shuai Han, Shengli Liu, Lin Lyu
Cryptographic decoding of the Leech lattice
Alex van Poppelen
Alex van Poppelen
Randomized stopping times and provably secure pseudorandom permutation generators
Michal Kulis, Pawel Lorek, Filip Zagorski
Michal Kulis, Pawel Lorek, Filip Zagorski
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten
Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten
Efficient Finite field multiplication for isogeny based post quantum cryptography
Angshuman karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Angshuman karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
Concurrently Composable Security With Shielded Super-polynomial Simulators
Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel
Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel
"Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks
Leon Groot Bruinderink, Andreas Hülsing
Leon Groot Bruinderink, Andreas Hülsing
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data
Chia-Mu Yu
Chia-Mu Yu
Semi-Honest Secure Multiparty Computation Can Be Insecure by Using Secure Pseudorandom Generators
Koji Nuida
Koji Nuida
A Fiat-Shamir Implementation Note
Simon Cogliani, Rémi Géraud, David Naccache
Simon Cogliani, Rémi Géraud, David Naccache
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries
Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagorski
Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagorski
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers
Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin
Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection
Maciej Skorski
Maciej Skorski
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha
Arka Rai Choudhuri, Subhamoy Maitra
Arka Rai Choudhuri, Subhamoy Maitra
Decentralized Anonymous Micropayments
Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra
Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra
Efficient Covert Two-Party Computation
Stanislaw Jarecki
Stanislaw Jarecki
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security
Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
Novel Inner Product Encryption Resistant to Partial Collusion Attacks
Yuqiao Deng, Ge Song
Yuqiao Deng, Ge Song
Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family
Yuqiao Deng, Ge Song
Yuqiao Deng, Ge Song
Ratcheted Encryption and Key Exchange: The Security of Messaging
Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs
Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs
Formal Abstractions for Attested Execution Secure Processors
Rafael Pass, Elaine Shi, Florian Tramer
Rafael Pass, Elaine Shi, Florian Tramer
Sharper Ring-LWE Signatures
Paulo S. L. M. Barreto, Patrick Longa, Michael Naehrig, Jefferson E. Ricardini, Gustavo Zanon
Paulo S. L. M. Barreto, Patrick Longa, Michael Naehrig, Jefferson E. Ricardini, Gustavo Zanon
An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity
Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
LDA-Based Clustering as a Side-Channel Distinguisher
Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan
Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan
Constant-Time Higher-Order Boolean-to-Arithmetic Masking
Michael Hutter, Michael Tunstall
Michael Hutter, Michael Tunstall
Randomized Mixed-Radix Scalar Multiplication
Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
Cryptographic Randomness on a CC2538: a Case Study
Yan Yan, Elisabeth Oswald, Theo Tryfonas
Yan Yan, Elisabeth Oswald, Theo Tryfonas
KDM Security for Identity-Based Encryption: Constructions and Separations
Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
Faster Homomorphic Evaluation of Discrete Fourier Transforms
Anamaria Costache, Nigel P. Smart, Srinivas Vivek
Anamaria Costache, Nigel P. Smart, Srinivas Vivek
IKP: Turning a PKI Around with Blockchains
Stephanos Matsumoto, Raphael M. Reischuk
Stephanos Matsumoto, Raphael M. Reischuk
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
Douglas Stebila, Michele Mosca
Douglas Stebila, Michele Mosca
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
Mihir Bellare, Bertram Poettering, Douglas Stebila
Mihir Bellare, Bertram Poettering, Douglas Stebila
MaxLength Considered Harmful to the RPKI
Yossi Gilad, Omar Sagga, Sharon Goldberg
Yossi Gilad, Omar Sagga, Sharon Goldberg
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme
Liqun Chen, Thalia M. Laing, Keith M. Martin
Liqun Chen, Thalia M. Laing, Keith M. Martin
A Formal Security Analysis of the Signal Messaging Protocol
Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila
Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila
Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)
Damien Vergnaud
Damien Vergnaud
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
Are We There Yet? On RPKI's Deployment and Security
Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Shulman
Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Shulman
Efficient Resettably Secure Two-Party Computation
Tobias Nilges
Tobias Nilges
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
Jorge Munilla
Jorge Munilla
A survey of attacks on Ethereum smart contracts
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli
The Security of NTP’s Datagram Protocol
Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg
Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg
Atomic-AES v2.0
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert
Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
Daniel Apon, Nico Döttling, Sanjam Garg, Pratyay Mukherjee
Daniel Apon, Nico Döttling, Sanjam Garg, Pratyay Mukherjee
Decryption phase in Norwegian electronic voting
Anders Smedstuen Lund, Martin Strand
Anders Smedstuen Lund, Martin Strand
Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs
Amit Jana, Goutam Paul
Amit Jana, Goutam Paul
Solving Trapdoor Basis of Ideal Lattice from Public Basis
Yupu Hu, Zhizhu Lian, Jiangshan Chen
Yupu Hu, Zhizhu Lian, Jiangshan Chen
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex
Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex
Cryptanalyses of Candidate Branching Program Obfuscators
Yilei Chen, Craig Gentry, Shai Halevi
Yilei Chen, Craig Gentry, Shai Halevi
More Efficient Commitments from Structured Lattice Assumptions
Carsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
Carsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
Leakage-Resilient and Misuse-Resistant Authenticated Encryption
Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Measuring small subgroup attacks against Diffie-Hellman
Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger
Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov
Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov
Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
Liran Lerman, Olivier Markowitch, Nikita Veshchikov
Liran Lerman, Olivier Markowitch, Nikita Veshchikov
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John Schanck
Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John Schanck
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos
Revisiting the Wrong-Key-Randomization Hypothesis
Tomer Ashur, Tim Beyne, Vincent Rijmen
Tomer Ashur, Tim Beyne, Vincent Rijmen
Scrypt is Maximally Memory-Hard
Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
Zero Knowledge Protocols from Succinct Constraint Detection
Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
A Key to Success -- Success Exponents for Side-Channel Distinguishers
Sylvain Guilley, Annelie Heuser, and Olivier Rioul
Sylvain Guilley, Annelie Heuser, and Olivier Rioul
Fast Arithmetic Modulo $2^xp^y\pm 1$
Joppe W. Bos, Simon Friedberger
Joppe W. Bos, Simon Friedberger
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno
Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)
Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov
Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
Avijit Dutta, Ashwin Jha, Mridul Nandi
Avijit Dutta, Ashwin Jha, Mridul Nandi
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu
Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu
Efficient No-dictionary Verifiable SSE
Wakaha Ogata, Kaoru Kurosawa
Wakaha Ogata, Kaoru Kurosawa
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou
Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging
Muhammad Yasin, Ozgur Sinanoglu, Jeyavijayan Rajendran
Muhammad Yasin, Ozgur Sinanoglu, Jeyavijayan Rajendran
Side channels in deduplication: trade-offs between leakage and efficiency
Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani
Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani
On Adaptively Secure Multiparty Computation with a Short CRS
Ran Cohen, Chris Peikert
Ran Cohen, Chris Peikert
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
Server-Aided Revocable Identity-Based Encryption from Lattices
Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
Revealing Encryption for Partial Ordering
Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song
Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song
Authenticated communication from Quantum Readout of PUFs
B. Skoric, P. W. H. Pinkse, A. P. Mosk
B. Skoric, P. W. H. Pinkse, A. P. Mosk
Statistical Analysis for Access-Driven Cache Attacks Against AES
Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang
Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang
Garbling Gadgets for Boolean and Arithmetic Circuits
Marshall Ball, Tal Malkin, Mike Rosulek
Marshall Ball, Tal Malkin, Mike Rosulek
System Clock and Power Supply Cross-Checking for Glitch Detection
Pei Luo, Chao Luo, Yunsi Fei
Pei Luo, Chao Luo, Yunsi Fei
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo, Yunsi Fei
Pei Luo, Yunsi Fei
High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m)
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds
Maciej Skorski
Maciej Skorski
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
Lorenzo Grassi, Christian Rechberger
Lorenzo Grassi, Christian Rechberger
Efficient compression of SIDH public keys
Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik
Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik
On Removing Graded Encodings from Functional Encryption
Nir Bitansky, Huijia Lin, Omer Paneth
Nir Bitansky, Huijia Lin, Omer Paneth
A kilobit hidden SNFS discrete logarithm computation
Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé
Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Gorjan Alagic, Alexander Russell
Gorjan Alagic, Alexander Russell
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
Shashank Agrawal, Venkata Koppula, Brent Waters
Shashank Agrawal, Venkata Koppula, Brent Waters
SafeDeflate: compression without leaking secrets
Michał Zieliński
Michał Zieliński
Computing generator in cyclotomic integer rings
Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
Two Simple Composition Theorems with H-coefficients
Jacques Patarin
Jacques Patarin
Constant-deposit multiparty lotteries on Bitcoin
Massimo Bartoletti, Roberto Zunino
Massimo Bartoletti, Roberto Zunino
Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria
WeiGuo Zhang, Enes Pasalic
WeiGuo Zhang, Enes Pasalic
Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond
Linfeng Zhou
Linfeng Zhou
ISAP -- Towards Side-Channel Secure Authenticated Encryption
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
Revisiting Covert Multiparty Computation
Geoffroy Couteau
Geoffroy Couteau
Orthogonalized Lattice Enumeration for Solving SVP
Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu
Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
Secure Computation in Online Social Networks
Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos
Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos
Isogeny graphs of ordinary abelian varieties
Ernest Hunter Brooks, Dimitar Jetchev, Benjamin Wesolowski
Ernest Hunter Brooks, Dimitar Jetchev, Benjamin Wesolowski
Bitsliced Masking and ARM: Friends or Foes?
Wouter de Groot, Kostas Papagiannopoulos, Antonio de La Piedra, Erik Schneider, Lejla Batina
Wouter de Groot, Kostas Papagiannopoulos, Antonio de La Piedra, Erik Schneider, Lejla Batina
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
Kostas Papapagiannopoulos
Kostas Papapagiannopoulos
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein
Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein
Stadium: A Distributed Metadata-Private Messaging System
Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich
Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich
Optimizing Secure Computation Programs with Private Conditionals
Peeter Laud, Alisa Pankova
Peeter Laud, Alisa Pankova
A New Class of Differentially 4-uniform Permutations from the Inverse Function
Jian Bai, Dingkang Wang
Jian Bai, Dingkang Wang
Fast Actively Secure OT Extension for Short Secrets
Arpita Patra, Pratik Sarkar, Ajith Suresh
Arpita Patra, Pratik Sarkar, Ajith Suresh
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses
Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer
Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer
Kummer for Genus One over Prime Order Fields
Sabyasachi Karati, Palash Sarkar
Sabyasachi Karati, Palash Sarkar
A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences
Nur Azman Abu, Shekh Faisal Abdul-Latip, Muhammad Rezal Kamel Ariffin
Nur Azman Abu, Shekh Faisal Abdul-Latip, Muhammad Rezal Kamel Ariffin
Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring
Vadim N. Tsypyschev
Vadim N. Tsypyschev
Concealing Secrets in Embedded Processors Designs
Hannes Gross, Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, Mario Werner
Hannes Gross, Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, Mario Werner
Cryptography with Updates
Prabhanjan Ananth, Aloni Cohen, Abhishek Jain
Prabhanjan Ananth, Aloni Cohen, Abhishek Jain
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection
Michele Orrù, Emmanuela Orsini, Peter Scholl
Michele Orrù, Emmanuela Orsini, Peter Scholl
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks
Jakub Breier, Dirmanto Jap, Shivam Bhasin
Jakub Breier, Dirmanto Jap, Shivam Bhasin
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version)
Jakub Breier, Xiaolu Hou
Jakub Breier, Xiaolu Hou
Scalable Private Set Intersection Based on OT Extension
Benny Pinkas, Thomas Schneider, Michael Zohner
Benny Pinkas, Thomas Schneider, Michael Zohner
A Generalized Ideal Secret Sharing Scheme
Tanujay Sha
Tanujay Sha
The complexity of the connected graph access structure on seven participants
Massoud Hadian Dehkordi, Ali Safi
Massoud Hadian Dehkordi, Ali Safi
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Matthias Hamann, Matthias Krause, Willi Meier
Matthias Hamann, Matthias Krause, Willi Meier
Secure Channel Injection and Anonymous Proofs of Account Ownership
Liang Wang, Rafael Pass, abhi shelat, Thomas Ristenpart
Liang Wang, Rafael Pass, abhi shelat, Thomas Ristenpart
Bit Coincidence Mining Algorithm II
Koh-ichi Nagao
Koh-ichi Nagao
Attacking embedded ECC implementations through cmov side channels
Erick Nascimento, Lukasz Chmielewski, David Oswald, Peter Schwabe
Erick Nascimento, Lukasz Chmielewski, David Oswald, Peter Schwabe
Side-Channel Leakage Evaluation and Detection Based on Communication Theory
Wei Yang, Yuchen Cao, Ke Ma, Hailong Zhang
Wei Yang, Yuchen Cao, Ke Ma, Hailong Zhang
Breaking Cryptographic Implementations Using Deep Learning Techniques
Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff
Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff
Breaking Web Applications Built On Top of Encrypted Data
Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
Phil Daian, Rafael Pass, Elaine Shi
Phil Daian, Rafael Pass, Elaine Shi
The Sleepy Model of Consensus
Rafael Pass, Elaine Shi
Rafael Pass, Elaine Shi
Hybrid Consensus: Efficient Consensus in the Permissionless Model
Rafael Pass, Elaine Shi
Rafael Pass, Elaine Shi
FruitChains: A Fair Blockchain
Rafael Pass, Elaine Shi
Rafael Pass, Elaine Shi
Transparency Overlays and Applications
Melissa Chase, Sarah Meiklejohn
Melissa Chase, Sarah Meiklejohn
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
Gora Adj, Isaac Canales-Martínez, Nareli Cruz-Cortés, Alfred Menezes, Thomaz Oliveira, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez
Gora Adj, Isaac Canales-Martínez, Nareli Cruz-Cortés, Alfred Menezes, Thomaz Oliveira, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15
Boru Gong, Yunlei Zhao
Boru Gong, Yunlei Zhao
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
The Shortest Signatures Ever
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Mohamed Saied Emam Mohamed, Albrecht Petzoldt
The closest vector problem in tensored root lattices of type A and in their duals
Léo Ducas, Wessel P. J. van Woerden
Léo Ducas, Wessel P. J. van Woerden
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation
Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang
Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang
Secure Error-Tolerant Graph Matching Protocols
Kalikinkar Mandal, Basel Alomair, Radha Poovendran
Kalikinkar Mandal, Basel Alomair, Radha Poovendran
Cut-and-Choose for Garbled RAM
Peihan Miao
Peihan Miao
On Basing Search SIVP on NP-Hardness
Tianren Liu
Tianren Liu
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI$^+$ protocols
Masoumeh Safkhani, Nasour Bagheri
Masoumeh Safkhani, Nasour Bagheri
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
From Indifferentiability to Constructive Cryptography (and Back)
Ueli Maurer, Renato Renner
Ueli Maurer, Renato Renner
Universally Composable Cryptographic Role-Based Access Control
Bin Liu, Bogdan Warinschi
Bin Liu, Bogdan Warinschi
Distance Bounding based on PUF
Mathilde Igier, Serge Vaudenay
Mathilde Igier, Serge Vaudenay
Quantifying Web Adblocker Privacy
Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
Kittiphop Phalakarn, Kittiphon Phalakarn, Vorapong Suppakitpaisarn
Kittiphop Phalakarn, Kittiphon Phalakarn, Vorapong Suppakitpaisarn
Physical Unclonable Functions based on Temperature Compensated Ring Oscillators
Sha Tao, Elena Dubrova
Sha Tao, Elena Dubrova
An efficient somewhat homomorphic encryption scheme based on factorization
Gérald Gavin
Gérald Gavin
Security Analysis of Anti-SAT
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
Chun Guo, Dongdai Lin
Chun Guo, Dongdai Lin
Building web applications on top of encrypted data using Mylar
Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan
Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans
Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans
Tightly Secure IBE under Constant-size Master Public Key
Jie Chen, Junqing Gong, Jian Weng
Jie Chen, Junqing Gong, Jian Weng
A Parallel Variant of LDSieve for the SVP on Lattices
Artur Mariano, Thijs Laarhoven, Christian Bischof
Artur Mariano, Thijs Laarhoven, Christian Bischof
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
Finding closest lattice vectors using approximate Voronoi cells
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$
Anne Canteaut, Sébastien Duval, Léo Perrin
Anne Canteaut, Sébastien Duval, Léo Perrin
A Robust and Sponge-Like PRNG with Improved Efficiency
Daniel Hutchinson
Daniel Hutchinson
Short Stickelberger Class Relations and application to Ideal-SVP
Ronald Cramer, Léo Ducas, Benjamin Wesolowski
Ronald Cramer, Léo Ducas, Benjamin Wesolowski
Robust, low-cost, auditable random number generation for embedded system security
Ben Lampert, Riad S. Wahby, Shane Leonard, Philip Levis
Ben Lampert, Riad S. Wahby, Shane Leonard, Philip Levis
DEMO: Integrating MPC in Big Data Workflows
Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros
Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
Near Collisions in the RC4 Stream Cipher
Anindya Shankar Bhandari
Anindya Shankar Bhandari
Naor-Yung Paradigm with Shared Randomness and Applications
Silvio Biagioni, Daniel Masny, Daniele Venturi
Silvio Biagioni, Daniel Masny, Daniele Venturi
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
Jian Guo, Meicheng Liu, Ling Song
Jian Guo, Meicheng Liu, Ling Song
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu
Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu
Depth-Robust Graphs and Their Cumulative Memory Complexity
Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction
Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions
Xavier Boyen, Christopher Carr, Thomas Haines
Xavier Boyen, Christopher Carr, Thomas Haines
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr
Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr
Selective-Opening Security in the Presence of Randomness Failures
Viet Tung Hoang, Jonathan Katz, Adam O’Neill, Mohammad Zaheri
Viet Tung Hoang, Jonathan Katz, Adam O’Neill, Mohammad Zaheri
A survey on physiological-signal-based security for medical devices
Eduard Marin, Enrique Argones Rúa, Dave Singelée, Bart Preneel
Eduard Marin, Enrique Argones Rúa, Dave Singelée, Bart Preneel
A Shuffle Argument Secure in the Generic Model
Prastudy Fauzi, Helger Lipmaa, Michał Zając
Prastudy Fauzi, Helger Lipmaa, Michał Zając
Reverse Cycle Walking and Its Applications
Sarah Miracle, Scott Yilek
Sarah Miracle, Scott Yilek
Salvaging Weak Security Bounds for Blockcipher-Based Constructions
Thomas Shrimpton, R. Seth Terashima
Thomas Shrimpton, R. Seth Terashima
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22
Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing
Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing
Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof
Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
Secure Stable Matching at Scale
Jack Doerner, David Evans, abhi shelat
Jack Doerner, David Evans, abhi shelat
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao
Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao
On the Security of Supersingular Isogeny Cryptosystems
Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti
Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
Qian Guo, Thomas Johansson, Paul Stankovski
Qian Guo, Thomas Johansson, Paul Stankovski
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin
Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin
Spritz---a spongy RC4-like stream cipher and hash function.
Ronald L. Rivest, Jacob C. N. Schuldt
Ronald L. Rivest, Jacob C. N. Schuldt
Combinatorial Repairability for Threshold Schemes
Douglas R. Stinson, Ruizhong Wei
Douglas R. Stinson, Ruizhong Wei
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
Matthias Hiller, Michael Pehl, Gerhard Kramer, Georg Sigl
Matthias Hiller, Michael Pehl, Gerhard Kramer, Georg Sigl
Stronger Security Variants of GCM-SIV
Tetsu Iwata, Kazuhiko Minematsu
Tetsu Iwata, Kazuhiko Minematsu
Faster LLL-type Reduction of Lattice Bases
Arnold Neumaier, Damien Stehle
Arnold Neumaier, Damien Stehle
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
Ivica Nikolic, Yu Sasaki
Ivica Nikolic, Yu Sasaki
Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy
Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
Asymptotically Tight Bounds for Composing ORAM with PIR
Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren
Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren
From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited
Linfeng Zhou
Linfeng Zhou
On the smallest ratio problem of lattice bases
Jianwei Li
Jianwei Li
Survey of Approaches and Techniques for Security Verification of Computer Systems
Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer
Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer
Selective Opening Security from Simulatable Data Encapsulation
Felix Heuer, Bertram Poettering
Felix Heuer, Bertram Poettering
Secure and Efficient Construction of Broadcast Encryption with Dealership
Kamalesh Acharya, Ratna Dutta
Kamalesh Acharya, Ratna Dutta
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Shuichi Katsumata, Shota Yamada
Shuichi Katsumata, Shota Yamada
Improved, Black-Box, Non-Malleable Encryption from Semantic Security
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
A Methodology for the Characterisation of Leakages in Combinatorial Logic
Guido Bertoni, Marco Martinoli
Guido Bertoni, Marco Martinoli
Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
Melissa Chase, Mary Maller, Sarah Meiklejohn
Melissa Chase, Mary Maller, Sarah Meiklejohn
On the Division Property of SIMON48 and SIMON64
Zejun Xiang, Wentao Zhang, Dongdai Lin
Zejun Xiang, Wentao Zhang, Dongdai Lin
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things
Masoumeh Safkhani, Nasour Bagheri
Masoumeh Safkhani, Nasour Bagheri
Fully Homomorphic Encryption over the Integers Revisited
Jung Hee Cheon, Damien Stehle
Jung Hee Cheon, Damien Stehle
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem
H. Gopalakrishna Gadiyar, R. Padma
H. Gopalakrishna Gadiyar, R. Padma
Lightweight Diffusion Layer: Importance of Toeplitz Matrices
Sumanta Sarkar, Habeeb Syed
Sumanta Sarkar, Habeeb Syed
Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption
Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow
Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto
Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
Colin Chaigneau, Henri Gilbert
Colin Chaigneau, Henri Gilbert
Reducing the Number of Non-linear Multiplications in Masking Schemes
Jürgen Pulkus, Srinivas Vivek
Jürgen Pulkus, Srinivas Vivek
IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality
Ian Miers, Payman Mohassel
Ian Miers, Payman Mohassel
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
Shuai Han, Shengli Liu, Lin Lyu
Shuai Han, Shengli Liu, Lin Lyu
Faster Key Recovery Attack on Round-Reduced PRINCE
Shahram Rasoolzadeh, Håvard Raddum
Shahram Rasoolzadeh, Håvard Raddum
Security Analysis of BLAKE2's Modes of Operation
Atul Luykx, Bart Mennink, Samuel Neves
Atul Luykx, Bart Mennink, Samuel Neves
Rotational Cryptanalysis in the Presence of Constants
Tomer Ashur, Yunwen Liu
Tomer Ashur, Yunwen Liu
Revisiting Cascade Ciphers in Indifferentiability Setting
Chun Guo, Dongdai Lin, Meicheng Liu
Chun Guo, Dongdai Lin, Meicheng Liu
P2P Mixing and Unlinkable Bitcoin Transactions
Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate
Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate
Post-Quantum Attribute-Based Signatures from Lattice Assumptions
Rachid El Bansarkhani, Ali El Kaafarani
Rachid El Bansarkhani, Ali El Kaafarani
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo, Akbar Majidi
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo, Akbar Majidi
Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials
Duggirala Meher Krishna, Duggirala Ravi
Duggirala Meher Krishna, Duggirala Ravi
Separating Computational and Statistical Differential Privacy in the Client-Server Model
Mark Bun, Yi-Hsiu Chen, Salil Vadhan
Mark Bun, Yi-Hsiu Chen, Salil Vadhan
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
Composable Adaptive Secure Protocols without Setup under Polytime Assumptions
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Secure Obfuscation in a Weak Multilinear Map Model
Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun, Thomas Steinke
Mark Bun, Thomas Steinke
Secure Multiparty RAM Computation in Constant Rounds
Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
Adaptive Security of Yao's Garbled Circuits
Zahra Jafargholi, Daniel Wichs
Zahra Jafargholi, Daniel Wichs
Fast Pseudorandom Functions Based on Expander Graphs
Benny Applebaum, Pavel Raykov
Benny Applebaum, Pavel Raykov
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
Dana Dachman-Soled
Dana Dachman-Soled
MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers
Ling Sun, Wei Wang, Meiqin Wang
Ling Sun, Wei Wang, Meiqin Wang
Fault Injection using Crowbars on Embedded Systems
Colin O'Flynn
Colin O'Flynn
Binary AMD Circuits from Secure Multiparty Computation
Daniel Genkin, Yuval Ishai, Mor Weiss
Daniel Genkin, Yuval Ishai, Mor Weiss
Simulating Auxiliary Inputs, Revisited
Maciej Skorski
Maciej Skorski
Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016
Hyunjin Ahn, Dong-Guk Han
Hyunjin Ahn, Dong-Guk Han
Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack
Mohammad Hadi Valizadeh
Mohammad Hadi Valizadeh
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Carmit Hazay, Avishay Yanai
Carmit Hazay, Avishay Yanai
Multi-Key Homomorphic Authenticators
Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin
Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin
Biometric Based Network Security Using MIPS Cryptography Processor
Kirat Pal Singh
Kirat Pal Singh
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated
Hung Dang, Erick Purwanto, Ee-Chien Chang
Hung Dang, Erick Purwanto, Ee-Chien Chang
Blind Web Search: How far are we from a privacy preserving search engine?
Gizem S. Çetin, Wei Dai, Yarkın Doröz, William J. Martin, Berk Sunar
Gizem S. Çetin, Wei Dai, Yarkın Doröz, William J. Martin, Berk Sunar
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
Bar Alon, Eran Omri
Bar Alon, Eran Omri
Efficient Batched Oblivious PRF with Applications to Private Set Intersection
Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu
Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Karthikeyan Bhargavan, Gaëtan Leurent
Karthikeyan Bhargavan, Gaëtan Leurent
An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market
Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings
Vadim Lyubashevsky
Vadim Lyubashevsky
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings
Huijia Lin, Vinod Vaikuntanathan
Huijia Lin, Vinod Vaikuntanathan
Message-recovery attacks on Feistel-based Format Preserving Encryption
Mihir Bellare, Viet Tung Hoang, Stefano Tessaro
Mihir Bellare, Viet Tung Hoang, Stefano Tessaro
Side-Channel Analysis of Keymill
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel
Key-Homomorphic Signatures: Definitions and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge
David Derler, Daniel Slamanig
David Derler, Daniel Slamanig
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
Ilan Komargodski
Ilan Komargodski
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm
Kirat Pal Singh, Shiwani Dod
Kirat Pal Singh, Shiwani Dod
On the security of Cubic UOV and its variants
Yasufumi Hashimoto
Yasufumi Hashimoto
On the security of new vinegar-like variant of multivariate signature scheme
Yasufumi Hashimoto
Yasufumi Hashimoto
What Else is Revealed by Order-Revealing Encryption?
F. Betül Durak, Thomas M. DuBuisson, David Cash
F. Betül Durak, Thomas M. DuBuisson, David Cash
Optimization of Bootstrapping in Circuits
Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou
Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
On the Memory-Hardness of Data-Independent Password-Hashing Functions
Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
Challenges for Ring-LWE
Eric Crockett, Chris Peikert
Eric Crockett, Chris Peikert
Privately Matching $k$-mers
Justin Bed{ő}, Thomas Conway, Kim Ramchen, Vanessa Teague
Justin Bed{ő}, Thomas Conway, Kim Ramchen, Vanessa Teague
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
Mohammmad Hassan Ameri, Javad Mohajeri, Mahmoud Salmasizadeh
Mohammmad Hassan Ameri, Javad Mohajeri, Mahmoud Salmasizadeh
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction
Maryam Rajabzadeh Asaar
Maryam Rajabzadeh Asaar
Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning
Sumit Chakraborty
Sumit Chakraborty
Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers
Ping Ngai Chung, Craig Costello, Benjamin Smith
Ping Ngai Chung, Craig Costello, Benjamin Smith
Homomorphic Tallying for the Estonian Internet Voting System
Arnis Parsovs
Arnis Parsovs
Cryptanalysis of a Homomorphic Encryption Scheme
Sonia Bogos, John Gaspoz, Serge Vaudenay
Sonia Bogos, John Gaspoz, Serge Vaudenay
TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF
Tanujay Saha, Vikash Sehwag
Tanujay Saha, Vikash Sehwag
Alternative Implementations of Secure Real Numbers
Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson
Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson
Time-Frequency Analysis for Second-Order Attacks
Pierre BELGARRIC, Shivam BHASIN, Nicolas BRUNEAU, Jean-Luc DANGER, Nicolas DEBANDE, Sylvain GUILLEY, Annelie HEUSER, Zakaria NAJM, Olivier RIOUL
Pierre BELGARRIC, Shivam BHASIN, Nicolas BRUNEAU, Jean-Luc DANGER, Nicolas DEBANDE, Sylvain GUILLEY, Annelie HEUSER, Zakaria NAJM, Olivier RIOUL
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
David Bernhard, Olivier Pereira, Bogdan Warinschi
David Bernhard, Olivier Pereira, Bogdan Warinschi
KangarooTwelve: fast hashing based on Keccak-p
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
Low-temperature data remanence attacks against intrinsic SRAM PUFs
Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Tolga Arul
Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Tolga Arul
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
A conjecture about Gauss sums and bentness of binomial Boolean functions
Jean-Pierre Flori
Jean-Pierre Flori
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
Benoît Libert, Somindu C. Ramanna, and Moti Yung
Benoît Libert, Somindu C. Ramanna, and Moti Yung
Cryptographic Voting — A Gentle Introduction
David Bernhard, Bogdan Warinschi
David Bernhard, Bogdan Warinschi
ANOTEL: Cellular Networks with Location Privacy (Extended Version)
Tim Dittler, Florian Tschorsch, Stefan Dietzel, Björn Scheuermann
Tim Dittler, Florian Tschorsch, Stefan Dietzel, Björn Scheuermann
Human Public-Key Encryption
Houda Ferradi, Rémi Géraud, David Naccache
Houda Ferradi, Rémi Géraud, David Naccache
Faster Secure Two-Party Computation in the Single-Execution Setting
Xiao Wang, Alex J. Malozemoff, Jonathan Katz
Xiao Wang, Alex J. Malozemoff, Jonathan Katz
Two-party authenticated key exchange protocol using lattice-based cryptography
Xiaopeng Yang, Wenping Ma
Xiaopeng Yang, Wenping Ma
Simultaneous Secrecy and Reliability Amplification for a General Channel Model
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro
Towards Practical Attacks on Argon2i and Balloon Hashing
Joël Alwen, Jeremiah Blocki
Joël Alwen, Jeremiah Blocki
NewHope on ARM Cortex-M
Erdem Alkim, Philipp Jakubeit, Peter Schwabe
Erdem Alkim, Philipp Jakubeit, Peter Schwabe
Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton Andrade
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton Andrade
Adapting Helios for provable ballot privacy
David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
Auditable Data Structures
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
Practical Key Recovery Attack on MANTIS-5
Christoph Dobraunig, Maria Eichlseder, Daniel Kales, and Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Daniel Kales, and Florian Mendel
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices
Shi Bai, Damien Stehle, Weiqiang Wen
Shi Bai, Damien Stehle, Weiqiang Wen
ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security
Adnan Baysal, Ünal Kocabaş
Adnan Baysal, Ünal Kocabaş
Feistel Like Construction of Involutory Binary Matrices With High Branch Number
Adnan Baysal, Mustafa Çoban, Mehmet Özen
Adnan Baysal, Mustafa Çoban, Mehmet Özen
Public-Key Based Lightweight Swarm Authentication
Simon Cogliani, Bao Feng, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang
Simon Cogliani, Bao Feng, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang
Revocable Hierarchical Identity-Based Encryption with Adaptive Security
Kwangsu Lee
Kwangsu Lee
A Generic Dynamic Provable Data Possession Framework
Mohammad Etemad, Alptekin Küpçü
Mohammad Etemad, Alptekin Küpçü
Beyond Bitcoin -- Part II: Blockchain-based systems without mining
Pasquale Forte, Diego Romano, Giovanni Schmid
Pasquale Forte, Diego Romano, Giovanni Schmid
Improved Private Set Intersection against Malicious Adversaries
Peter Rindal, Mike Rosulek
Peter Rindal, Mike Rosulek
Novel differentially private mechanisms for graphs
Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier
Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity
Xi Chen, Longjiang Qu, Chao Li, Jiao Du
Xi Chen, Longjiang Qu, Chao Li, Jiao Du
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong
Md Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk
Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk
Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates
Ralph Ankele, Robin Ankele
Ralph Ankele, Robin Ankele
Unconditionally Secure Signatures
Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
FHPKE with Zero Norm Noises based on DLA&CDH
Masahiro Yagisawa
Masahiro Yagisawa
Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques
Edgar González, Guillermo Morales-Luna, Feliú D. Sagols
Edgar González, Guillermo Morales-Luna, Feliú D. Sagols
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation
Martine De Cock, Rafael Dowsley, Caleb Horst, Raj Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon
Martine De Cock, Rafael Dowsley, Caleb Horst, Raj Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon
Efficient Robust Secret Sharing from Expander Graphs
Brett Hemenway, Rafail Ostrovsky
Brett Hemenway, Rafail Ostrovsky
Efficient Oblivious Transfer Protocols based on White-Box Cryptography
Aram Jivanyan, Gurgen Khachatryan, Andriy Oliynyk, Mykola Raievskyi
Aram Jivanyan, Gurgen Khachatryan, Andriy Oliynyk, Mykola Raievskyi
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Thomas Wunderer
Thomas Wunderer
Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64
Yosuke Todo, Gregor Leander, Yu Sasaki
Yosuke Todo, Gregor Leander, Yu Sasaki
SRMAP and ISLAP Authentication Protocols: Attacks and Improvements
Mohammad Mardani Shahrbabak, Shahab Abdolmaleky
Mohammad Mardani Shahrbabak, Shahab Abdolmaleky
Leakage-Resilient Public-Key Encryption from Obfuscation
Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O’Neill, Hong-Sheng Zhou
Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O’Neill, Hong-Sheng Zhou
Attacks on cMix - Some Small Overlooked Details
Herman Galteland, Stig F. Mjølsnes, Ruxandra F. Olimid
Herman Galteland, Stig F. Mjølsnes, Ruxandra F. Olimid
Sophos - Forward Secure Searchable Encryption
Raphael Bost
Raphael Bost
Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve
Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin
Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin
Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes
Oriol Farràs, Jordi Ribes-González, Sara Ricci
Oriol Farràs, Jordi Ribes-González, Sara Ricci
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA
Mustafa Khairallah, Maged Ghoneima
Mustafa Khairallah, Maged Ghoneima
SPORT: Sharing Proofs of Retrievability across Tenants
Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan O. Karame
Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan O. Karame
Robust Multi-Property Combiners for Hash Functions
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512
Li Lin, Wenling Wu
Li Lin, Wenling Wu
Strong Hardness of Privacy from Weak Traitor Tracing
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
Leakage-Abuse Attacks Against Searchable Encryption
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
Comparison between Subfield and Straightforward Attacks on NTRU
Paul Kirchner, Pierre-Alain Fouque
Paul Kirchner, Pierre-Alain Fouque
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong, Lei Fan, Hong-Sheng Zhou
Tuyet Duong, Lei Fan, Hong-Sheng Zhou
Uniform First-Order Threshold Implementations
Tim Beyne, Begül Bilgin
Tim Beyne, Begül Bilgin
All the AES You Need on Cortex-M3 and M4
Peter Schwabe, Ko Stoffelen
Peter Schwabe, Ko Stoffelen
Tuple lattice sieving
Shi Bai, Thijs Laarhoven, Damien Stehle
Shi Bai, Thijs Laarhoven, Damien Stehle
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
Basel Halak, Said Subhan Waizi, Asad Islam
Basel Halak, Said Subhan Waizi, Asad Islam
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
Hugo Krawczyk
Hugo Krawczyk
Keymill: Side-Channel Resilient Key Generator
Mostafa Taha, Arash Reyhani-Masoleh, Patrick Schaumont
Mostafa Taha, Arash Reyhani-Masoleh, Patrick Schaumont
Differential Fault Analysis of SHA3-224 and SHA3-256
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
From 5-pass MQ-based identification to MQ-based signatures
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher
Dana Dachman-Soled, Angela Park, Ben San Nicolas
Dana Dachman-Soled, Angela Park, Ben San Nicolas
Memory Erasability Amplification
Jan Camenisch, Robert R. Enderlein, Ueli Maurer
Jan Camenisch, Robert R. Enderlein, Ueli Maurer
New construction of single cycle T-function families
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem
Nicolas T. Courtois
Nicolas T. Courtois
(In-)Secure messaging with the Silent Circle instant messaging protocol
Sebastian R. Verschoor, Tanja Lange
Sebastian R. Verschoor, Tanja Lange
Mirror Theory and Cryptography
Jacques Patarin
Jacques Patarin
Bolt: Anonymous Payment Channels for Decentralized Currencies
Matthew Green, Ian Miers
Matthew Green, Ian Miers
Side-Channel Protections for Cryptographic Instruction Set Extensions
Sami Saab, Pankaj Rohatgi, Craig Hampel
Sami Saab, Pankaj Rohatgi, Craig Hampel
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Ciphertext Forgery on HANUMAN
Damian Vizár
Damian Vizár
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Süleyman Kardaş, Mehmet Sabır Kiraz
Süleyman Kardaş, Mehmet Sabır Kiraz
Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation
Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci
Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci
Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials
Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi
Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps
Sikhar Patranabis, Debdeep Mukhopadhyay
Sikhar Patranabis, Debdeep Mukhopadhyay
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Jiguo Li, Hong Yuan, Yichen Zhang
Jiguo Li, Hong Yuan, Yichen Zhang
Targeted Homomorphic Attribute Based Encryption
Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
When Are Three Voters Enough for Privacy Properties?
Myrto Arapinis, Véronique Cortier, Steve Kremer
Myrto Arapinis, Véronique Cortier, Steve Kremer
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
Tingting Cui, Shiyao Chen, Keting Jia, Kai Fu, Meiqin Wang
Tingting Cui, Shiyao Chen, Keting Jia, Kai Fu, Meiqin Wang
Bounded KDM Security from iO and OWF
Antonio Marcedone, Rafael Pass, abhi shelat
Antonio Marcedone, Rafael Pass, abhi shelat
Ciphers for MPC and FHE
Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner
Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner
The Lightest 4x4 MDS Matrices over $GL(4,\mathbb{F}_2)$
Jian Bai, Ting Li, Yao Sun, Dingkang Wang, Dongdai Lin
Jian Bai, Ting Li, Yao Sun, Dingkang Wang, Dongdai Lin
Overlaying Circuit Clauses for Secure Computation
W. Sean Kennedy, Vladimir Kolesnikov, Gordon Wilfong
W. Sean Kennedy, Vladimir Kolesnikov, Gordon Wilfong
Faster individual discrete logarithms in finite fields of composite extension degree
Aurore Guillevic
Aurore Guillevic
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
Rasmus Dahlberg, Tobias Pulls, Roel Peeters
Rasmus Dahlberg, Tobias Pulls, Roel Peeters
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
Steven D. Galbraith, Joel Laity, Barak Shani
Steven D. Galbraith, Joel Laity, Barak Shani
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack
Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
Fair Client Puzzles from the Bitcoin Blockchain
Colin Boyd, Christopher Carr
Colin Boyd, Christopher Carr
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes
Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
Anonymous RAM
Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov
Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov
Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore
Mohamed Sabt, Jacques Traoré
Mohamed Sabt, Jacques Traoré
Cryptanalysis of Reduced-Round Midori64 Block Cipher
Xiaoyang Dong, Yanzhao Shen
Xiaoyang Dong, Yanzhao Shen
Accelerating Homomorphic Computations on Rational Numbers
Angela Jäschke, Frederik Armknecht
Angela Jäschke, Frederik Armknecht
A PUF-based Secure Communication Protocol for IoT
URBI CHATTERJEE, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYAY
URBI CHATTERJEE, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYAY
Dirichlet Product for Boolean Functions
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large $n$
Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hod\v zić
Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hod\v zić
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
Siamak F. Shahandashti, Feng Hao
Siamak F. Shahandashti, Feng Hao
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM
Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Wei Yuan
Wei Yuan
Multivariate Profiling of Hulls for Linear Cryptanalysis
Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre
Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity
WeiGuo Zhang, LuYang Li, Enes Pasalic
WeiGuo Zhang, LuYang Li, Enes Pasalic
Breaking and Fixing Private Set Intersection Protocols
Mikkel Lambæk
Mikkel Lambæk
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
Yoo-Seung Won, Dong-Guk Han
Yoo-Seung Won, Dong-Guk Han
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
Jan Camenisch, Manu Drijvers, Anja Lehmann
Jan Camenisch, Manu Drijvers, Anja Lehmann
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Reducing the Leakage in Practical Order-Revealing Encryption
David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang
David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE
Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
Kevin Atighehchi, Alexis Bonnecaze
Kevin Atighehchi, Alexis Bonnecaze
Bounded Size-Hiding Private Set Intersection
Tatiana Bradley, Sky Faber, Gene Tsudik
Tatiana Bradley, Sky Faber, Gene Tsudik
Improving Practical UC-Secure Commitments based on the DDH Assumption
Eiichiro Fujisaki
Eiichiro Fujisaki
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
Shweta Agrawal
Shweta Agrawal
Fully Homomorphic Encryption with Zero Norm Cipher Text
Masahiro Yagisawa
Masahiro Yagisawa
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
Arnaud BANNIER, Nicolas BODIN, Eric FILIOL
Arnaud BANNIER, Nicolas BODIN, Eric FILIOL
Pen and Paper Arguments for SIMON and SIMON-like Designs
Christof Beierle
Christof Beierle
Securing Multiparty Protocols against the Exposure of Data to Honest Parties
Peeter Laud, Alisa Pankova
Peeter Laud, Alisa Pankova
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref
Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref
ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
Tobias Schneider, Amir Moradi, Tim Güneysu
Tobias Schneider, Amir Moradi, Tim Güneysu
Strong 8-bit Sboxes with Efficient Masking in Hardware
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Computational integrity with a public random string from quasi-linear PCPs
Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza
Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors
Patrick Longa
Patrick Longa
How to Backdoor Diffie-Hellman
David Wong
David Wong
On the Computational Overhead of MPC with Dishonest Majority
Jesper Buus Nielsen, Samuel Ranellucci
Jesper Buus Nielsen, Samuel Ranellucci
Efficient and Provable White-Box Primitives
Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud
Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud
Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Asli Bay, Oguzhan Ersoy, Ferhat Karakoç
Asli Bay, Oguzhan Ersoy, Ferhat Karakoç
Game-Theoretic Framework for Integrity Verification in Computation Outsourcing
Qiang Tang, Balazs Pejo
Qiang Tang, Balazs Pejo
A Tweak for a PRF Mode of a Compression Function and Its Applications
Shoichi Hirose, Atsushi Yabumoto
Shoichi Hirose, Atsushi Yabumoto
On the Security and Key Generation of the ZHFE Encryption Scheme
Wenbin Zhang, Chik How Tan
Wenbin Zhang, Chik How Tan
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti
Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi
Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi
Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi
Making Smart Contracts Smarter
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution
Peter Rindal, Mike Rosulek
Peter Rindal, Mike Rosulek
Masking AES with d+1 Shares in Hardware
Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy
Verifiable Functional Encryption
Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina
Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina
Cyber Passport: Preventing Massive Identity Theft
Gideon Samid
Gideon Samid
CAESAR Hardware API
Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj
Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
Kota Kondo, Yu Sasaki, Tetsu Iwata
Kota Kondo, Yu Sasaki, Tetsu Iwata
Equational Security Proofs of Oblivious Transfer Protocols
Baiyu Li, Daniele Micciancio
Baiyu Li, Daniele Micciancio
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
Dhiman Saha, Dipanwita Roy Chowdhury
Dhiman Saha, Dipanwita Roy Chowdhury
Function-Revealing Encryption
Marc Joye, Alain Passelègue
Marc Joye, Alain Passelègue
4-Round Concurrent Non-Malleable Commitments from One-Way Functions
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Secure Data Exchange: A Marketplace in the Cloud
Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal, Mike Rosulek
Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal, Mike Rosulek
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova
Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova
Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis
Sarani Bhattacharya, Debdeep Mukhopadhyay
Sarani Bhattacharya, Debdeep Mukhopadhyay
On the Impossibility of Merkle Merge Homomorphism
Yuzhe Tang
Yuzhe Tang
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel
Reusing Tamper-Proof Hardware in UC-Secure Protocols
Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges
Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges
Better Two-Round Adaptive Multi-Party Computation
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Qian Ge, Yuval Yarom, David Cock, Gernot Heiser
Qian Ge, Yuval Yarom, David Cock, Gernot Heiser
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
Kevin Lewi, David J. Wu
Kevin Lewi, David J. Wu
Catching MPC Cheaters: Identification and Openability
Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
The GGM Function Family is Weakly One-Way
Aloni Cohen, Saleet Klein
Aloni Cohen, Saleet Klein
How low can you go? Using side-channel data to enhance brute-force key recovery
Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam
Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses
Hoda Maleki, Reza Rahaeimehr, Marten van Dijk
Hoda Maleki, Reza Rahaeimehr, Marten van Dijk
Protocols for Authenticated Oblivious Transfer
Mehrad Jaberi, Hamid Mala
Mehrad Jaberi, Hamid Mala
Strong Machine Learning Attack against PUFs with No Mathematical Model
Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert
Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert
Improving NFS for the discrete logarithm problem in non-prime finite fields
Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
FMNV Continuous Non-malleable Encoding Scheme is More Efficient Than Believed
Amir S. Mortazavia, Mahmoud Salmasizadeh, Amir Daneshgar
Amir S. Mortazavia, Mahmoud Salmasizadeh, Amir Daneshgar
Koblitz curves over quadratic fields
Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
More Efficient Oblivious Transfer Extensions
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
Physical Layer Group Key Agreement for Automotive Controller Area Networks
Shalabh Jain, Jorge Guajardo
Shalabh Jain, Jorge Guajardo
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Obfuscation from Low Noise Multilinear Maps
Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee
Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee
Polynomial Batch Codes for Efficient IT-PIR
Ryan Henry
Ryan Henry
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version
Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
Cache Attacks Enable Bulk Key Recovery on the Cloud
Mehmet S. Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Mehmet S. Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki
Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki
"Make Sure DSA Signing Exponentiations Really are Constant-Time''
Cesar Pereida García, Billy Bob Brumley, Yuval Yarom
Cesar Pereida García, Billy Bob Brumley, Yuval Yarom
No Place to Hide: Contactless Probing of Secret Data on FPGAs
Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
Subspace Trail Cryptanalysis and its Applications to AES
Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
Arx: An Encrypted Database using Semantically Secure Encryption
Rishabh Poddar, Tobias Boelter, Raluca Ada Popa
Rishabh Poddar, Tobias Boelter, Raluca Ada Popa
Mitigating SAT Attack on Logic Locking
Yang Xie, Ankur Srivastava
Yang Xie, Ankur Srivastava
Dimension-Preserving Reductions from LWE to LWR
Jacob Alperin-Sheriff, Daniel Apon
Jacob Alperin-Sheriff, Daniel Apon
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks
Eric Miles, Amit Sahai, Mark Zhandry
Eric Miles, Amit Sahai, Mark Zhandry
Bash-f: another LRX sponge function
Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov
Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
Thomas Shrimpton, Martijn Stam, Bogdan Warinschi
Thomas Shrimpton, Martijn Stam, Bogdan Warinschi
Breaking the Circuit Size Barrier for Secure Computation Under DDH
Elette Boyle, Niv Gilboa, Yuval Ishai
Elette Boyle, Niv Gilboa, Yuval Ishai
Network Oblivious Transfer
Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials
Melissa Chase, Chaya Ganesh, Payman Mohassel
Melissa Chase, Chaya Ganesh, Payman Mohassel
TV-PUF : A Fast Lightweight Analog Physically Unclonable Function
Tanujay Saha
Tanujay Saha
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
Jan Camenisch, Maria Dubovitskaya, Alfredo Rial
Jan Camenisch, Maria Dubovitskaya, Alfredo Rial
Fine-grained Cryptography
Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
Patrick Derbez, Pierre-Alain Fouque
Patrick Derbez, Pierre-Alain Fouque
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
Viet Tung Hoang, Stefano Tessaro
Viet Tung Hoang, Stefano Tessaro
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
Indistinguishability Obfuscation Does Not Reduce to Structured Languages
Gilad Asharov, Alon Rosen, Gil Segev
Gilad Asharov, Alon Rosen, Gil Segev
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg
Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg
Structure vs Hardness through the Obfuscation Lens
Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan
Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems
Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert
Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert
Faster Evaluation of SBoxes via Common Shares
Jean-Sebastien Coron, Aurelien Greuet, Emmanuel Prouff, Rina Zeitoun
Jean-Sebastien Coron, Aurelien Greuet, Emmanuel Prouff, Rina Zeitoun
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach
Romain poussier, François-Xavier Standaert, Vincent Grosso
Romain poussier, François-Xavier Standaert, Vincent Grosso
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming
Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo
Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo
FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields
Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa
Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa
A Secure One-Roundtrip Index for Range Queries
Tobias Boelter, Rishabh Poddar, Raluca Ada Popa
Tobias Boelter, Rishabh Poddar, Raluca Ada Popa
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
Concurrent Non-Malleable Commitments (and More) in 3 Rounds
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
Bounded Indistinguishability and the Complexity of Recovering Secrets
Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson
Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
Mihir Bellare, Bjoern Tackmann
Mihir Bellare, Bjoern Tackmann
Garbling Scheme for Formulas with Constant Size of Garbled Gates
Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki
Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki
Deniable Attribute Based Encryption for Branching Programs from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu
Daniel Apon, Xiong Fan, Feng-Hao Liu
Compactness vs Collusion Resistance in Functional Encryption
Baiyu Li, Daniele Micciancio
Baiyu Li, Daniele Micciancio
Memory-Efficient Algorithms for Finding Needles in Haystacks
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Quantum homomorphic encryption for polynomial-sized circuits
Yfke Dulek, Christian Schaffner, Florian Speelman
Yfke Dulek, Christian Schaffner, Florian Speelman
From Cryptomania to Obfustopia through Secret-Key Functional Encryption
Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
Dahmun Goudarzi, Matthieu Rivain
Dahmun Goudarzi, Matthieu Rivain
Network-Hiding Communication and Applications to Multi-Party Protocols
Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
On the Security and Performance of Proof of Work Blockchains
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
Another view of the division property
Christina Boura, Anne Canteaut
Christina Boura, Anne Canteaut
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis, Ming Li
Iraklis Leontiadis, Ming Li
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld
Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook
Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook
Improved Factorization of $N=p^rq^s$
Jean-Sebastien Coron, Rina Zeitoun
Jean-Sebastien Coron, Rina Zeitoun
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture
Andrew D. Zonenberg, Bulent Yener
Andrew D. Zonenberg, Bulent Yener
Short and Adjustable Signatures
Xiong Fan, Juan Garay, Payman Mohassel
Xiong Fan, Juan Garay, Payman Mohassel
Linicrypt: A Model for Practical Cryptography
Brent Carmer, Mike Rosulek
Brent Carmer, Mike Rosulek
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
Lucas Schabhüser, Denise Demirel, Johannes Buchmann
Lucas Schabhüser, Denise Demirel, Johannes Buchmann
On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias, Giorgos Panagiotakos
Aggelos Kiayias, Giorgos Panagiotakos
New Protocols for Secure Equality Test and Comparison
Geoffroy Couteau
Geoffroy Couteau
ObliviSync: Practical Oblivious File Backup and Synchronization
Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche
Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche
MPC-Friendly Symmetric Key Primitives
Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart
Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart
Big-Key Symmetric Encryption: Resisting Key Exfiltration
Mihir Bellare, Daniel Kane, Phillip Rogaway
Mihir Bellare, Daniel Kane, Phillip Rogaway
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Alberto Battistello, Jean-Sebastien Coron, Emmanuel Prouff, Rina Zeitoun
Alberto Battistello, Jean-Sebastien Coron, Emmanuel Prouff, Rina Zeitoun
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)
Léo Perrin, Aleksei Udovenko, Alex Biryukov
Léo Perrin, Aleksei Udovenko, Alex Biryukov
How to prove knowledge of small secrets
Carsten Baum, Ivan Damgård, Kasper Larsen, Michael Nielsen
Carsten Baum, Ivan Damgård, Kasper Larsen, Michael Nielsen
A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm
Palash Sarkar, Shashank Singh
Palash Sarkar, Shashank Singh
Position-Based Cryptography and Multiparty Communication Complexity
Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Impossible Differential Cryptanalysis of Midori
Chen Zhan, Wang Xiaoyun
Chen Zhan, Wang Xiaoyun
Damaging, Simplifying, and Salvaging p-OMD
Tomer Ashur, Bart Mennink
Tomer Ashur, Bart Mennink
New Insights on AES-like SPN Ciphers
Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen
Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen
Cryptanalysis of GOST2
Tomer Ashur, Achiya Bar-On, Orr Dunkelman
Tomer Ashur, Achiya Bar-On, Orr Dunkelman
Reducing number field defining polynomials: An application to class group computations
Alexandre Gélin, Antoine Joux
Alexandre Gélin, Antoine Joux
Generic Semantic Security against a Kleptographic Adversary
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
Antonio Faonio, Daniele Venturi
Antonio Faonio, Daniele Venturi
Certified lattice reduction
Thomas Espitau, Antoine Joux
Thomas Espitau, Antoine Joux
Secure Outsourcing of Circuit Manufacturing
Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi
Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree
Taechan Kim, Jinhyuck Jeong
Taechan Kim, Jinhyuck Jeong
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Benoît Cogliati, Yannick Seurin
Benoît Cogliati, Yannick Seurin
Single-Key to Multi-Key Functional Encryption with Polynomial Loss
Sanjam Garg, Akshayaram Srinivasan
Sanjam Garg, Akshayaram Srinivasan
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Jiang Zhang, Yu Chen, Zhenfeng Zhang
Jiang Zhang, Yu Chen, Zhenfeng Zhang
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)
Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger
Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger
SAT-based cryptanalysis of ACORN
Frédéric Lafitte, Liran Lerman, Olivier Markowitch, Dirk Van Heule
Frédéric Lafitte, Liran Lerman, Olivier Markowitch, Dirk Van Heule
Universally Composable Two-Server PAKE
Franziskus Kiefer, Mark Manulis
Franziskus Kiefer, Mark Manulis
On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings
Benny Applebaum, Pavel Raykov
Benny Applebaum, Pavel Raykov
Attribute-based Key Exchange with General Policies
Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin
Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin
Towards Practical Tools for Side Channel Aware Software Engineering: `Grey Box' Modelling for Instruction Leakages
David McCann, Elisabeth Oswald, Carolyn Whitnall
David McCann, Elisabeth Oswald, Carolyn Whitnall
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited
George Teseleanu, Ferucio Laurentiu Tiplea, Sorin Iftene, Anca-Maria Nica
George Teseleanu, Ferucio Laurentiu Tiplea, Sorin Iftene, Anca-Maria Nica
RSA Weak Public Keys available on the Internet
Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion
Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
Yu Yu, Jiang Zhang
Yu Yu, Jiang Zhang
Applying TVLA to Public Key Cryptographic Algorithms
Michael Tunstall, Gilbert Goodwill
Michael Tunstall, Gilbert Goodwill
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
Lucjan Hanzlik, Kamil Kluczniak
Lucjan Hanzlik, Kamil Kluczniak
Optimal-Rate Non-Committing Encryption in a CRS Model
Ran Canetti, Oxana Poburinnaya, Mariana Raykova
Ran Canetti, Oxana Poburinnaya, Mariana Raykova
A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes
Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Vincent Zucca
Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Vincent Zucca
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Xiaoyang Dong, Xiaoyun Wang
Xiaoyang Dong, Xiaoyun Wang
Collapse-binding quantum commitments without random oracles
Dominique Unruh
Dominique Unruh
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
Aurore Guillevic, François Morain, Emmanuel Thomé
Aurore Guillevic, François Morain, Emmanuel Thomé
TOR - Didactic pluggable transport
Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion
Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
Marcel Keller, Emmanuela Orsini, Peter Scholl
Marcel Keller, Emmanuela Orsini, Peter Scholl
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
Patrick Longa, Michael Naehrig
Patrick Longa, Michael Naehrig
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
Key Recovery Attack against 2.5-round pi-Cipher
Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder
Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience
Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin
Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups
Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee
Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee
Drone Targeted Cryptography
Gideon Samid
Gideon Samid
Towards Tightly Secure Short Signature and IBE
Xavier Boyen, Qinyi Li
Xavier Boyen, Qinyi Li
Secure Computation from Elastic Noisy Channels
Dakshita Khurana, Hemanta K. Maji, Amit Sahai
Dakshita Khurana, Hemanta K. Maji, Amit Sahai
All Complete Functionalities are Reversible
Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
Cross&Clean: Amortized Garbled Circuits with Constant Overhead
Jesper Buus Nielsen, Claudio Orlandi
Jesper Buus Nielsen, Claudio Orlandi
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version)
Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng
Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng
Partition-Based Trapdoor Ciphers
Arnaud Bannier, Nicolas Bodin, Eric Filiol
Arnaud Bannier, Nicolas Bodin, Eric Filiol
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam
Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam
Truncated, Impossible, and Improbable Differential Analysis of Ascon
Cihangir Tezcan
Cihangir Tezcan
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol
Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz
Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz
Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
Husen Wang, Qiang Tang
Husen Wang, Qiang Tang
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems
Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER, Mohsen MACHHOUT
Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER, Mohsen MACHHOUT
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Hannes Gross, Stefan Mangard, Thomas Korak
Hannes Gross, Stefan Mangard, Thomas Korak
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm
Palash Sarkar, Shashank Singh
Palash Sarkar, Shashank Singh
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations
Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee
Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee
Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
Hiroaki Anada, Seiko Arita, Kouichi Sakurai
Hiroaki Anada, Seiko Arita, Kouichi Sakurai
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Shashank Agrawal, David J. Wu
Shashank Agrawal, David J. Wu
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Amir Moradi, Tobias Schneider
Amir Moradi, Tobias Schneider
Achieving Better Privacy for the 3GPP AKA Protocol
Pierre-Alain Fouque, Cristina Onete, Benjamin Richard
Pierre-Alain Fouque, Cristina Onete, Benjamin Richard
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
Jakub Szefer
Jakub Szefer
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
Erman Ayday, Qiang Tang, Arif Yilmaz
Erman Ayday, Qiang Tang, Arif Yilmaz
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai
Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai
Groth-Sahai Proofs Revisited Again: A Bug in ``Optimized'' Randomization
Keita Xagawa
Keita Xagawa
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic
Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic
T-Proof: Secure Communication via Non-Algorithmic Randomization
Gideon Samid
Gideon Samid
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Thomas Unterluggauer, Stefan Mangard
Thomas Unterluggauer, Stefan Mangard
Adequate Elliptic Curve for Computing the Product of n Pairings
Loubna Ghammam, Emmanuel Fouotsa
Loubna Ghammam, Emmanuel Fouotsa
NTRU Modular Lattice Signature Scheme on CUDA GPUs
Wei Dai, John Schanck, Berk Sunar, William Whyte, Zhenfei Zhang
Wei Dai, John Schanck, Berk Sunar, William Whyte, Zhenfei Zhang
Better Security for Queries on Encrypted Databases
Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang
Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang
Identity Chains
Andrew Egbert, Brad Chun, Thomas Otte
Andrew Egbert, Brad Chun, Thomas Otte
Chaos Machine: Different Approach to the Application and Significance of Numbers
Maciej A. Czyzewski
Maciej A. Czyzewski
Speeding up R-LWE post-quantum key exchange
Shay Gueron, Fabian Schlieker
Shay Gueron, Fabian Schlieker
AnNotify: A Private Notification Service
Ania Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg
Ania Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg
Can Large Deviation Theory be Used for Estimating Data Complexity?
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation
Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas
Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas
Authenticated Encryption with Variable Stretch
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
Fully Homomorphic Encryption with Isotropic Elements
Masahiro Yagisawa
Masahiro Yagisawa
NTRU Prime: reducing attack surface at low cost
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
Kwangsu Lee, Seunghwan Park
Kwangsu Lee, Seunghwan Park
Non-Interactive RAM and Batch NP Delegation from any PIR
Zvika Brakerski, Justin Holmgren, Yael Kalai
Zvika Brakerski, Justin Holmgren, Yael Kalai
CompGC: Efficient Offline/Online Semi-honest Two-party Computation
Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich
Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich
--Withdrawn--
Wei Yuan
Wei Yuan
Secure Protocol Transformations
Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu
Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu
Extracting the RC4 secret key of the Open Smart Grid Protocol
Linus Feiten, Matthias Sauer
Linus Feiten, Matthias Sauer
Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass, Lior Seeman, abhi shelat
Rafael Pass, Lior Seeman, abhi shelat
SQL on Structurally-Encrypted Databases
Seny Kamara, Tarik Moataz
Seny Kamara, Tarik Moataz
Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
Wacław Banasik, Stefan Dziembowski, Daniel Malinowski
Wacław Banasik, Stefan Dziembowski, Daniel Malinowski
A Provably Secure Code-based Concurrent Signature Scheme
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
Loop-Abort Faults on Lattice-Based Fiat–Shamir and Hash-and-Sign Signatures
Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi
Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi
A Note on ``Outsourcing Large Matrix Inversion Computation to a Public Cloud"
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Theoretical Attacks on E2E Voting Systems
Peter Hyun-Jeen Lee, Siamak F. Shahandashti
Peter Hyun-Jeen Lee, Siamak F. Shahandashti
Quantum key distribution with combined conjugate coding and information overloading
Boris Skoric
Boris Skoric
SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme
Alhassan Khedr, Glenn Gulak
Alhassan Khedr, Glenn Gulak
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Roberto Avanzi
Roberto Avanzi
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache
Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache
Blind Password Registration for Verifier-based PAKE
Franziskus Kiefer, Mark Manulis
Franziskus Kiefer, Mark Manulis
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA
Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Function-Hiding Inner Product Encryption is Practical
Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
A Measure Version of Gaussian Heuristic
Hao Chen
Hao Chen
sElect: A Lightweight Verifiable Remote Voting System
Ralf Kuesters, Johannes Mueller, Enrico Scapin, Tomasz Truderung
Ralf Kuesters, Johannes Mueller, Enrico Scapin, Tomasz Truderung
Observations on the LPN Solving Algorithm from Eurocrypt'16
Sonia Bogos, Serge Vaudenay
Sonia Bogos, Serge Vaudenay
Cryptanalysis of Reduced NORX
Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki
Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs
Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not
Cong Chen, Mohammad Farmani, Thomas Eisenbarth
Cong Chen, Mohammad Farmani, Thomas Eisenbarth
Analysis of Key Wrapping APIs: Generic Policies, Computational Security
Guillaume Scerri, Ryan Stanley-Oakes
Guillaume Scerri, Ryan Stanley-Oakes
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Kwangsu Lee, Dong Hoon Lee
Kwangsu Lee, Dong Hoon Lee
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme
David Bernhard, Oksana Kulyk, Melanie Volkamer
David Bernhard, Oksana Kulyk, Melanie Volkamer
Partially homomorphic encryption schemes over finite fields
Jian Liu, Lusheng Chen, Sihem Mesnager
Jian Liu, Lusheng Chen, Sihem Mesnager
Information-Theoretical Analysis of Two Shannon's Ciphers
Boris Ryabko
Boris Ryabko
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function
Phuong Ha Nguyen, Durga Prasad Sahoo
Phuong Ha Nguyen, Durga Prasad Sahoo
Privacy Preserving Network Analysis of Distributed Social Networks
Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
Fahad Shaon, Murat Kantarcioglu
Fahad Shaon, Murat Kantarcioglu
Multi-Input Inner-Product Functional Encryption from Pairings
Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
Computational Security of Quantum Encryption
Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
Modeling Random Oracles under Unpredictable Queries
Pooya Farshim, Arno Mittelbach
Pooya Farshim, Arno Mittelbach
A deeper understanding of the XOR count distribution in the context of lightweight cryptography
Sumanta Sarkar, Siang Meng Sim
Sumanta Sarkar, Siang Meng Sim
Homomorphic Encryption for Arithmetic of Approximate Numbers
Jung Hee Cheon, Andrey Kim, Miran Kim, Yongsoo Song
Jung Hee Cheon, Andrey Kim, Miran Kim, Yongsoo Song
A note on the security of threshold implementations with $d+1$ input shares
Santos Merino Del Pozo, François-Xavier Standaert
Santos Merino Del Pozo, François-Xavier Standaert
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
Yi LU, Yvo DESMEDT
Yi LU, Yvo DESMEDT
Shorter Circuit Obfuscation in Challenging Security Models
Zvika Brakerski, Or Dagmi
Zvika Brakerski, Or Dagmi
New Tools for Multi-Party Computation
Lisa Kohl
Lisa Kohl
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval
Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie
Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Nina Bindel, Johannes Buchmann, Juliane Krämer
Nina Bindel, Johannes Buchmann, Juliane Krämer
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)
Li Lin, Wenling Wu, Yafei Zheng
Li Lin, Wenling Wu, Yafei Zheng
Efficient algorithms for supersingular isogeny Diffie-Hellman
Craig Costello, Patrick Longa, Michael Naehrig
Craig Costello, Patrick Longa, Michael Naehrig
Solving Quadratic Equations with XL on Parallel Architectures - extended version
Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare
Eric Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter
Eric Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter
Efficient Quantum-Resistant Trust Infrastructure based on HIMMO
Oscar Garcia-Morchon, Sauvik Bhattacharya, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Maarten Bodlaender
Oscar Garcia-Morchon, Sauvik Bhattacharya, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Maarten Bodlaender
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}
Alex Biryukov, Vesselin Velichkov, Yann Le Corre
Alex Biryukov, Vesselin Velichkov, Yann Le Corre
Towards Bitcoin Payment Networks
Patrick McCorry, Malte Möser, Siamak F. Shahandashti, Feng Hao
Patrick McCorry, Malte Möser, Siamak F. Shahandashti, Feng Hao
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu
Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu
On the Construction of Lightweight Circulant Involutory MDS Matrices
Yongqiang Li, Mingsheng Wang
Yongqiang Li, Mingsheng Wang
Multiple Differential Cryptanalysis: A Rigorous Analysis
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
Sanjit Chatterjee, Alfred Menezes, Francisco Rodriguez-Henriquez
Sanjit Chatterjee, Alfred Menezes, Francisco Rodriguez-Henriquez
Fully Homomorphic Encryption for Point Numbers
Seiko Arita, Shota Nakasato
Seiko Arita, Shota Nakasato
Tower Number Field Sieve Variant of a Recent Polynomial Selection Method
Palash Sarkar, Shashank Singh
Palash Sarkar, Shashank Singh
Towards Secure Quadratic Voting
Sunoo Park, Ronald L. Rivest
Sunoo Park, Ronald L. Rivest
Slow Motion Zero Knowledge Identifying With Colliding Commitments
Houda Ferradi, Rémi Géraud, David Naccache
Houda Ferradi, Rémi Géraud, David Naccache
Algebraic Insights into the Secret Feistel Network (Full version)
Léo Perrin, Aleksei Udovenko
Léo Perrin, Aleksei Udovenko
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model
Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing
Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing
Cryptanalysis of Haraka
Jérémy Jean
Jérémy Jean
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Strengthening the Known-Key Security Notion for Block Ciphers
Benoît Cogliati, Yannick Seurin
Benoît Cogliati, Yannick Seurin
De Bruijn Sequences, Adjacency Graphs and Cyclotomy
Ming Li, Dongdai Lin
Ming Li, Dongdai Lin
Towards a Further Understanding of Bit-Based Division Property
Ling Sun, Meiqin Wang
Ling Sun, Meiqin Wang
A Digital Signature Scheme Based on Random Split of St-Gen Codes
Danilo Gligoroski, Simona Samardjiska
Danilo Gligoroski, Simona Samardjiska
Obfuscation without the Vulnerabilities of Multilinear Maps
Sanjam Garg, Pratyay Mukherjee, Akshayaram Srinivasan
Sanjam Garg, Pratyay Mukherjee, Akshayaram Srinivasan
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak
Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem
Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
K. Baghery, B. Abdolmaleki, M. J. Emadi
K. Baghery, B. Abdolmaleki, M. J. Emadi
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators
Vladimir Rožić, Bohan Yang, Nele Mentens, Ingrid Verbauwhede
Vladimir Rožić, Bohan Yang, Nele Mentens, Ingrid Verbauwhede
A note on Ring-LWE security in the case of Fully Homomorphic Encryption
Guillaume Bonnoron, Caroline Fontaine
Guillaume Bonnoron, Caroline Fontaine
Attacks against Filter Generators Exploiting Monomial Mappings
Anne Canteaut, Yann Rotella
Anne Canteaut, Yann Rotella
Reducing the Key Size of the SRP Encryption Scheme - Extended version
Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi
Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi
Faster elliptic-curve discrete logarithms on FPGAs
Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann
Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann
FHE Circuit Privacy Almost For Free
Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
Parallel Implementation of BDD enumeration for LWE
Elena Kirshanova, Alexander May, Friedrich Wiemer
Elena Kirshanova, Alexander May, Friedrich Wiemer
Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon, Marjan Škrobot, Qiang Tang
Jean Lancrenon, Marjan Škrobot, Qiang Tang
Using semidirect product of (semi)groups in public key cryptography
Delaram Kahrobaei, Vladimir Shpilrain
Delaram Kahrobaei, Vladimir Shpilrain
Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model
Arka Rai Choudhuri, Subhamoy Maitra
Arka Rai Choudhuri, Subhamoy Maitra
A Systematic Analysis of the Juniper Dual EC Incident
Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann
Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
Alon Rosen, Gil Segev, Ido Shahaf
Alon Rosen, Gil Segev, Ido Shahaf
Analysis of SHA-512/224 and SHA-512/256
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
Adaptive partitioning
Dennis Hofheinz
Dennis Hofheinz
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro
Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro
A Cryptographic Analysis of UMTS/LTE AKA
Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
Malleability of the blockchain’s entropy
Cecile Pierrot, Benjamin Wesolowski
Cecile Pierrot, Benjamin Wesolowski
Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
Ronald Cramer, Chaoping Xing, Chen Yuan
Ronald Cramer, Chaoping Xing, Chen Yuan
Foundations of Fully Dynamic Group Signatures
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
An Analysis of OpenSSL's Random Number Generator
Falko Strenzke
Falko Strenzke
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina
Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa
Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa
Cryptographic Analysis of the 3GPP AKA Protocol
Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
Legally Fair Contract Signing Without Keystones
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval
An Empirical Study towards Refining the AKS Primality Testing Algorithm
Lalitha Kiran Nemana, V. Ch. Venkaiah
Lalitha Kiran Nemana, V. Ch. Venkaiah
Functional Encryption for Bounded Collusions, Revisited
Shweta Agrawal, Alon Rosen
Shweta Agrawal, Alon Rosen
Another Look at Tightness II: Practical Issues in Cryptography
Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
Less is More - Dimensionality Reduction from a Theoretical Perspective
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
Ari Juels, Ahmed Kosba, Elaine Shi
Ari Juels, Ahmed Kosba, Elaine Shi
State Management for Hash-Based Signatures
David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
More Efficient Constructions for Inner-Product Encryption
Somindu C. Ramanna
Somindu C. Ramanna
Fruit-v2: Ultra-Lightweight Stream Cipher with Shorter Internal State
Vahid Amin Ghafari, Honggang Hu, Ying Chen
Vahid Amin Ghafari, Honggang Hu, Ying Chen
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
Atsushi Takayasu, Noboru Kunihiro
Atsushi Takayasu, Noboru Kunihiro
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware
Pascal Sasdrich, Tim Güneysu
Pascal Sasdrich, Tim Güneysu
How (Not) to Instantiate Ring-LWE
Chris Peikert
Chris Peikert
Probabilistic Termination and Composability of Cryptographic Protocols
Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
Note on Impossible Differential Attacks
Patrick Derbez
Patrick Derbez
A Note on Non-Perfect Secret Sharing
Oriol Farràs, Sebastià Martín, Carles Padró
Oriol Farràs, Sebastià Martín, Carles Padró
Cryptanalysis of Searchable Anonymous Attribute Based Encryption
Payal Chaudhari, Manik Lal Das
Payal Chaudhari, Manik Lal Das
New Framework for Secure Server-Designation Public Key Encryption with Keyword Search
Xi-Jun Lin, Lin Sun, Haipeng Qu
Xi-Jun Lin, Lin Sun, Haipeng Qu
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction
Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura
Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura
Encoding Rational Numbers for FHE-based Applications
HeeWon Chung, Myungsun Kim
HeeWon Chung, Myungsun Kim
On the complexity of constructing pseudorandom functions (especially when they don't exist)
Eric Miles, Emanuele Viola
Eric Miles, Emanuele Viola
On the Selective Opening Security of Practical Public-Key Encryption Schemes
Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
Semantically Secure Anonymity: Foundations of Re-encryption
Adam L. Young, Moti Yung
Adam L. Young, Moti Yung
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Eshan Chattopadhyay, Vipul Goyal, Xin Li
Eshan Chattopadhyay, Vipul Goyal, Xin Li
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Zvika Brakerski, Renen Perlman
Zvika Brakerski, Renen Perlman
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu
Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu
State recovery of RC4 and Spritz Revisited
Martin Gábriš, Martin Stanek
Martin Gábriš, Martin Stanek
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA
Margarita Osadchy, Julio Hernandez-Castro, Stuart Gibson, Orr Dunkelman, Daniel Pérez-Cabo
Margarita Osadchy, Julio Hernandez-Castro, Stuart Gibson, Orr Dunkelman, Daniel Pérez-Cabo
Complete characterization of generalized bent and 2^k-bent Boolean functions
Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng
Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng
Probability that the k-gcd of products of positive integers is B-friable
Jung Hee Cheon, Duhyeong Kim
Jung Hee Cheon, Duhyeong Kim
Proof of Space from Stacked Expanders
Ling Ren, Srinivas Devadas
Ling Ren, Srinivas Devadas
Micropayments for Decentralized Currencies
Rafael Pass, abhi shelat
Rafael Pass, abhi shelat
TRVote: A New, Trustworthy and Robust Electronic Voting System
Fatih Tiryakioglu, Mehmet Sabir Kiraz, Fatih Birinci
Fatih Tiryakioglu, Mehmet Sabir Kiraz, Fatih Birinci
NaCl's Crypto_Box in Hardware
Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser
Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser
A modified block Lanczos algorithm with fewer vectors
Emmanuel Thomé
Emmanuel Thomé
Constructing genus 3 hyperelliptic Jacobians with CM
Jennifer Balakrishnan, Sorina Ionica, Kristin Lauter, Christelle Vincent
Jennifer Balakrishnan, Sorina Ionica, Kristin Lauter, Christelle Vincent
Proxy Re-Encryption Schemes with Key Privacy from LWE
Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen
Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen
Square Attack on 7-Round Kiasu-BC
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Optimized quantization in Zero Leakage Helper Data Systems
Taras Stanko, Fitria Nur Andini, Boris Skoric
Taras Stanko, Fitria Nur Andini, Boris Skoric
Interactive Oracle Proofs with Constant Rate and Query Complexity
Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems
Chaohui Du, Guoqiang Bai
Chaohui Du, Guoqiang Bai
On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks
Ulrich Rührmair
Ulrich Rührmair
Algebraic Decomposition for Probing Security
Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
On Metrics to Quantify the Inter-Device Uniqueness of PUFs
Linus Feiten, Matthias Sauer, Bernd Becker
Linus Feiten, Matthias Sauer, Bernd Becker
High-precision Secure Computation of Satellite Collision Probabilities
Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
Generic Construction of Certificateless Signcryption Scheme
Jayaprakash Kar, Sagar Naik
Jayaprakash Kar, Sagar Naik
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal, Venkata Koppula, Brent Waters
Rishab Goyal, Venkata Koppula, Brent Waters
A Note on Black-Box Separations for Indistinguishability Obfuscation
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
Flattening NTRU for Evaluation Key Free Homomorphic Encryption
Yarkın Doröz, Berk Sunar
Yarkın Doröz, Berk Sunar
Blind Source Separation from Single Measurements using Singular Spectrum Analysis
Santos Merino Del Pozo, François-Xavier Standaert
Santos Merino Del Pozo, François-Xavier Standaert
Fiat-Shamir for Highly Sound Protocols is Instantiable
Arno Mittelbach, Daniele Venturi
Arno Mittelbach, Daniele Venturi
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Ivica Nikolic, Yu Sasaki
Ivica Nikolic, Yu Sasaki
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0
Bin Zhang, Chao Xu, Willi Meier
Bin Zhang, Chao Xu, Willi Meier
Coded-BKW: Solving LWE Using Lattice Codes
Qian Guo, Thomas Johansson, Paul Stankovski
Qian Guo, Thomas Johansson, Paul Stankovski
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Celine Chevalier, Fabien Laguillaumie, Damien Vergnaud
Celine Chevalier, Fabien Laguillaumie, Damien Vergnaud
Strongly Leakage-Resilient Authenticated Key Exchange
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
A Formal Treatment of Backdoored Pseudorandom Generators
Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
Certicateless Aggregate Short Signature Scheme
Jayaprakash Kar
Jayaprakash Kar
A Fast Attribute Based Encryption
Yacov Yacobi
Yacov Yacobi
From Obfuscation to the Security of Fiat-Shamir for Proofs
Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum
Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umana
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umana
Constrained Pseudorandom Functions for Unconstrained Inputs
Apoorvaa Deshpande, Venkata Koppula, Brent Waters
Apoorvaa Deshpande, Venkata Koppula, Brent Waters
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
Efficient Design Strategies Based on the AES Round Function
Jérémy Jean, Ivica Nikolic
Jérémy Jean, Ivica Nikolic
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
Max Fillinger, Marc Stevens
Max Fillinger, Marc Stevens
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo
Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo
How to Sequentialize Independent Parallel Attacks?
Sonia Bogos, Serge Vaudenay
Sonia Bogos, Serge Vaudenay
Collision Attack on GRINDAHL
Thomas Peyrin
Thomas Peyrin
Evaluation and Improvement of Generic-Emulating DPA Attacks
Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu
Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu
A Parametric Family of Attack Models for Proxy Re-Encryption
David Nuñez, Isaac Agudo, Javier Lopez
David Nuñez, Isaac Agudo, Javier Lopez
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
Yusuke Naito, Kan Yasuda
Yusuke Naito, Kan Yasuda
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems
Cynthia Dwork, Moni Naor, Guy N. Rothblum
Cynthia Dwork, Moni Naor, Guy N. Rothblum
Nonce-Based Cryptography: Retaining Security when Randomness Fails
Mihir Bellare, Björn Tackmann
Mihir Bellare, Björn Tackmann
Obfuscation Combiners
Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
Optimization of LPN Solving Algorithms
Sonia Bogos, Serge Vaudenay
Sonia Bogos, Serge Vaudenay
Verifiability Notions for E-Voting Protocols
Veronique Cortier, David Galindo, Ralf Kuesters, Johannes Mueller, Tomasz Truderung
Veronique Cortier, David Galindo, Ralf Kuesters, Johannes Mueller, Tomasz Truderung
On a remarkable property of APN Gold functions
Anastasiya Gorodilova
Anastasiya Gorodilova
Bit-Based Division Property and Application to Simon Family
Yosuke Todo, Masakatu Morii
Yosuke Todo, Masakatu Morii
Co-location detection on the Cloud
Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
Secure Audit Logs with Verifiable Excerpts
Gunnar Hartung
Gunnar Hartung
Detecting flawed masking schemes with leakage detection tests
Oscar Reparaz
Oscar Reparaz
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev
Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev
Low Power Montgomery Modular Multiplication on Reconfigurable Systems
Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens
Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens
Constrained PRFs for Unbounded Inputs with Short Keys
Hamza Abusalah, Georg Fuchsbauer
Hamza Abusalah, Georg Fuchsbauer
Various Proxy Re-Encryption Schemes from Lattices
Xiong Fan, Feng-Hao Liu
Xiong Fan, Feng-Hao Liu
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
Arithmetic coding and blinding countermeasures for lattice signatures
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Faster Algorithms for Solving LPN
Bin Zhang, Lin Jiao, Mingsheng Wang
Bin Zhang, Lin Jiao, Mingsheng Wang
What users should know about Full Disk Encryption based on LUKS
Simone Bossi, Andrea Visconti
Simone Bossi, Andrea Visconti
On the weaknesses of PBKDF2
Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò
Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò
Spooky Encryption and its Applications
Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
Cryptanalysis of the FLIP Family of Stream Ciphers
Sébastien Duval, Virginie Lallemand, Yann Rotella
Sébastien Duval, Virginie Lallemand, Yann Rotella
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model
Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials
Ming Li, Dongdai Lin
Ming Li, Dongdai Lin
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach
Ahmad Boorghany, Siavash Bayat-Sarmadi, Rasool Jalili
Ahmad Boorghany, Siavash Bayat-Sarmadi, Rasool Jalili
Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256
Yonglin Hao
Yonglin Hao
Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic
Shinichi Kawamura, Tomoko Yonemura, Yuichi Komano, Hideo Shimizu
Shinichi Kawamura, Tomoko Yonemura, Yuichi Komano, Hideo Shimizu
Multi-prover Proof-of-Retrievability
Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
How Fast Can Higher-Order Masking Be in Software?
Dahmun Goudarzi, Matthieu Rivain
Dahmun Goudarzi, Matthieu Rivain
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
Collaborative Multi-Authority Key-Policy Attribute-Based Encryption for Shorter Keys and Parameters
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
MEMS-based Gyroscopes as Physical Unclonable Functions
Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel
Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel
On the Size of Pairing-based Non-interactive Arguments
Jens Groth
Jens Groth
Adaptive Oblivious Transfer and Generalizations
Olivier Blazy, Céline Chevalier, Paul Germouty
Olivier Blazy, Céline Chevalier, Paul Germouty
Structure-Preserving Smooth Projective Hashing
Olivier Blazy, Céline Chevalier
Olivier Blazy, Céline Chevalier
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
Huijia Lin
Huijia Lin
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage
Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds
Essam Ghadafi
Essam Ghadafi
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet
Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet
Run-time Accessible DRAM PUFs in Commodity Devices
Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
The Exact Round Complexity of Secure Computation
Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou
Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations
Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf
Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf
Fixed Point Arithmetic in SHE Scheme
A. Costache, N. P. Smart, S. Vivek, A. Waller
A. Costache, N. P. Smart, S. Vivek, A. Waller
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi, Tobias Schneider
Amir Moradi, Tobias Schneider
Invariant subspaces in Simpira
Sondre Rønjom
Sondre Rønjom
Public Verifiable Function Secret Sharing
Wang Qiang, Zhou Fucai, Chen Chunyu, Li Fuxiang, Xu Zifeng
Wang Qiang, Zhou Fucai, Chen Chunyu, Li Fuxiang, Xu Zifeng
LINGUISTIC CRACKING OF PASSPHRASES USING MARKOV CHAINS
Peder Sparell, Mikael Simovits
Peder Sparell, Mikael Simovits
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Peter Linder
Peter Linder
Cryptanalysis of Simpira v1
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Attribute-Based Signatures for Circuits from Bilinear Map
Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka
Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka
A trivial debiasing scheme for Helper Data Systems
Boris Skoric
Boris Skoric
On Error Distributions in Ring-based LWE
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Provably Weak Instances of Ring-LWE Revisited
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert
Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert
May-Ozerov Algorithm for Nearest-Neighbor Problem over $\mathbb{F}_{q}$ and Its Application to Information Set Decoding
Shoichi Hirose
Shoichi Hirose
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT
Guoyan Zhang, Meicheng Liu
Guoyan Zhang, Meicheng Liu
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
Takahiro Matsuda, Goichiro Hanaoka
Takahiro Matsuda, Goichiro Hanaoka
Trick or Tweak: On the (In)security of OTR’s Tweaks
Raphael Bost, Olivier Sanders
Raphael Bost, Olivier Sanders
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE
Charanjit S. Jutla, Arnab Roy
Charanjit S. Jutla, Arnab Roy
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin
Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
Key Compression for Isogeny-Based Cryptosystems
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, Christopher Leonardi
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, Christopher Leonardi
On a decentralized trustless pseudo-random number generation algorithm
Serguei Popov
Serguei Popov
Process Table Covert Channels: Exploitation and Countermeasures
Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache
Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache
On Statistically Secure Obfuscation with Approximate Correctness
Zvika Brakerski, Chris Brzuska, Nils Fleischhacker
Zvika Brakerski, Chris Brzuska, Nils Fleischhacker
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
Qian Guo, Thomas Johansson
Qian Guo, Thomas Johansson
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
Yuval Yarom, Daniel Genkin, Nadia Heninger
Yuval Yarom, Daniel Genkin, Nadia Heninger
Still Wrong Use of Pairings in Cryptography
Mehmet Sabır Kiraz, Osmanbey Uzunkol
Mehmet Sabır Kiraz, Osmanbey Uzunkol
Time-Memory Trade-Off for Lattice Enumeration in a Ball
Paul Kirchner, Pierre-Alain Fouque
Paul Kirchner, Pierre-Alain Fouque
Post-Compromise Security
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
Algorithms on Ideal over Complex Multiplication order
Paul Kirchner
Paul Kirchner
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Jörg Schwenk
Jörg Schwenk
Semantic Security and Key-Privacy With Random Split of St-Gen Codes
Danilo Gligoroski, Simona Samardjiska
Danilo Gligoroski, Simona Samardjiska
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
Eric R. Verheul
Eric R. Verheul
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary
Sumit Kumar Debnath, Ratna Dutta
Sumit Kumar Debnath, Ratna Dutta
Algorithms for the Approximate Common Divisor Problem
Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy
Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky, Zvika Brakerski, Yael Kalai, Omer Paneth, Vinod Vaikuntanathan
Nir Bitansky, Zvika Brakerski, Yael Kalai, Omer Paneth, Vinod Vaikuntanathan
Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring
Vadim N. Tsypyschev
Vadim N. Tsypyschev
Randomness Complexity of Private Circuits for Multiplication
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
Hopes, Fears and Software Obfuscation: A Survey
Boaz Barak
Boaz Barak
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song, Zhangjie Huang, Qianqian Yang
Ling Song, Zhangjie Huang, Qianqian Yang
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
Sandro Coretti, Juan Garay, Martin Hirt, Vassilis Zikas
Sandro Coretti, Juan Garay, Martin Hirt, Vassilis Zikas
Fault analysis and weak key-IV attack on Sprout
Dibyendu Roy, Sourav Mukhopadhyay
Dibyendu Roy, Sourav Mukhopadhyay
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
Johannes Blömer, Gennadij Liske
Johannes Blömer, Gennadij Liske
Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol
Derek Atkins, Dorian Goldfeld
Derek Atkins, Dorian Goldfeld
A Memory Encryption Engine Suitable for General Purpose Processors
Shay Gueron
Shay Gueron
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Pascal Sasdrich, Amir Moradi, Tim Güneysu
Pascal Sasdrich, Amir Moradi, Tim Güneysu
An Encryption Scheme based on Random Split of St-Gen Codes
Simona Samardjiska, Danilo Gligoroski
Simona Samardjiska, Danilo Gligoroski
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Nico Doettling, Daniel Kraschewski, Joern Mueller-Quade, Tobias Nilges
Nico Doettling, Daniel Kraschewski, Joern Mueller-Quade, Tobias Nilges
An Alternative View of the Graph-Induced Multilinear Maps
Yilei Chen
Yilei Chen
The Honey Badger of BFT Protocols
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Ko Stoffelen
Ko Stoffelen
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
Multi-Key FHE from LWE, Revisited
Chris Peikert, Sina Shiehian
Chris Peikert, Sina Shiehian
How to Generalize RSA Cryptanalyses
Atsushi Takayasu, Noboru Kunihiro
Atsushi Takayasu, Noboru Kunihiro
How to Share a Secret, Infinitely
Ilan Komargodski, Moni Naor, Eylon Yogev
Ilan Komargodski, Moni Naor, Eylon Yogev
Security considerations for Galois non-dual RLWE families
Hao Chen, Kristin Lauter, Katherine E. Stange
Hao Chen, Kristin Lauter, Katherine E. Stange
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam
Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam
Optimal Security Proofs for Signatures from Identification Schemes
Eike Kiltz, Daniel Masny, Jiaxin Pan
Eike Kiltz, Daniel Masny, Jiaxin Pan
A MAC Mode for Lightweight Block Ciphers
Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
Yao's millionaires' problem and public-key encryption without computational assumptions
Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain
Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain
On the division property of S-boxes
Faruk Göloğlu, Vincent Rijmen, Qingju Wang
Faruk Göloğlu, Vincent Rijmen, Qingju Wang
Efficient Secure Multiparty Computation with Identifiable Abort
Carsten Baum, Emmanuela Orsini, Peter Scholl
Carsten Baum, Emmanuela Orsini, Peter Scholl
Lightweight MDS Generalized Circulant Matrices (Full Version)
Meicheng Liu, Siang Meng Sim
Meicheng Liu, Siang Meng Sim
On the Influence of Message Length in PMAC's Security Bounds
Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
Efficiently Enforcing Input Validity in Secure Two-party Computation
Jonathan Katz, Alex J. Malozemoff, Xiao Wang
Jonathan Katz, Alex J. Malozemoff, Xiao Wang
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version --
Houssem Maghrebi, Victor Servant, Julien Bringer
Houssem Maghrebi, Victor Servant, Julien Bringer
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
Cryptographic Properties of Addition Modulo $2^n$
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz, Tibor Jager, Andy Rupp
Dennis Hofheinz, Tibor Jager, Andy Rupp
Computing theta functions in quasi-linear time in genus 2 and above
Hugo Labrande, Emmanuel Thomé
Hugo Labrande, Emmanuel Thomé
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
Christine van Vredendaal
Christine van Vredendaal
Anonymous Role-Based Access Control on E-Health Records
Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu
Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu
Online/Offline OR Composition of Sigma Protocols
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Honey Encryption Beyond Message Recovery Security
Joseph Jaeger, Thomas Ristenpart, Qiang Tang
Joseph Jaeger, Thomas Ristenpart, Qiang Tang
Circuit Compilers with O(1/ log(n)) Leakage Rate
Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust
Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
Commutativity, Associativity, and Public Key Cryptography
Jacques Patarin, Valérie Nachef
Jacques Patarin, Valérie Nachef
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning
Ran Raz
Ran Raz
Provably Robust Sponge-Based PRNGs and KDFs
Peter Gaži, Stefano Tessaro
Peter Gaži, Stefano Tessaro
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi
On Bitcoin Security in the Presence of Broken Crypto Primitives
Ilias Giechaskiel, Cas Cremers, Kasper Rasmussen
Ilias Giechaskiel, Cas Cremers, Kasper Rasmussen
Per-Session Security: Password-Based Cryptography Revisited
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
PrAd: Enabling Privacy-Aware Location based Advertising
Hung Dang, Ee-Chien Chang
Hung Dang, Ee-Chien Chang
Sanitization of FHE Ciphertexts
Léo Ducas, Damien Stehle
Léo Ducas, Damien Stehle
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
Irene Giacomelli, Jesper Madsen, Claudio Orlandi
Irene Giacomelli, Jesper Madsen, Claudio Orlandi
New Negative Results on Differing-Inputs Obfuscation
Mihir Bellare, Igors Stepanovs, Brent Waters
Mihir Bellare, Igors Stepanovs, Brent Waters
Revisiting Structure Graphs: Applications to CBC-MAC and EMAC
Ashwin Jha, Mridul Nandi
Ashwin Jha, Mridul Nandi
Polytopic Cryptanalysis
Tyge Tiessen
Tyge Tiessen
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Krzysztof Pietrzak, Maciej Skorski
Krzysztof Pietrzak, Maciej Skorski
A Subgradient Algorithm For Computational Distances and Applications to Cryptography
Maciej Skórski
Maciej Skórski
Key Derivation for Squared-Friendly Applications: Lower Bounds
Maciej Skorski
Maciej Skorski
More Efficient Constant-Round Multi-Party Computation from BMR and SHE
Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption
Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng
Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng
Highly-Efficient Fully-Anonymous Dynamic Group Signatures
David Derler, Daniel Slamanig
David Derler, Daniel Slamanig
Differentially Private Password Frequency Lists
Jeremiah Blocki, Anupam Datta, Joseph Bonneau
Jeremiah Blocki, Anupam Datta, Joseph Bonneau
Attacks and parameter choices in HIMMO
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Moon Sung Lee, Domingo Gomez-Perez, Jaime Gutierrez, Berry Schoenmakers
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Moon Sung Lee, Domingo Gomez-Perez, Jaime Gutierrez, Berry Schoenmakers
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
Yu Yu, John Steinberger
Yu Yu, John Steinberger
On Garbling Schemes with and without Privacy
Carsten Baum
Carsten Baum
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher
Wentan Yi, Shaozhen Chen
Wentan Yi, Shaozhen Chen
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
Srinath M. S., V. Chandrasekaran
Srinath M. S., V. Chandrasekaran
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Eric Miles, Amit Sahai, Mark Zhandry
Eric Miles, Amit Sahai, Mark Zhandry
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi
Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou
Jeremiah Blocki, Hong-Sheng Zhou
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
On upper bounds for algebraic degrees of APN functions
Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun
Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun
Hash-Function based PRFs: AMAC and its Multi-User Security
Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro
Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro
On low degree polynomials in 2-round AES
Igor Semaev
Igor Semaev
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
Shota Yamada
Shota Yamada
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without a Low Level Encoding of Zero
Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee
Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee
A new algorithm for residue multiplication modulo $2^{521}-1$
Shoukat Ali, Murat Cenk
Shoukat Ali, Murat Cenk
Rate-1, Linear Time and Additively Homomorphic UC Commitments
Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen
Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
Emmanuel Volte, Valérie Nachef, Nicolas Marrière
Emmanuel Volte, Valérie Nachef, Nicolas Marrière
Cryptanalysis of the New CLT Multilinear Map over the Integers
Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu
Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu
More Practical and Secure History-Independent Hash Tables
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
On the nonlinearity of monotone Boolean functions
Claude Carlet
Claude Carlet
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
Shahram Rasoolzadeh, Håvard Raddum
Shahram Rasoolzadeh, Håvard Raddum
New Attacks on the Concatenation and XOR Hash Combiners
Itai Dinur
Itai Dinur
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Loubna Ghammam, Emmanuel Fouotsa
Loubna Ghammam, Emmanuel Fouotsa
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
Removing the Strong RSA Assumption from Arguments over the Integers
Geoffroy Couteau, Thomas Peters, David Pointcheval
Geoffroy Couteau, Thomas Peters, David Pointcheval
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes
Martin Albrecht, Shi Bai, Léo Ducas
Martin Albrecht, Shi Bai, Léo Ducas
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Emre Yüce, Ali Aydın Selçuk
Emre Yüce, Ali Aydın Selçuk
Compact Identity Based Encryption from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu
Daniel Apon, Xiong Fan, Feng-Hao Liu
Collecting relations for the Number Field Sieve in $GF(p^6)$
Pierrick Gaudry, Laurent Grémy, Marion Videau
Pierrick Gaudry, Laurent Grémy, Marion Videau
Robust Password-Protected Secret Sharing
Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval
Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
Shay Gueron, Nicky Mouha
Shay Gueron, Nicky Mouha
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
Tibor Jager
Tibor Jager
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci
Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
Christof Beierle, Thorsten Kranz, Gregor Leander
Christof Beierle, Thorsten Kranz, Gregor Leander
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
Zvika Brakerski, Vinod Vaikuntanathan
Zvika Brakerski, Vinod Vaikuntanathan
Circular Security Separations for Arbitrary Length Cycles from LWE
Venkata Koppula, Brent Waters
Venkata Koppula, Brent Waters
Interactive Oracle Proofs
Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
Efficiently Computing Data-Independent Memory-Hard Functions
Joel Alwen, Jeremiah Blocki
Joel Alwen, Jeremiah Blocki
The Magic of ELFs
Mark Zhandry
Mark Zhandry
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments
Serge Fehr, Max Fillinger
Serge Fehr, Max Fillinger
On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore, Anca Nitulescu
Dario Fiore, Anca Nitulescu
Scalable and Secure Logistic Regression via Homomorphic Encryption
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Navid Alamati, Chris Peikert
Navid Alamati, Chris Peikert
Fast Multiparty Multiplications from shared bits
Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias
Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias
An Efficient Toolkit for Computing Private Set Operations
Alex Davidson, Carlos Cid
Alex Davidson, Carlos Cid
Fully Anonymous Transferable Ecash
Hitesh Tewari, Arthur Hughes
Hitesh Tewari, Arthur Hughes
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård, Helene Haagh, Claudio Orlandi
Ivan Damgård, Helene Haagh, Claudio Orlandi
Can there be efficient and natural FHE schemes?
Kristian Gjøsteen, Martin Strand
Kristian Gjøsteen, Martin Strand
Open Sesame: The Password Hashing Competition and Argon2
Jos Wetzels
Jos Wetzels
Speed Optimizations in Bitcoin Key Recovery Attacks
Nicolas Courtois, Guangyan Song, Ryan Castellucci
Nicolas Courtois, Guangyan Song, Ryan Castellucci
Breaking the Sub-Exponential Barrier in Obfustopia
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro
Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
Michael Clear, Ciaran McGoldrick
Michael Clear, Ciaran McGoldrick
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger
Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger
A Maiorana-McFarland Construction of a GBF on Galois ring
Shashi Kant Pandey, P. R. Mishra, B. K. Dass
Shashi Kant Pandey, P. R. Mishra, B. K. Dass
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li
Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li
Obfuscation without Multilinear Maps
Dingfeng Ye, Peng Liu
Dingfeng Ye, Peng Liu
Tightly CCA-Secure Encryption without Pairings
Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
Valiant's Universal Circuit is Practical
Ágnes Kiss, Thomas Schneider
Ágnes Kiss, Thomas Schneider
Cryptanalysis of the Full Spritz Stream Cipher
Subhadeep Banik, Takanori Isobe
Subhadeep Banik, Takanori Isobe
On the Security of the Algebraic Eraser Tag Authentication Protocol
Simon R. Blackburn, M. J. B. Robshaw
Simon R. Blackburn, M. J. B. Robshaw
Spectral characterization of iterating lossy mappings
Joan Daemen
Joan Daemen
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
On Linear Hulls and Trails
Tomer Ashur, Vincent Rijmen
Tomer Ashur, Vincent Rijmen
Safely Exporting Keys from Secure Channels: On the Security of EAP-TLS and TLS Key Exporters
Chris Brzuska, Håkon Jacobsen, Douglas Stebila
Chris Brzuska, Håkon Jacobsen, Douglas Stebila
Intel SGX Explained
Victor Costan, Srinivas Devadas
Victor Costan, Srinivas Devadas
Cryptanalysis of ring-LWE based key exchange with key share reuse
Scott Fluhrer
Scott Fluhrer
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
Cryptanalysis of PRINCE with Minimal Data
Shahram Rasoolzadeh, Håvard Raddum
Shahram Rasoolzadeh, Håvard Raddum
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Qiang Tang, Balazs Pejo, Husen Wang
Qiang Tang, Balazs Pejo, Husen Wang
Non-Interactive Verifiable Secret Sharing For Monotone Circuits
Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia
Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia
Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN
Shahram Rasoolzadeh, Håvard Raddum
Shahram Rasoolzadeh, Håvard Raddum
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes
Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma
Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma
On the Power of Secure Two-Party Computation
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Jinsheng Zhang, Wensheng Zhang, Daji Qiao
Jinsheng Zhang, Wensheng Zhang, Daji Qiao
Downgrade Resilience in Key-Exchange Protocols
Karthikeyan Bhargavan, Chris Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella-Béguelin
Karthikeyan Bhargavan, Chris Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella-Béguelin
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version)
Alex Biryukov, Léo Perrin, Aleksei Udovenko
Alex Biryukov, Léo Perrin, Aleksei Udovenko
Domain-Specific Pseudonymous Signatures Revisited
Kamil Kluczniak
Kamil Kluczniak
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
Gergei Bana, Rohit Chadha
Gergei Bana, Rohit Chadha
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
Yongge Wang
Yongge Wang
OPFE: Outsourcing Computation for Private Function Evaluation
Henry Carter, Patrick Traynor
Henry Carter, Patrick Traynor
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
A note on Tensor Simple Matrix Encryption Scheme
Yasufumi Hashimoto
Yasufumi Hashimoto
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
Analysing and Exploiting the Mantin Biases in RC4
Remi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe
Remi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
Raphael Bost, Pierre-Alain Fouque, David Pointcheval
Raphael Bost, Pierre-Alain Fouque, David Pointcheval
Accountable Privacy for Decentralized Anonymous Payments
Christina Garman, Matthew Green, Ian Miers
Christina Garman, Matthew Green, Ian Miers
Automated key setup and recovery from key exposure for power networks
Amir Herzberg, Yehonatan Kfir
Amir Herzberg, Yehonatan Kfir
Secure positioning and quantum non-local correlations
Muhammad Nadeem
Muhammad Nadeem
New Lattice Attacks on DSA Schemes
Dimitrios Poulakis
Dimitrios Poulakis
On the Architectural Analysis of Arbiter Delay PUF Variants
DURGA PRASAD SAHOO, PHUONG HA NGUYEN, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYA
DURGA PRASAD SAHOO, PHUONG HA NGUYEN, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYA
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
Attacking NTP's Authenticated Broadcast Mode
Aanchal Malhotra, Sharon Goldberg
Aanchal Malhotra, Sharon Goldberg
Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem
Masahiro Yagisawa
Masahiro Yagisawa
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
khalid Javeed, Xiaojun Wang
khalid Javeed, Xiaojun Wang
Fault-Tolerant Aggregate Signatures
Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
Capacity and Data Complexity in Multidimensional Linear Attack
Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg
Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg
Improved Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
Masahiro Yagisawa
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Christoph M. Mayer
Christoph M. Mayer
Better Preprocessing for Secure Multiparty Computation
Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias
Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias
Comb to Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
How To Simulate It - A Tutorial on the Simulation Proof Technique
Yehuda Lindell
Yehuda Lindell
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Xi-Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
Xi-Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells
Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
Neeva: A Lightweight Hash Function
Khushboo Bussi, Dhananjoy Dey, Manoj Kumar, B. K. Dass
Khushboo Bussi, Dhananjoy Dey, Manoj Kumar, B. K. Dass
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS
Preeti Kulshrestha, Arun Kumar
Preeti Kulshrestha, Arun Kumar
Packet Header Anomaly Detection Using Bayesian Topic Models
Xuefei Cao, Bo Chen, Hui Li, Yulong Fu
Xuefei Cao, Bo Chen, Hui Li, Yulong Fu
Standard quantum bit commitment – an indefinite commitment time
Muhammad Nadeem
Muhammad Nadeem
Collateral Damage in Online Social Networks: computing the significance of information collection
Iraklis Symeonids, Bart Preneel
Iraklis Symeonids, Bart Preneel
A Framework for Outsourcing of Secure Computation
Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi
Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
wentan Yi, Shaozhen Chen
wentan Yi, Shaozhen Chen
Simple Proofs of Space-Time and Rational Proofs of Storage
Tal Moran, Ilan Orlov
Tal Moran, Ilan Orlov
Universal Composition with Responsive Environments
Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Kuesters, Daniel Rausch
Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Kuesters, Daniel Rausch
Towards a Unified Security Model for Physically Unclonable Functions
Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung
Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung
On the Leakage-Resilient Key Exchange
Janaka Alawatugoda
Janaka Alawatugoda
Beyond the selective disclosure of ABCs on RAM-constrained devices
Antonio de la Piedra
Antonio de la Piedra
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
Jos Wetzels, Wouter Bokslag
Jos Wetzels, Wouter Bokslag
Sponges and Engines: An introduction to Keccak and Keyak
Jos Wetzels, Wouter Bokslag
Jos Wetzels, Wouter Bokslag
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter
Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
Abhishek Chakraborty, Debdeep Mukhopadhyay
Abhishek Chakraborty, Debdeep Mukhopadhyay
Human-readable Proof of the Related-Key Security of AES-128
Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
Refund attacks on Bitcoin’s Payment Protocol
Patrick McCorry, Siamak F. Shahandashti, Feng Hao
Patrick McCorry, Siamak F. Shahandashti, Feng Hao
Improved on an improved remote user authentication scheme with key agreement
Yalin Chen, Jue-Sam Chou, I - Chiung Liao
Yalin Chen, Jue-Sam Chou, I - Chiung Liao
On derivatives of polynomials over finite fields through integration
Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay
Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs
Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza
Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon
Yonglin Hao, Willi Meier
Yonglin Hao, Willi Meier
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
Hyung Tae Lee, San Ling, Huaxiong Wang
Hyung Tae Lee, San Ling, Huaxiong Wang
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
Valiant's Universal Circuit: Improvements, Implementation, and Applications
Helger Lipmaa, Payman Mohassel, Saeed Sadeghian
Helger Lipmaa, Payman Mohassel, Saeed Sadeghian
A trustless privacy-preserving reputation system
Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie
Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie
Quantum Collision-Resistance of Non-Uniformly Distributed Functions
Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
Foundations of Hardware-Based Attested Computation and Application to SGX
Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi
Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
Cryptography for Big Data Security
Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich
Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich
Better Security for Functional Encryption for Inner Product Evaluations
Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang
Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang
PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI)
Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri
Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman
David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud
Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud
Indistinguishability Obfuscation with Non-trivial Efficiency
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
A Columnar Transposition cipher in a contemporary setting.
John Jones
John Jones
Bounding basis reduction properties
Arnold Neumaier
Arnold Neumaier
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves
Nicolas T. Courtois
Nicolas T. Courtois
Remote Cache-Timing Attack without Learning Phase
Ali Can Atici, Cemal Yilmaz, Erkay Savas
Ali Can Atici, Cemal Yilmaz, Erkay Savas
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Yalin Chen, Jue-Sam Chou, Hung-Sheng Wu
Yalin Chen, Jue-Sam Chou, Hung-Sheng Wu
Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
Jiawei Yuan
Jiawei Yuan
Mitigating Multi-Target Attacks in Hash-based Signatures
Andreas Hülsing, Joost Rijneveld, Fang Song
Andreas Hülsing, Joost Rijneveld, Fang Song
Functional Encryption for Inner Product with Full Function Privacy
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Yohei Watanabe, Junji Shikata
Yohei Watanabe, Junji Shikata
Non-Malleable Functions and Their Applications
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay
Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Zhengjun Cao, Zhenfu Cao
Zhengjun Cao, Zhenfu Cao
Adaptively Secure Garbled Circuits from One-Way Functions
Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs
Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs
Trap Me If You Can -- Million Dollar Curve
Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain
Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Janaka Alawatugoda
Janaka Alawatugoda
Missing a trick: Karatsuba variations
Mike Scott
Mike Scott
Universally Composable Direct Anonymous Attestation
Jan Camenisch, Manu Drijvers, Anja Lehmann
Jan Camenisch, Manu Drijvers, Anja Lehmann
Variation of GGH15 Multilinear Maps
Gu Chunsheng
Gu Chunsheng
On values of vectorial Boolean functions and related problems in APN functions
George Shushuev
George Shushuev
Verifiable ASICs
Riad S. Wahby, Max Howald, Siddharth Garg, abhi shelat, Michael Walfish
Riad S. Wahby, Max Howald, Siddharth Garg, abhi shelat, Michael Walfish
Quantum Cryptography Beyond Quantum Key Distribution
Anne Broadbent, Christian Schaffner
Anne Broadbent, Christian Schaffner
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
Exploiting PUF Unreliability to Secure Wireless Sensing
Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality
Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
Asynchronous Secure Multiparty Computation in Constant Time
Ran Cohen
Ran Cohen
On the Security of One Password Authenticated Key Exchange Protocol
Stanislav V. Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova
Stanislav V. Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks
Liron David, Avishai Wool
Liron David, Avishai Wool
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance
Susumu Kiyoshima
Susumu Kiyoshima
On Cryptographic Anonimity and Unpredicatbility in Secret Sharing
Ruxandra Olimid, Anat Paskin-Cherniavsky
Ruxandra Olimid, Anat Paskin-Cherniavsky
Degenerate Curve Attacks
Samuel Neves, Mehdi Tibouchi
Samuel Neves, Mehdi Tibouchi
Extend FHEW to General Case
Zhou Tanping, Liu Longfei, Yang Xiaoyuan, Han Yiliang
Zhou Tanping, Liu Longfei, Yang Xiaoyuan, Han Yiliang
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack
Hassan Jameel Asghar, Mohamed Ali Kaafar
Hassan Jameel Asghar, Mohamed Ali Kaafar
Indistinguishable Proofs of Work or Knowledge
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao
Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao
Privacy protection in electronic education based on polymorphic pseudonymization
Eric R. Verheul
Eric R. Verheul
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p)
Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
Twisted Polynomials and Forgery Attacks on GCM
Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser
Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser
Chosen-Ciphertext Security from Subset Sum
Sebastian Faust, Daniel Masny, Daniele Venturi
Sebastian Faust, Daniel Masny, Daniele Venturi
On the Asymptotic Complexity of Solving LWE
Gottfried Herold, Elena Kirshanova, Alexander May
Gottfried Herold, Elena Kirshanova, Alexander May
Unclonable encryption revisited ($4 \times 2 = 8$)
Boris Skoric
Boris Skoric
Two-Round Man-in-the-Middle Security from LPN
David Cash, Eike Kiltz, Stefano Tessaro
David Cash, Eike Kiltz, Stefano Tessaro
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
$Area-Time$ Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Anissa Sghaier, Medien Zeghid, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout
Anissa Sghaier, Medien Zeghid, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout
Two-faced processes and existence of RNG with proven properties
Boris Ryabko
Boris Ryabko
Non-Transferable Proxy Re-Encryption
Hui Guo, Zhenfeng Zhang, Jing Xu
Hui Guo, Zhenfeng Zhang, Jing Xu
Simpler, Faster, and More Robust T-test Based Leakage Detection
A. Adam Ding, Cong Chen, Thomas Eisenbarth
A. Adam Ding, Cong Chen, Thomas Eisenbarth
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
Footprint scheduling for Dining-Cryptographer networks
Anna Krasnova, Moritz Neikes, Peter Schwabe
Anna Krasnova, Moritz Neikes, Peter Schwabe
Choosing and generating parameters for low level pairing implementation on BN curves
Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre
Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre
Log Analysis of Estonian Internet Voting 2013--2015
Sven Heiberg, Arnis Parsovs, Jan Willemson
Sven Heiberg, Arnis Parsovs, Jan Willemson
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Ehsan Ebrahimi Targhi, Dominique Unruh
Ehsan Ebrahimi Targhi, Dominique Unruh
Fast Optimistically Fair Cut-and-Choose 2PC
Alptekin Kupcu, Payman Mohassel
Alptekin Kupcu, Payman Mohassel
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
Zheng Yuan, Zhen Peng, Haiwen Ou
Zheng Yuan, Zhen Peng, Haiwen Ou
Comment on Demonstrations of Shor's Algorithm in the Past Decades
Zhengjun Cao, Zhenfu Cao, Lihua Liu
Zhengjun Cao, Zhenfu Cao, Lihua Liu
Simple Photonic Emission Attack with Reduced Data Complexity
Elad Carmon, Jean-Pierre Seifert, Avishai Wool
Elad Carmon, Jean-Pierre Seifert, Avishai Wool
Deniable Functional Encryption
Angelo De Caro, Vincenzo Iovino, Adam O'Neill
Angelo De Caro, Vincenzo Iovino, Adam O'Neill
Secret, verifiable auctions from elections
Elizabeth A. Quaglia, Ben Smyth
Elizabeth A. Quaglia, Ben Smyth
The graph of minimal distances of bent functions and its properties
Nikolay Kolomeec
Nikolay Kolomeec
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung
A Star-based Independent Biclique Attack on Full Rounds SQUARE
Zheng Yuan, Zhen Peng, Ming Mao
Zheng Yuan, Zhen Peng, Ming Mao
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
A compression method for homomorphic ciphertexts
S. Carpov, R. Sirdey
S. Carpov, R. Sirdey
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption
Mihir Bellare and Anna Lysyanskaya
Mihir Bellare and Anna Lysyanskaya
On-the-fly Homomorphic Batching/Unbatching
Yarkın Doröz, Berk Sunar, Gizem S. Çetin
Yarkın Doröz, Berk Sunar, Gizem S. Çetin
Secure Distributed Computation on Private Inputs
Geoffroy Couteau, Thomas Peters, David Pointcheval
Geoffroy Couteau, Thomas Peters, David Pointcheval
ARITHMETIC USING WORD-WISE HOMOMORPHIC ENCRYPTION
Gizem S. Cetin, Yarkin Doroz, Berk Sunar, William J. Martin
Gizem S. Cetin, Yarkin Doroz, Berk Sunar, William J. Martin
HOMOMORPHIC AUTOCOMPLETE
Gizem S. Çetin, Wei Dai, Yarkın Doröz, Berk Sunar
Gizem S. Çetin, Wei Dai, Yarkın Doröz, Berk Sunar
Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble
Thomas Fuhr, Gaëtan Leurent, Valentin Suder
Thomas Fuhr, Gaëtan Leurent, Valentin Suder
A Guide to Fully Homomorphic Encryption
Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand
Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro, Debdeep Mukhopadhyay
Chester Rebeiro, Debdeep Mukhopadhyay
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
Yuval Ishal, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
Yuval Ishal, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
Invariant Subspace Attack Against Full Midori64
Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
On an almost-universal hash function family with applications to authentication and secrecy codes
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, László Tóth
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, László Tóth
Restricted linear congruences
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth
Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth
Efficient Pseudorandom Functions via On-the-Fly Adaptation
Nico Doettling, Dominique Schröder
Nico Doettling, Dominique Schröder
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems
Alan Szepieniec, Jintai Ding, Bart Preneel
Alan Szepieniec, Jintai Ding, Bart Preneel
Authenticated Range \& Closest Point Queries in Zero-Knowledge
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 --
Nicky Mouha
Nicky Mouha
Construction of Transition Matrices for Binary FCSRs
Zhiqiang Lin, Dingyi Pei, Dongdai Lin
Zhiqiang Lin, Dingyi Pei, Dongdai Lin
Secure Comparator: a ZKP-Based Authentication System
Ignat Korchagin, Eugene Pilyankevich
Ignat Korchagin, Eugene Pilyankevich
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}
Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
Textbook Non-Malleable Commitments
Vipul Goyal, Omkant Pandey, Silas Richelson
Vipul Goyal, Omkant Pandey, Silas Richelson
On the CCA (in)security of MTProto
Jakob Jakobsen, Claudio Orlandi
Jakob Jakobsen, Claudio Orlandi
On the Efficiency of FHE-based Private Queries
Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang
Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Bhanu Prakash Gopularam, Nalini. N
Bhanu Prakash Gopularam, Nalini. N
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Goutam Paul, Souvik Ray
Goutam Paul, Souvik Ray
Secure Multiparty Computation with General Interaction Patterns
Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin
Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
Jingwei Hu, Ray C. C. Cheung
Jingwei Hu, Ray C. C. Cheung
On the Security of a access polynomial based self-healing key management schemes in wireless sensor networks
Yandong Zheng, Hua Guo
Yandong Zheng, Hua Guo
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud
Marc Green, Thomas Eisenbarth
Marc Green, Thomas Eisenbarth
SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains
Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena
Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena
Constraining Pseudorandom Functions Privately
Dan Boneh, Kevin Lewi, David J. Wu
Dan Boneh, Kevin Lewi, David J. Wu
Ceremonies for End-to-End Verifiable Elections
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Meet-in-the-Middle Attacks on Reduced-Round Midori-64
Li Lin, Wenling Wu
Li Lin, Wenling Wu
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
Pasquale Forte, Diego Romano, Giovanni Schmid
Pasquale Forte, Diego Romano, Giovanni Schmid
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher
Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
The Moral Character of Cryptographic Work
Phillip Rogaway
Phillip Rogaway
Cyber and Physical Access Control in Legacy System Using Passwords
Jia Xu, Jianying Zhou, Liming Lu
Jia Xu, Jianying Zhou, Liming Lu
Cryptanalysis of multi-HFE
Yasufumi Hashimoto
Yasufumi Hashimoto
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation
Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
A note on the optimality of frequency analysis vs. $\ell_p$-optimization
Marie-Sarah Lacharité, Kenneth G. Paterson
Marie-Sarah Lacharité, Kenneth G. Paterson
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Mihir Bellare, Bertram Poettering, Douglas Stebila
Mihir Bellare, Bertram Poettering, Douglas Stebila
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Dipanjan Das, Priyanka Bose, S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
Dipanjan Das, Priyanka Bose, S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
Cross Processor Cache Attacks
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
Obliv-C: A Language for Extensible Data-Oblivious Computation
Samee Zahur, David Evans
Samee Zahur, David Evans
Privacy-preserving Friendship-based Recommender Systems
Qiang Tang, Jun Wang
Qiang Tang, Jun Wang
Fully Leakage-Resilient Codes
Antonio Faonio, Jesper Buus Nielsen
Antonio Faonio, Jesper Buus Nielsen
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Takahiro Matsuda, Goichiro Hanaoka
Takahiro Matsuda, Goichiro Hanaoka
An Inverse-free Single-Keyed Tweakable Enciphering Scheme
Ritam Bhaumik, Mridul Nandi
Ritam Bhaumik, Mridul Nandi
Collusion Resistant Aggregation from Convertible Tags
Iraklis Leontiadis, Ming Li
Iraklis Leontiadis, Ming Li
libgroupsig: An extensible C library for group signatures
Jesus Diaz, David Arroyo, Francisco B. Rodriguez
Jesus Diaz, David Arroyo, Francisco B. Rodriguez
Lattice Attacks on the DGHV Homomorphic Encryption Scheme
Abderrahmane Nitaj, Tajjeeddine Rachidi
Abderrahmane Nitaj, Tajjeeddine Rachidi
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Olivier Blazy, Céline Chevalier, Damien Vergnaud
Olivier Blazy, Céline Chevalier, Damien Vergnaud
A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE
Zhigang Chen, Xinxia Song
Zhigang Chen, Xinxia Song
Midori: A Block Cipher for Low Energy (Extended Version)
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
Amplifying Side Channels Through Performance Degradation
Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom
Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom
Modular Inversion Hidden Number Problem- A Lattice Approach
Pranjal Dutta
Pranjal Dutta
Secret Sharing Schemes with General Access Structures (Full version)
Jian Liu, Sihem Mesnager, Lusheng Chen
Jian Liu, Sihem Mesnager, Lusheng Chen
Lightweight CRC-based Authentication
Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Mengce Zheng, Noboru Kunihiro, Honggang Hu
Mengce Zheng, Noboru Kunihiro, Honggang Hu
Multi-Input Functional Encryption for Unbounded Arity Functions
Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
$\Lambda \circ \lambda$: Functional Lattice Cryptography
Eric Crockett, Chris Peikert
Eric Crockett, Chris Peikert
Comment on ``Realization of a scalable Shor algorithm"
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders
Katsuyuki Takashima, Atsushi Takayasu
Katsuyuki Takashima, Atsushi Takayasu
On the Usability of Two-Factor Authentication
Ding Wang, Ping Wang
Ding Wang, Ping Wang
A Note on Perfect Correctness by Derandomization
Nir Bitansky, Vinod Vaikuntanathan
Nir Bitansky, Vinod Vaikuntanathan
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS
Martin R. Albrecht, Kenneth G. Paterson
Martin R. Albrecht, Kenneth G. Paterson
New directions in nearest neighbor searching with applications to lattice sieving
Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven
Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven
Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups
Mikhail Anokhin
Mikhail Anokhin
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi
Practical Order-Revealing Encryption with Limited Leakage
Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
Secret Sharing Schemes Based on Resilient Boolean Maps
Juan Carlos Ku-Cauich, Guillermo Morales-Luna
Juan Carlos Ku-Cauich, Guillermo Morales-Luna
Practical, Predictable Lattice Basis Reduction
Daniele Micciancio, Michael Walter
Daniele Micciancio, Michael Walter
Schnorr Signatures in the Multi-User Setting
Eike Kiltz, Daniel Masny, Jiaxin Pan
Eike Kiltz, Daniel Masny, Jiaxin Pan
On the First Fall Degree of Summation Polynomials
Stavros Kousidis, Andreas Wiemers
Stavros Kousidis, Andreas Wiemers
Even More Practical Key Exchanges for the Internet using Lattice Cryptography
Vikram Singh, Arjun Chopra
Vikram Singh, Arjun Chopra
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne
Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers
Zhenzhen Bao, Peng Luo, Dongdai Lin
Zhenzhen Bao, Peng Luo, Dongdai Lin
Efficient implementation of AND, OR and NOT operators for ABCs
Antonio de la Piedra
Antonio de la Piedra
CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption
Tarik Moataz, Erik-Oliver Blass, Travis Mayberry
Tarik Moataz, Erik-Oliver Blass, Travis Mayberry
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters
Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension
Michał Wroński
Michał Wroński
Multi-Input Functional Encryption with Unbounded-Message Security
Vipul Goyal, Aayush Jain, Adam O' Neill
Vipul Goyal, Aayush Jain, Adam O' Neill
Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles
Prastudy Fauzi, Helger Lipmaa
Prastudy Fauzi, Helger Lipmaa
Comparison of TERO-cell implementations and characterisation on SRAM FPGAs
Cedric Marchand, Lilian Bossuet, AbdelKarim Cherkaoui
Cedric Marchand, Lilian Bossuet, AbdelKarim Cherkaoui
Privacy-Aware Authentication in the Internet of Things
Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
Recommender Systems and their Security Concerns
Jun Wang, Qiang Tang
Jun Wang, Qiang Tang
Concurrent Secure Computation via Non-Black Box Simulation
Vipul Goyal, Divya Gupta, Amit Sahai
Vipul Goyal, Divya Gupta, Amit Sahai
POPE: Partial Order Preserving Encoding
Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich
Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
Peter Y A Ryan, Peter B Roenne, Vincenzo Iovino
Peter Y A Ryan, Peter B Roenne, Vincenzo Iovino
Computing Jacobi's \theta in quasi-linear time
Hugo Labrande
Hugo Labrande
Linear codes with few weights from weakly regular bent functions based on a generic construction
Sihem Mesnager
Sihem Mesnager
A Practical Cryptanalysis of the Algebraic Eraser
Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
Virtual Smart Cards: How to Sign with a Password and a Server
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.
Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, Mohsen Machhout
Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, Mohsen Machhout
Device-Enhanced Password Protocols with Optimal Online-Offline Protection
Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
Ring Signature Confidential Transactions for Monero
Shen Noether
Shen Noether
On the Communication required for Unconditionally Secure Multiplication
Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou, Michael Raskin
Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou, Michael Raskin
Watermarking Cryptographic Capabilities
Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs
Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs
Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures
Vipul Goyal, Aayush Jain, Dakshita Khurana
Vipul Goyal, Aayush Jain, Dakshita Khurana
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification
Divesh Aggarwal, Kaave Hosseini, Shachar Lovett
Divesh Aggarwal, Kaave Hosseini, Shachar Lovett
C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs
Ahmed Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, Hubert Chan, Charalampos Papamanthou, Rafael Pass, abhi shelat, Elaine Shi
Ahmed Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, Hubert Chan, Charalampos Papamanthou, Rafael Pass, abhi shelat, Elaine Shi
Post-quantum key exchange - a new hope
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
Construction for de Bruijn Sequences with Large Orders
Junwu Dong, Dingyi Pei
Junwu Dong, Dingyi Pei
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai
Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015
Eiichiro Fujisaki, Keita Xagawa
Eiichiro Fujisaki, Keita Xagawa
Efficient Signature Schemes from R-LWE
Ting Wang, Jianping Yu, Guoqiang Han, Peng Zhang
Ting Wang, Jianping Yu, Guoqiang Han, Peng Zhang
Chicken or the Egg - Computational Data Attacks or Physical Attacks
Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo
Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo
Malicious Keccak
Pawel Morawiecki
Pawel Morawiecki
Patchable Indistinguishability Obfuscation: iO for Evolving Software
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
Implementation Attacks on Post-Quantum Cryptographic Schemes
Mostafa Taha, Thomas Eisenbarth
Mostafa Taha, Thomas Eisenbarth
Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture
Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim
Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim
Variations to the cryptographics algorithms AES and TWOFISH
P. Freyre, N. Díaz, O. Cuellar
P. Freyre, N. Díaz, O. Cuellar
De Bruijn Sequences from Symmetric Shift Registers
Ming Li, Mingxing Wang, Dongdai Lin
Ming Li, Mingxing Wang, Dongdai Lin
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn
Dibyendu Roy, Sourav Mukhopadhyay
Dibyendu Roy, Sourav Mukhopadhyay
An appendix for a recent paper of Kim
Razvan Barbulescu
Razvan Barbulescu
Cybersecurity in an era with quantum computers: will we be ready?
Michele Mosca
Michele Mosca
Succinct Adaptive Garbled RAM
Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs
David Derler, Daniel Slamanig
David Derler, Daniel Slamanig
Quantum One-Time Memories from Stateless Hardware
Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
Revisiting Secure Two-Party Computation with Rational Players
Arpita Maitra, Goutam Paul, Asim K. Pal
Arpita Maitra, Goutam Paul, Asim K. Pal
Barriers to Black-Box Constructions of Traitor Tracing Systems
Bo Tang, Jiapeng Zhang
Bo Tang, Jiapeng Zhang
Indifferentiability of 8-Round Feistel Networks
Yuanxi Dai, John Steinberger
Yuanxi Dai, John Steinberger
Black-Box Parallel Garbled RAM
Steve Lu, Rafail Ostrovsky
Steve Lu, Rafail Ostrovsky
Public Verifiability in the Covert Model (Almost) for Free
Vladimir Kolesnikov, Alex J. Malozemoff
Vladimir Kolesnikov, Alex J. Malozemoff
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential
Haipeng Qu, Peng Shang, Xi-Jun Lin, Lin Sun
Haipeng Qu, Peng Shang, Xi-Jun Lin, Lin Sun
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
Christopher Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov
Christopher Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov
Déjà Q: Encore! Un Petit IBE
Hoeteck Wee
Hoeteck Wee
Optimal Computational Split-state Non-malleable Codes
Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
On Basing Private Information Retrieval on NP-Hardness
Tianren Liu, Vinod Vaikuntanathan
Tianren Liu, Vinod Vaikuntanathan
Complete addition formulas for prime order elliptic curves
Joost Renes, Craig Costello, Lejla Batina
Joost Renes, Craig Costello, Lejla Batina
A General Framework for Redactable Signatures and New Constructions
David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Rational Sumchecks
Siyao Guo, Pavel Hubacek, Alon Rosen, Margarita Vald
Siyao Guo, Pavel Hubacek, Alon Rosen, Margarita Vald
The Complexity of Computing the Optimal Composition of Differential Privacy
Jack Murtagh, Salil Vadhan
Jack Murtagh, Salil Vadhan
Information-theoretic Local Non-malleable Codes and their Applications
Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman
Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
Yuval Ishai, Mor Weiss, Guang Yang
Yuval Ishai, Mor Weiss, Guang Yang
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS
HUI ZHAO, Kouichi Sakurai
HUI ZHAO, Kouichi Sakurai
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
Binyi Chen, Huijia Lin, Stefano Tessaro
Binyi Chen, Huijia Lin, Stefano Tessaro
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Chenglu Jin, Xiaolin Xu, Wayne Burleson, Ulrich Rührmair, Marten van Dijk
Chenglu Jin, Xiaolin Xu, Wayne Burleson, Ulrich Rührmair, Marten van Dijk
Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme
Jayaprakash Kar
Jayaprakash Kar
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem
Thuraya M. Qaradaghi, Newroz N. Abdulrazaq
Thuraya M. Qaradaghi, Newroz N. Abdulrazaq
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Thomas Peyrin, Yannick Seurin
Thomas Peyrin, Yannick Seurin
Verifiable Random Functions from Standard Assumptions
Dennis Hofheinz, Tibor Jager
Dennis Hofheinz, Tibor Jager
Reconfigurable Cryptography: A flexible approach to long-term security
Julia Hesse, Dennis Hofheinz, Andy Rupp
Julia Hesse, Dennis Hofheinz, Andy Rupp
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
Benny Applebaum, Pavel Raykov
Benny Applebaum, Pavel Raykov
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs
Gefei Li, Yuval Yarom, Damith C. Ranasinghe
Gefei Li, Yuval Yarom, Damith C. Ranasinghe
Homomorphic evaluation requires depth
Andrej Bogdanov, Chin Ho Lee
Andrej Bogdanov, Chin Ho Lee
The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle
Subhamoy Maitra
Subhamoy Maitra
ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM
Andreas Hülsing, Joost Rijneveld, Peter Schwabe
Andreas Hülsing, Joost Rijneveld, Peter Schwabe
The Number of Boolean Functions with Multiplicative Complexity 2
Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sonmez Turan
Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sonmez Turan
Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
Masahiro Yagisawa
Maturity and Performance of Programmable Secure Computation
David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen
David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen
Revisiting LEGOs: Optimizations, Analysis, and their Limit
Yan Huang, Ruiyu Zhu
Yan Huang, Ruiyu Zhu
Cryptanalysis of GGH15 Multilinear Maps
Jean-Sebastien Coron, Moon Sung Lee, Tancrede Lepoint, Mehdi Tibouchi
Jean-Sebastien Coron, Moon Sung Lee, Tancrede Lepoint, Mehdi Tibouchi
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound
Selcuk Kavut, Subhamoy Maitra
Selcuk Kavut, Subhamoy Maitra
CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
Britta Hale, Christopher Carr, Danilo Gligoroski
Britta Hale, Christopher Carr, Danilo Gligoroski
Real time detection of cache-based side-channel attacks using Hardware Performance Counters
Marco Chiappetta, Erkay Savas, Cemal Yilmaz
Marco Chiappetta, Erkay Savas, Cemal Yilmaz
The Ultimate Transposition Cipher (UTC)
Gideon Samid
Gideon Samid
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs
Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs
Secure Dating with Four or Fewer Cards
Antonio Marcedone, Zikai Wen, Elaine Shi
Antonio Marcedone, Zikai Wen, Elaine Shi
SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N. Tsypyschev
Vadim N. Tsypyschev
The Energy Budget for Wireless Security: Extended Version
Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3
Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska
Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case
Taechan Kim, Razvan Barbulescu
Taechan Kim, Razvan Barbulescu
Hardness Estimation of LWE via Band Pruning
Yoshinori Aono, Le Trieu Phong, Lihua Wang
Yoshinori Aono, Le Trieu Phong, Lihua Wang
PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers
Dieter Schmidt
Dieter Schmidt
Parallel Implementation of Number Theoretic Transform
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Taehwan Park, Howon Kim
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Taehwan Park, Howon Kim
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
Recent progress on the elliptic curve discrete logarithm problem
Steven D. Galbraith, Pierrick Gaudry
Steven D. Galbraith, Pierrick Gaudry
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
Katsuyuki Takashima
Katsuyuki Takashima
Attacking the Network Time Protocol
Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg
Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg
Speed-Security Tradeoffs in Blockchain Protocols
Aggelos Kiayias, Giorgos Panagiotakos
Aggelos Kiayias, Giorgos Panagiotakos
A Riddle Wrapped in an Enigma
Neal Koblitz, Alfred J. Menezes
Neal Koblitz, Alfred J. Menezes
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai
Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai
One-Key Compression Function Based MAC with Security beyond Birthday Bound
Avijit Dutta, Mridul Nandi, Goutam Paul
Avijit Dutta, Mridul Nandi, Goutam Paul
On Bitcoin as a public randomness source
Joseph Bonneau, Jeremy Clark, Steven Goldfeder
Joseph Bonneau, Jeremy Clark, Steven Goldfeder
Fast Fourier Orthogonalization
Léo Ducas, Thomas Prest
Léo Ducas, Thomas Prest
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol
Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan
Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan
Hierarchical Functional Encryption
Zvika Brakerski, Gil Segev
Zvika Brakerski, Gil Segev
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg, Payman Mohassel, Charalampos Papamanthou
Sanjam Garg, Payman Mohassel, Charalampos Papamanthou
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher, Benedikt Buenz, Joseph Bonneau, Jeremy Clark, Dan Boneh
Gaby G. Dagher, Benedikt Buenz, Joseph Bonneau, Jeremy Clark, Dan Boneh
How to Vote Privately Using Bitcoin
Zhichao Zhao, T-H. Hubert Chan
Zhichao Zhao, T-H. Hubert Chan
Confidential Benchmarking based on Multiparty Computation
Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang, Chik How Tan
Wenbin Zhang, Chik How Tan
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon, Ronald Rietman, Igor Shparlinski, Ludo Tolhuizen
Oscar Garcia-Morchon, Ronald Rietman, Igor Shparlinski, Ludo Tolhuizen
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal, Christian Kison, modg
Gunnar Alendal, Christian Kison, modg
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrege, Carine Therond
Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrege, Carine Therond
Factoring as a Service
Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger
Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
All or Nothing at All
Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson
Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson
Incremental Program Obfuscation
Sanjam Garg, Omkant Pandey
Sanjam Garg, Omkant Pandey
Multi-user Schnorr security, revisited
Daniel J. Bernstein
Daniel J. Bernstein
Updates on Sorting of Fully Homomorphic Encrypted Data
Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed
Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu
Daniel Apon, Xiong Fan, Feng-Hao Liu
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
Jinsu Kim, Sungwook Kim, Jae Hong Seo
Jinsu Kim, Sungwook Kim, Jae Hong Seo
Ed3363 (HighFive) -- An alternative Elliptic Curve
Mike Scott
Mike Scott
Encryption Switching Protocols
Geoffroy Couteau, Thomas Peters, David Pointcheval
Geoffroy Couteau, Thomas Peters, David Pointcheval
Fast Oblivious AES\\A dedicated application of the MiniMac protocol
Ivan Damgård, Rasmus Winther Zakarias
Ivan Damgård, Rasmus Winther Zakarias
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell, Ben Riva
Yehuda Lindell, Ben Riva
Bit Coincidence Mining Algorithm
Koh-ichi Nagao
Koh-ichi Nagao
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
Koh-ichi Nagao
Koh-ichi Nagao
Complexity of ECDLP under the First Fall Degree Assumption
Koh-ichi Nagao
Koh-ichi Nagao
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung, Craig Costello, Benjamin Smith
Ping Ngai Chung, Craig Costello, Benjamin Smith
A note on constructions of bent functions from involutions
Sihem Mesnager
Sihem Mesnager
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Ayantika Chatterjee, Indranil Sengupta
Ayantika Chatterjee, Indranil Sengupta
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan
Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan
The OPTLS Protocol and TLS 1.3
Hugo Krawczyk, Hoeteck Wee
Hugo Krawczyk, Hoeteck Wee
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³)
Michał Wroński
Michał Wroński
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Alex Biryukov, Léo Perrin
Alex Biryukov, Léo Perrin
Extended Functionality in Verifiable Searchable Encryption
James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
The Conjoined Microprocessor
Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin
Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha, Mridul Nandi
Ashwin Jha, Mridul Nandi
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval, Olivier Sanders, Jacques Traoré
David Pointcheval, Olivier Sanders, Jacques Traoré
Attacks on the Search-RLWE problem with small error
Hao Chen, Kristin E. Lauter, Katherine E. Stange
Hao Chen, Kristin E. Lauter, Katherine E. Stange
Multilinear Maps over the Integers Using Modulus Switching
Gu Chunsheng
Gu Chunsheng
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crepéau, Raza Ali Kazmi
Claude Crepéau, Raza Ali Kazmi
Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning
Gaëtan Leurent
Gaëtan Leurent
Freestart collision for full SHA-1
Marc Stevens, Pierre Karpman, Thomas Peyrin
Marc Stevens, Pierre Karpman, Thomas Peyrin
Vulnerabilities of ``McEliece in the World of Escher"
Dustin Moody, Ray Perlner
Dustin Moody, Ray Perlner
Private Genome Analysis through Homomorphic Encryption
Miran Kim, Kristin Lauter
Miran Kim, Kristin Lauter
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi, Lei Hu, Siwei Sun, Ling Song
Danping Shi, Lei Hu, Siwei Sun, Ling Song
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria
Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
Short Structure-Preserving Signatures
Essam Ghadafi
Essam Ghadafi
More Efficient Secure Outsourcing Methods for Bilinear Maps
Öznur Arabacı, Mehmet Sabir Kiraz, İsa Sertkaya, Osmanbey Uzunkol
Öznur Arabacı, Mehmet Sabir Kiraz, İsa Sertkaya, Osmanbey Uzunkol
Cryptanalysis of the Round-Reduced Kupyna Hash Function
Jian Zou, Le Dong
Jian Zou, Le Dong
Building Single-Key Beyond Birthday Bound Message Authentication Code
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
Delegating RAM Computations
Yael Tauman Kalai, Omer Paneth
Yael Tauman Kalai, Omer Paneth
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi, Tapas Pandit
Mridul Nandi, Tapas Pandit
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
Gaussian Sampling Precision in Lattice Cryptography
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
Nearly Optimal Robust Secret Sharing
Mahdi Cheraghchi
Mahdi Cheraghchi
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto, Junji Shikata
Shota Goto, Junji Shikata
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
A Provably Secure Short Signature Scheme from Coding Theory
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
Alex Biryukov, Dmitry Khovratovich
Alex Biryukov, Dmitry Khovratovich
Secure Set-based Policy Checking and Its Application to Password Registration
Changyu Dong, Franziskus Kiefer
Changyu Dong, Franziskus Kiefer
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
Palash Sarkar, Shashank Singh
Palash Sarkar, Shashank Singh
Sandy2x: New Curve25519 Speed Records
Tung Chou
Tung Chou
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth
Ben Smyth
Cryptanalysis of the New Multilinear Map over the Integers
Brice Minaud, Pierre-Alain Fouque
Brice Minaud, Pierre-Alain Fouque
Secure Association for the Internet of Things
Almog Benin, Sivan Toledo, Eran Tromer
Almog Benin, Sivan Toledo, Eran Tromer
A Decade of Lattice Cryptography
Chris Peikert
Chris Peikert
Lattice Based Cryptography for Beginners
Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim
Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity
Céline Blondeau, Kaisa Nyberg
Céline Blondeau, Kaisa Nyberg
Cryptanalysis of the New CLT Multilinear Maps
Jung Hee Cheon, Changmin Lee, Hansol Ryu
Jung Hee Cheon, Changmin Lee, Hansol Ryu
Cryptanalysis of Provably Secure Certicateless Short Signature Scheme
Jayaprakash Kar
Jayaprakash Kar
Using Tweaks To Design Fault Resistant Ciphers
Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay
Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel, Mike Rosulek, Ye Zhang
Payman Mohassel, Mike Rosulek, Ye Zhang
Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations
Antoine Joux, Cécile Pierrot
Antoine Joux, Cécile Pierrot
Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao, Sherman S. M. Chow
Yongjun Zhao, Sherman S. M. Chow
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
Hassan Noura, Damien Couroussé
Hassan Noura, Damien Couroussé
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N. Tsypyschev, Julia S. Vinogradova
Vadim N. Tsypyschev, Julia S. Vinogradova
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay
Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay
Localised Multisecret Sharing
Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Kwangsu Lee, Jong Hwan Park
Kwangsu Lee, Jong Hwan Park
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese, Antonio Faonio, Seny Kamara
Giuseppe Ateniese, Antonio Faonio, Seny Kamara
Privacy-preserving computation with trusted computing via Scramble-then-Compute
Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi
Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk
Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk
Private Proximity Testing on Steroids: An NTRU-based Protocol
Constantinos Patsakis, Panayiotis Kotzanikolaou, M ́elanie Bouroche
Constantinos Patsakis, Panayiotis Kotzanikolaou, M ́elanie Bouroche
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
Functional Signcryption: Notion, Construction, and Applications
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Extraction of intrinsic structure for Hardware Trojan detection
Maxime Lecomte, Jacques Fournier, Philippe Maurine
Maxime Lecomte, Jacques Fournier, Philippe Maurine
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin
Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Alonso González, Alejandro Hevia, Carla Ràfols
Alonso González, Alejandro Hevia, Carla Ràfols
On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink, Bart Preneel
Bart Mennink, Bart Preneel
Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen, Christian Rechberger
Martin M. Lauridsen, Christian Rechberger
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser, Yael Tauman Kalai
Shafi Goldwasser, Yael Tauman Kalai
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
Adnan Baysal, Suhap Sahin
Adnan Baysal, Suhap Sahin
Mapping the Intel Last-Level Cache
Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser
Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser
Almost-tight Identity Based Encryption against Selective Opening Attack
Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen
Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen
A Note on the Indifferentiability of the 10-Round Feistel Construction
Yannick Seurin
Yannick Seurin
Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques
Kexin Qiao, Lei Hu, Siwei Sun
Kexin Qiao, Lei Hu, Siwei Sun
A Unified Approach to MPC with Preprocessing using OT
Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl
Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl
New Results on Identity-based Encryption from Quadratic Residuosity
Ferucio Laurentiu Tiplea, Emil Simion
Ferucio Laurentiu Tiplea, Emil Simion
Privacy-preserving Attribute Based Searchable Encryption
Payal Chaudhari, Maniklal Das
Payal Chaudhari, Maniklal Das
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
Prosanta Gope
Prosanta Gope
Improved Attacks on Reduced-Round Camellia-128/192/256
Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
Rogue Decryption Failures: Reconciling AE Robustness Notions
Guy Barwell, Dan Page, Martijn Stam
Guy Barwell, Dan Page, Martijn Stam
Comparison of cube attacks over different vector spaces
Richard Winter, Ana Salagean, Raphael C. -W. Phan
Richard Winter, Ana Salagean, Raphael C. -W. Phan
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
Sébastien Canard, Viet Cuong Trinh
Sébastien Canard, Viet Cuong Trinh
MI-T-HFE, a New Multivariate Signature Scheme
Wenbin Zhang, Chik How Tan
Wenbin Zhang, Chik How Tan
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Anamaria Costache, Nigel P. Smart
Anamaria Costache, Nigel P. Smart
Tweak-Length Extension for Tweakable Blockciphers
Kazuhiko Minematsu, Tetsu Iwata
Kazuhiko Minematsu, Tetsu Iwata
Composable Security in the Tamper Proof Hardware Model under Minimal Complexity
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Applying Cryptographic Acceleration Techniques to Error Correction
Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion
Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion
A New Standard of Ukraine: The Kupyna Hash Function
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
Avijit Dutta, Goutam Paul
Avijit Dutta, Goutam Paul
Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks
Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy
Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy
Generic Security of NMAC and HMAC with Input Whitening
Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
Generic Efficient Dynamic Proofs of Retrievability
Mohammad Etemad, Alptekin Küpçü
Mohammad Etemad, Alptekin Küpçü
Computing information on domain parameters from public keys selected uniformly at random
Martin Ekerå
Martin Ekerå
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
Edward Eaton, Fang Song
Edward Eaton, Fang Song
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
Christophe Clavier, Julien Francq, Antoine Wurcker
Christophe Clavier, Julien Francq, Antoine Wurcker
10-Round Feistel is Indifferentiable from an Ideal Cipher
Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam
Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam
Bent and Semi-bent Functions via Linear Translators
Neşe Koçak, Sihem Mesnager, Ferruh Özbudak
Neşe Koçak, Sihem Mesnager, Ferruh Özbudak
Indifferentiability of 10-Round Feistel Networks
Yuanxi Dai, John Steinberger
Yuanxi Dai, John Steinberger
On the Diffusion Property of Iterated Functions
Jian Liu, Sihem Mesnager, Lusheng Chen
Jian Liu, Sihem Mesnager, Lusheng Chen
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
Photonic Side Channel Analysis of Arbiter PUFs
Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers
Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers
Gambling, Computational Information and Encryption Security
Mohammad Hajiabadi, Bruce M. Kapron
Mohammad Hajiabadi, Bruce M. Kapron
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
Optimally Secure Block Ciphers from Ideal Primitives
Stefano Tessaro
Stefano Tessaro
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
Graded Encoding, Variations on a Scheme
Shai Halevi
Shai Halevi
Card-based Cryptographic Protocols Using a Minimal Number of Cards
Alexander Koch, Stefan Walzer, Kevin Härtel
Alexander Koch, Stefan Walzer, Kevin Härtel
Encryption Performance Improvements of the Paillier Cryptosystem
Christine Jost, Ha Lam, Alexander Maximov, Ben Smeets
Christine Jost, Ha Lam, Alexander Maximov, Ben Smeets
Is There an Oblivious RAM Lower Bound?
Elette Boyle, Moni Naor
Elette Boyle, Moni Naor
Idealizing Identity-Based Encryption
Dennis Hofheinz, Christian Matt, Ueli Maurer
Dennis Hofheinz, Christian Matt, Ueli Maurer
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
Chun Guo, Dongdai Lin
Chun Guo, Dongdai Lin
Selective Opening Security for Receivers
Carmit Hazay, Arpita Patra, Bogdan Warinschi
Carmit Hazay, Arpita Patra, Bogdan Warinschi
Factor Base Discrete Logarithms in Kummer Extensions
Dianyan Xiao, Jincheng Zhuang, Qi Cheng
Dianyan Xiao, Jincheng Zhuang, Qi Cheng
Skipping the $q$ in Group Signatures
Olivier Blazy, Saqib A. Kakvi
Olivier Blazy, Saqib A. Kakvi
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Benjamin Fuller, Ariel Hamlin
Benjamin Fuller, Ariel Hamlin
MGR HASH FUNCTION
Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, B. K. Dass
Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, B. K. Dass
A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
GANESH YELLAPU
GANESH YELLAPU
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
Analysis of a key exchange protocol based on tropical matrix algebra
Matvei Kotov, Alexander Ushakov
Matvei Kotov, Alexander Ushakov
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Benoît Cogliati, Yannick Seurin
Benoît Cogliati, Yannick Seurin
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
Zhen Liu, Duncan S. Wong
Zhen Liu, Duncan S. Wong
Regulating the Pace of von Neumann Correctors
Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, Amaury de Wargny
Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, Amaury de Wargny
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Meltem Sonmez Turan, Rene Peralta
Meltem Sonmez Turan, Rene Peralta
Exploring Energy Efficiency of Lightweight Block Ciphers
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
Characterization of Secure Multiparty Computation Without Broadcast
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
Cryptanalysis of the Quadratic Zero-Testing of GGH
Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi
Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
David Derler, Daniel Slamanig
David Derler, Daniel Slamanig
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
Related-key Impossible Differential Analysis of Full Khudra
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
David Wong
David Wong
Offline Witness Encryption
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
Nicolas BRUNEAU, Sylvain GUILLEY, Zakaria NAJM, Yannick TEGLIA
Nicolas BRUNEAU, Sylvain GUILLEY, Zakaria NAJM, Yannick TEGLIA
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Benjamin Wesolowski, Pascal Junod
Benjamin Wesolowski, Pascal Junod
On near prime-order elliptic curves with small embedding degrees (Full version)
Duc-Phong Le, Nadia El Mrabet, Chik How Tan
Duc-Phong Le, Nadia El Mrabet, Chik How Tan
Authentication Using Side-Channel Information
Kazuo Sakiyama, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, Makoto Nagata
Kazuo Sakiyama, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, Makoto Nagata
Efficient Key Authentication Service for Secure End-to-end Communications
Mohammad Etemad, Alptekin Küpçü
Mohammad Etemad, Alptekin Küpçü
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
David McCann, Kerstin Eder, Elisabeth Oswald
David McCann, Kerstin Eder, Elisabeth Oswald
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk
Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1
Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
State-recovery analysis of Spritz
Ralph Ankele, Stefan Koelbl, Christian Rechberger
Ralph Ankele, Stefan Koelbl, Christian Rechberger
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Dario Catalano, Dario Fiore, Luca Nizzardo
Dario Catalano, Dario Fiore, Luca Nizzardo
The Emperor's New Password Creation Policies
Ding Wang, Ping Wang
Ding Wang, Ping Wang
Efficient Fully Structure-Preserving Signatures for Large Messages
Jens Groth
Jens Groth
Efficient (ideal) lattice sieving using cross-polytope LSH
Anja Becker, Thijs Laarhoven
Anja Becker, Thijs Laarhoven
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan, C. Pandu Rangan
Akshayaram Srinivasan, C. Pandu Rangan
A general framework for building noise-free homomorphic cryptosystems
Gérald Gavin
Gérald Gavin
Extended Nested Dual System Groups, Revisited
Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
Improving the Big Mac Attack on Elliptic Curve Cryptography
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
cuHE: A Homomorphic Encryption Accelerator Library
Wei Dai, Berk Sunar
Wei Dai, Berk Sunar
Secure Multiparty Computation of a Social Network
Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
Analysis of Keyless Massive MIMO-based Cryptosystem Security
Valery Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev
Valery Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev
On the Power of Hierarchical Identity-Based Encryption
Mohammad Mahmoody, Ameer Mohammed
Mohammad Mahmoody, Ameer Mohammed
CLKS: Certificateless Keyword Search on Encrypted Data
Qingji Zheng, Xiangxue Li, Aytac Azgin
Qingji Zheng, Xiangxue Li, Aytac Azgin
Revisiting Turning Online Cipher Off
Ritam Bhaumik, Mridul Nandi
Ritam Bhaumik, Mridul Nandi
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
Alex Biryukov, Léo Perrin, Aleksei Udovenko
Alex Biryukov, Léo Perrin, Aleksei Udovenko
Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
Chrysanthi Mavromati
Improved OR Composition of Sigma-Protocols
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
New Techniques for Electronic Voting
Alan Szepieniec, Bart Preneel
Alan Szepieniec, Bart Preneel
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare, Joseph Jaeger, Daniel Kane
Mihir Bellare, Joseph Jaeger, Daniel Kane
Fair Distributed Computation of Reactive Functions
Juan Garay, Björn Tackmann, Vassilis Zikas
Juan Garay, Björn Tackmann, Vassilis Zikas
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
A classification of elliptic curves with respect to the GHS attack in odd characteristic
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Sumit Chakraborty
Sumit Chakraborty
Statistical and Algebraic Properties of DES
Stian Fauskanger, Igor Semaev
Stian Fauskanger, Igor Semaev
Ciphertext-only attack on d*d Hill in O(d13^d)
Shahram Khazaei, Siavash Ahmadi
Shahram Khazaei, Siavash Ahmadi
Scalar Blinding on Elliptic Curves based on Primes with Special Structure
Scott Fluhrer
Scott Fluhrer
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
Jihoon Cho, Kyu Young Choi, Dukjae Moon
Jihoon Cho, Kyu Young Choi, Dukjae Moon
Secure Binary Field Multiplication
Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim
Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim
A Stateless Cryptographically-Secure Physical Unclonable Function
Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
What Security Can We Achieve within 4 Rounds?
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi
Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
Safe-Errors on SPA Protected implementations with the Atomicity Technique
Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
Algorithmic Information Theory for Obfuscation Security
Rabih Mohsen, Alexandre Miranda Pinto
Rabih Mohsen, Alexandre Miranda Pinto
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz, Vanishree Rao, Daniel Wichs
Dennis Hofheinz, Vanishree Rao, Daniel Wichs
On the Equivalence of Obfuscation and Multilinear Maps
Omer Paneth, Amit Sahai
Omer Paneth, Amit Sahai
On weak and strong 2^k-bent Boolean functions
Pantelimon Stanica
Pantelimon Stanica
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
Gangqiang Yang, Mark D. Aagaard, Guang Gong
Gangqiang Yang, Mark D. Aagaard, Guang Gong
Cracking-Resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
Backtracking-Assisted Multiplication
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto
Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto
Double-Speed Barrett Moduli
Rémi Géraud, Diana Maimut, David Naccache
Rémi Géraud, Diana Maimut, David Naccache
Threshold FlipThem: When the winner does not need to take all
David Leslie, Chris Sherfield, Nigel P. Smart
David Leslie, Chris Sherfield, Nigel P. Smart
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
Ivan Tjuawinata, Tao Huang, Hongjun Wu
Ivan Tjuawinata, Tao Huang, Hongjun Wu
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
Sergiu Bursuc
Twisted Hessian curves
Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
Multilinear Maps from Obfuscation
Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson
Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson
A Simple Scheme, for Strengthening Product-sum Type PKC
Masao KASAHARA
Masao KASAHARA
Modular Inversion Hidden Number Problem -- Correction and Improvements
Santanu Sarkar
Santanu Sarkar
Arithmetic Walsh Transform of Boolean Functions with Linear Structures
Qinglan Zhao, Dong Zheng, Xiangxue Li, Xiaoli Dong
Qinglan Zhao, Dong Zheng, Xiangxue Li, Xiaoli Dong
Functional Encryption for Turing Machines
Prabhanjan Ananth, Amit Sahai
Prabhanjan Ananth, Amit Sahai
Efficient MDS Diffusion Layers Through Decomposition of Matrices
S. M. Dehnavi, M. R. Mirzaee Shamsabad, A. Mahmoodi Rishakani, Y. Fekri Dabanloo
S. M. Dehnavi, M. R. Mirzaee Shamsabad, A. Mahmoodi Rishakani, Y. Fekri Dabanloo
Revisiting Prime Power RSA
Santanu Sarkar
Santanu Sarkar
Distinguishing a truncated random permutation from a random function
Shoni Gilboa, Shay Gueron
Shoni Gilboa, Shay Gueron
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
A SAT-based Public Key Cryptography Scheme
Sebastian E. Schmittner
Sebastian E. Schmittner
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
On the Hardness of Learning with Rounding over Small Modulus
Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Dual EC: A Standardized Back Door
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Victoria Fehr, Marc Fischlin
Victoria Fehr, Marc Fischlin
On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
Jincheng Zhuang, Qi Cheng
Jincheng Zhuang, Qi Cheng
Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef
Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
William Diehl
William Diehl
Investigating SRAM PUFs in large CPUs and GPUs
Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen
Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen
Cryptanalysis of Gu's ideal multilinear map
Alice Pellet-Mary, Damien Stehle
Alice Pellet-Mary, Damien Stehle
Ring-LWE Cryptography for the Number Theorist
Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
Matthias Hamann, Matthias Krause
Matthias Hamann, Matthias Krause
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
Yandong Zheng, Hua Guo
Revisiting TESLA in the quantum random oracle model
Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
Related-Key Attack on Full-Round PICARO
Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov, Gil Segev
Gilad Asharov, Gil Segev
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki, Daniel Wichs, Mark Zhandry
Ryo Nishimaki, Daniel Wichs, Mark Zhandry
Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich, Amir Moradi, Tim Güneysu
Pascal Sasdrich, Amir Moradi, Tim Güneysu
A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele, Pooya Farshim, Bertram Poettering
Jean Paul Degabriele, Pooya Farshim, Bertram Poettering
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du
Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du
A 2^{70} Attack on the Full MISTY1
Achiya Bar-On
Achiya Bar-On
Faster ECC over F2571 (feat. PMULL)
Hwajeong Seo
Hwajeong Seo
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
Ege Gulcan, Aydin Aysu, Patrick Schaumont
Ege Gulcan, Aydin Aysu, Patrick Schaumont
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Benoit Libert, Thomas Peters, Moti Yung
Benoit Libert, Thomas Peters, Moti Yung
A Matrix Decomposition Method for Optimal Normal Basis Multiplication
Can Kızılkale, Ömer Eǧecioǧlu, Çetin Kaya Koç
Can Kızılkale, Ömer Eǧecioǧlu, Çetin Kaya Koç
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
Predictable Arguments of Knowledge
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang
Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
Kazuhiko Minematsu
Kazuhiko Minematsu
New multilinear maps from ideal lattices
Gu Chunsheng
Gu Chunsheng
Solving LWE via List Decoding
Mingqiang Wang, Xiaoyun Wang, Kunxian Xia, Jincheng Zhuang
Mingqiang Wang, Xiaoyun Wang, Kunxian Xia, Jincheng Zhuang
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski, Mark Zhandry
Ilan Komargodski, Mark Zhandry
On the Security of Extended Generalized Feistel Networks
Manoj Kumar, Saibal K. Pal, Anupama Panigrahi
Manoj Kumar, Saibal K. Pal, Anupama Panigrahi
Fully Homomorphic Encryption on Octonion Ring
Masahiro Yagisawa
Masahiro Yagisawa
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
Same Value Analysis on Edwards Curves
Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza
Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza
Indistinguishability Obfuscation from Functional Encryption for Simple Functions
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
Prabhanjan Ananth, Abhishek Jain, Amit Sahai
Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks
Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas
Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas
DPA, Bitslicing and Masking at 1 GHz
Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede
Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede
Compositions of linear functions and applications to hashing
Vladimir Shpilrain, Bianca Sosnovski
Vladimir Shpilrain, Bianca Sosnovski
The self-blindable U-Prove scheme from FC'14 is forgeable
Eric Verheul, Sietse Ringers, Jaap-Henk Hoepman
Eric Verheul, Sietse Ringers, Jaap-Henk Hoepman
A masked ring-LWE implementation
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Cryptanalysis of Feistel Networks with Secret Round Functions
Alex Biryukov, Gaëtan Leurent, Léo Perrin
Alex Biryukov, Gaëtan Leurent, Léo Perrin
Oblivious Substring Search with Updates
Tarik Moataz, Erik-Oliver Blass
Tarik Moataz, Erik-Oliver Blass
KDM-Security via Homomorphic Smooth Projective Hashing
Hoeteck Wee
Hoeteck Wee
Output-Compressing Randomized Encodings and Applications
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
Consolidating masking schemes
Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
Efficient Asynchronous Accumulators for Distributed PKI
Leonid Reyzin, Sophia Yakoubov
Leonid Reyzin, Sophia Yakoubov
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
Linear Cryptanalysis of Reduced-Round SIMECK Variants
Nasour Bagheri
Nasour Bagheri
New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop, Susan Hohenberger, Brent Waters
Allison Bishop, Susan Hohenberger, Brent Waters
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
Masao KASAHARA
Masao KASAHARA
Light-hHB: A New Version of hHB with Improved Session Key Exchange
Ka Ahmad Khoureich
Ka Ahmad Khoureich
Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)
David Bernhard, Bogdan Warinschi, Ngoc Khanh Nguyen
David Bernhard, Bogdan Warinschi, Ngoc Khanh Nguyen
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
Anne Canteaut, Sébastien Duval, Gaëtan Leurent
Anne Canteaut, Sébastien Duval, Gaëtan Leurent
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Bernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos
Bernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa, Kari Kostiainen, Srdjan Capkun
Luka Malisa, Kari Kostiainen, Srdjan Capkun
Choosing Parameters for NTRUEncrypt
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Reconciling User Privacy and Implicit Authentication for Mobile Devices
Siamak F. Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa
Siamak F. Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa
A Brief Comparison of Simon and Simeck
Stefan Kölbl, Arnab Roy
Stefan Kölbl, Arnab Roy
Linear Overhead Optimally-resilient Robust MPC Using Preprocessing
Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
Indistinguishability Obfuscation: from Approximate to Exact
Nir Bitansky, Vinod Vaikuntanathan
Nir Bitansky, Vinod Vaikuntanathan
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare, Igors Stepanovs
Mihir Bellare, Igors Stepanovs
Demystifying incentives in the consensus computer
Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena
Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena
Differentially private instance-based noise mechanisms in practice
Sébastien Canard, Baptiste Olivier, Tony Quertier
Sébastien Canard, Baptiste Olivier, Tony Quertier
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Jimmy Jose, Dipanwita RoyChowdhury
Jimmy Jose, Dipanwita RoyChowdhury
FURISC: FHE Encrypted URISC Design
Ayantika Chatterjee, Indranil Sengupta
Ayantika Chatterjee, Indranil Sengupta
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
Subhamoy Maitra
Subhamoy Maitra
On the Security of a Self-healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
Yandong Zheng, Hua Guo
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Miguel Morales Sandoval, Arturo Diaz Perez
Miguel Morales Sandoval, Arturo Diaz Perez
Cliptography: Clipping the Power of Kleptographic Attacks
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
Foundations of Reactive Garbling Schemes
Jesper Buus Nielsen, Samuel Ranellucci
Jesper Buus Nielsen, Samuel Ranellucci
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Counting Keys in Parallel After a Side Channel Attack
Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam
Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam
Binary Field Multiplication on ARMv8
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
Classical Cryptographic Protocols in a Quantum World
Sean Hallgren, Adam Smith, Fang Song
Sean Hallgren, Adam Smith, Fang Song
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad faisal, Mahmood Ul Hassan
Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad faisal, Mahmood Ul Hassan
On the discrete logarithm problem in finite fields of fixed characteristic
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
A One-time Stegosystem and Applications to Efficient Covert Communication
Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
Security of Linear Secret-Sharing Schemes against Mass Surveillance
Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
Integral Cryptanalysis on Full MISTY1
Yosuke Todo
Yosuke Todo
ANONIZE: A Large-Scale Anonymous Survey System
Susan Hohenberger, Steven Myers, Rafael Pass, abhi shelat
Susan Hohenberger, Steven Myers, Rafael Pass, abhi shelat
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
Another Look at Normal Approximations in Cryptanalysis
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
Optimizing MAKWA on GPU and CPU
Thomas Pornin
Thomas Pornin
EdDSA for more curves
Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang
Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang
Quantum Cryptanalysis of NTRU
Scott Fluhrer
Scott Fluhrer
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou
Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
Roman Jagomägis, Peeter Laud, Alisa Pankova
Roman Jagomägis, Peeter Laud, Alisa Pankova
Decaf: Eliminating cofactors through point compression
Mike Hamburg
Mike Hamburg
Function-Hiding Inner Product Encryption
Allison Bishop, Abhishek Jain, Lucas Kowalczyk
Allison Bishop, Abhishek Jain, Lucas Kowalczyk
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
Peeter Laud, Alisa Pankova
Peeter Laud, Alisa Pankova
Smart Security Management in Secure Devices
Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj
Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
Muhammad Naveed
Muhammad Naveed
De Bruijn Sequences from Joining Cycles of Nonlinear Feedback Shift Registers
Ming Li, Cees J. A. Jansen, Dongdai Lin, Qiuyan Wang
Ming Li, Cees J. A. Jansen, Dongdai Lin, Qiuyan Wang
Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques
Huaifeng Chen, Xiaoyun Wang
Huaifeng Chen, Xiaoyun Wang
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
Romain Gay, Iordanis Kerenidis, Hoeteck Wee
Romain Gay, Iordanis Kerenidis, Hoeteck Wee
Secure Multi-Party Shuffling
Mahnush Movahedi, Jared Saia, Mahdi Zamani
Mahnush Movahedi, Jared Saia, Mahdi Zamani
Analyzing the Efficiency of Biased-Fault Based Attacks
Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
Ryutaroh Matsumoto
Ryutaroh Matsumoto
Cryptanalysis of a modern rotor machine in a multicast setting
Shane Kepley, David Russo, Rainer Steinwandt
Shane Kepley, David Russo, Rainer Steinwandt
A Hybrid Gaussian Sampler for Lattices over Rings
Léo Ducas, Thomas Prest
Léo Ducas, Thomas Prest
Diversity and Transparency for ECC
Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå
Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå
Single-Cycle Implementations of Block Ciphers
Pieter Maene, Ingrid Verbauwhede
Pieter Maene, Ingrid Verbauwhede
Randomizing the Montgomery Powering Ladder
Duc-Phong Le, Chik How Tan, Michael Tunstall
Duc-Phong Le, Chik How Tan, Michael Tunstall
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Ruhul Amin, G. P. Biswas
Ruhul Amin, G. P. Biswas
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng
Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng
Homomorphic Signature Schemes - A survey
Giulia Traverso, Denise Demirel, Johannes Buchmann
Giulia Traverso, Denise Demirel, Johannes Buchmann
Modelling ciphersuite and version negotiation in the TLS protocol
Benjamin Dowling, Douglas Stebila
Benjamin Dowling, Douglas Stebila
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller
Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller
A New Encryption Standard of Ukraine: The Kalyna Block Cipher
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov
On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard, Marc Fischlin, Bogdan Warinschi
David Bernhard, Marc Fischlin, Bogdan Warinschi
Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard, Marc Fischlin, Bogdan Warinschi
David Bernhard, Marc Fischlin, Bogdan Warinschi
Efficient ephemeral elliptic curve cryptographic keys
Andrea Miele, Arjen K. Lenstra
Andrea Miele, Arjen K. Lenstra
Decomposition attack on SASASASAS
Alex Biryukov, Dmitry Khovratovich
Alex Biryukov, Dmitry Khovratovich
New Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard
Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard
The Pythia PRF Service
Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart
Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart
Short Accountable Ring Signatures Based on DDH
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
A New Partial Key Exposure Attack on Multi-power RSA
Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol
Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li, Licheng Wang
Jing Li, Licheng Wang
Very-efficient simulatable flipping of many coins into a well
Luís T. A. N. Brandão
Luís T. A. N. Brandão
Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings
Hao Chen
Hao Chen
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta
Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta
A Novel Cyberspace-Oriented Access Control Model
Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan
Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan
On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks
Matthias Hamann, Matthias Krause
Matthias Hamann, Matthias Krause
Microcash: Efficient Off-Line Small Payments
Chris Pavlovski, Colin Boyd
Chris Pavlovski, Colin Boyd
Phasing: Private Set Intersection using Permutation-based Hashing
Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner
Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji
Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias
Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias
Unconditionally Secure Computation with Reduced Interaction
Ivan Damgård, Jesper Buus Nielsen, Rafail Ostovsky, Adi Rosen
Ivan Damgård, Jesper Buus Nielsen, Rafail Ostovsky, Adi Rosen
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer
Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer
On Necessary Padding with IO
Justin Holmgren
Justin Holmgren
Practical Round-Optimal Blind Signatures in the Standard Model
Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Ed448-Goldilocks, a new elliptic curve
Mike Hamburg
Mike Hamburg
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
Abdelkarim Cherkaoui, Lilian Bossuet, Cédric Marchand
Abdelkarim Cherkaoui, Lilian Bossuet, Cédric Marchand
Random Digit Representation of Integers
Nicolas Méloni, M. Anwar Hasan
Nicolas Méloni, M. Anwar Hasan
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Sarani Bhattacharya, Debdeep Mukhopadhyay
Sarani Bhattacharya, Debdeep Mukhopadhyay
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
Susumu Kiyoshima
Susumu Kiyoshima
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Seher Tutdere, Osmanbey Uzunkol
Seher Tutdere, Osmanbey Uzunkol
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas
Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas
Generalised tally-based decoders for traitor tracing and group testing
Boris Skoric, Wouter de Groot
Boris Skoric, Wouter de Groot
The leaking battery: A privacy analysis of the HTML5 Battery Status API
Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Diaz
Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Diaz
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati
Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
Fangguo Zhang
Fangguo Zhang
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei
Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei
The Simeck Family of Lightweight Block Ciphers
Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong
Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Shijun Zhao, Qianying Zhang
Shijun Zhao, Qianying Zhang
McBits: fast constant-time code-based cryptography
Daniel J. Bernstein, Tung Chou, Peter Schwabe
Daniel J. Bernstein, Tung Chou, Peter Schwabe
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
Igor Semaev
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Shweta Agrawal, Benoit Libert, Damien Stehle
Shweta Agrawal, Benoit Libert, Damien Stehle
Netcoin - A Traceable P2P Electronic Cash System
Hitesh Tewari, Eamon O Nuallain
Hitesh Tewari, Eamon O Nuallain
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
Steven D. Galbraith, Ping Wang, Fangguo Zhang
Steven D. Galbraith, Ping Wang, Fangguo Zhang
Structure-Preserving Signatures from Standard Assumptions, Revisited
Eike Kiltz, Jiaxin Pan, Hoeteck Wee
Eike Kiltz, Jiaxin Pan, Hoeteck Wee
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Claude Carlet, Sylvain Guilley
Claude Carlet, Sylvain Guilley
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhay
Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhay
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
Mei Wang, Zheng Yuan, Xiao Feng
Mei Wang, Zheng Yuan, Xiao Feng
Predictive Models for Min-Entropy Estimation
John Kelsey, Kerry A. McKay, Meltem Sonmez Turan
John Kelsey, Kerry A. McKay, Meltem Sonmez Turan
The Chain Rule for HILL Pseudoentropy, Revisited
Krzysztof Pietrzak, Maciej Skorski
Krzysztof Pietrzak, Maciej Skorski
Combining Differential Privacy and Secure Multiparty Computation
Martin Pettai, Peeter Laud
Martin Pettai, Peeter Laud
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi, Alexander Wild
Amir Moradi, Alexander Wild
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
Differential Fault Intensity Analysis
Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa Taha, Patrick Schaumont
Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa Taha, Patrick Schaumont
Disk Encryption: Do We Need to Preserve Length?
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
A Physical Approach for Stochastic Modeling of TERO-based TRNG
Patrick HADDAD, Viktor FISCHER, Florent BERNARD, Jean NICOLAI
Patrick HADDAD, Viktor FISCHER, Florent BERNARD, Jean NICOLAI
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
How much randomness can be extracted from memoryless Shannon entropy sources?
Maciej Skorski
Maciej Skorski
TriviA: A Fast and Secure Authenticated Encryption Scheme
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
A. -M. Leventi-Peetz, J. -V. Peetz
A. -M. Leventi-Peetz, J. -V. Peetz
An analysis of the $C$ class of bent functions
Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic
Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Trupil Limbasiya, Nishant Doshi
Trupil Limbasiya, Nishant Doshi
SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
Yuan Zhang, Chunxiang Xu, Shui Yu, Hongwei Li, Xiaojun Zhang
Yuan Zhang, Chunxiang Xu, Shui Yu, Hongwei Li, Xiaojun Zhang
SIMON and SPECK: Block Ciphers for the Internet of Things
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Denise Demirel, Jean Lancrenon
Denise Demirel, Jean Lancrenon
Secure Key Generation from Biased PUFs
Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems
Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru
Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
Chris Brzuska, Arno Mittelbach
Chris Brzuska, Arno Mittelbach
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
Mridul Nandi
Mridul Nandi
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
Twist Insecurity
Manfred Lochter, Andreas Wiemers
Manfred Lochter, Andreas Wiemers
The Carnac protocol -- or how to read the contents of a sealed envelope
Michael Scott, Brian Spector
Michael Scott, Brian Spector
Known-key Distinguisher on Full PRESENT
Céline Blondeau, Thomas Peyrin, Lei Wang
Céline Blondeau, Thomas Peyrin, Lei Wang
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
Last fall degree, HFE, and Weil descent attacks on ECDLP
Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo
Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo
On Public Key Encryption from Noisy Codewords
Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, Noga ron-Zewi
Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, Noga ron-Zewi
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version
Tobias Schneider, Amir Moradi, Tim Güneysu
Tobias Schneider, Amir Moradi, Tim Güneysu
Constant Communication ORAM with Small Blocksize
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
Cryptanalysis of Reduced-Round Whirlwind (Full Version)
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
Henri Gilbert, Jérôme Plût, Joana Treger
Henri Gilbert, Jérôme Plût, Joana Treger
A Framework for Identity-Based Encryption with Almost Tight Security
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello, Patrick Longa
Craig Costello, Patrick Longa
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan, Ilia Lebedev, Srinivas Devadas
Victor Costan, Ilia Lebedev, Srinivas Devadas
Privacy in the Genomic Era
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
PUDA – Privacy and Unforgeability for Data Aggregation
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J. Longo, E. De Mulder, D. Page, M. Tunstall
J. Longo, E. De Mulder, D. Page, M. Tunstall
Generic Construction of UC-Secure Oblivious Transfer
Olivier Blazy, Céline Chevalier
Olivier Blazy, Céline Chevalier
Concurrent Secure Computation with Optimal Query Complexity
Ran Canetti, Vipul Goyal, Abhishek Jain
Ran Canetti, Vipul Goyal, Abhishek Jain
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Takanori Isobe, Kyoji Shibutani
Takanori Isobe, Kyoji Shibutani
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede
Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Tapas Pandit, Sumit Kumar Pandey, Rana Barua
Tapas Pandit, Sumit Kumar Pandey, Rana Barua
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
Round-Optimal Black-Box Two-Party Computation
Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro
Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner, Pierre-Alain Fouque
Paul Kirchner, Pierre-Alain Fouque
Quantum homomorphic encryption for circuits of low $T$-gate complexity
Anne Broadbent, Stacey Jeffery
Anne Broadbent, Stacey Jeffery
Upending Stock Market Structure Using Secure Multi-Party Computation
Charanjit S. Jutla
Charanjit S. Jutla
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
Amir Hassani Karbasi, Reza Ebrahimi Atani
Amir Hassani Karbasi, Reza Ebrahimi Atani
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
Secure Computation of MIPS Machine Code
Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz
Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz
Actively Secure OT Extension with Optimal Overhead
Marcel Keller, Emmanuela Orsini, Peter Scholl
Marcel Keller, Emmanuela Orsini, Peter Scholl
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing
Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing
Alternative cubics' rules with an algebraic appeal
Daniel R. L. Brown
Daniel R. L. Brown
Bloom Filters in Adversarial Environments
Moni Naor, Eylon Yogev
Moni Naor, Eylon Yogev
Improved Side-Channel Analysis of Finite-Field Multiplication
Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff
Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink, Reza Reyhanitabar, Damian Vizár
Bart Mennink, Reza Reyhanitabar, Damian Vizár
PICO: An Ultra lightweight and Low power encryption design for pervasive computing
Gaurav Bansod, Narayan Pisharoty, Abhijit Patil
Gaurav Bansod, Narayan Pisharoty, Abhijit Patil
Tweaking Even-Mansour Ciphers
Benoît Cogliati, Rodolphe Lampe, Yannick Seurin
Benoît Cogliati, Rodolphe Lampe, Yannick Seurin
Pairing Based Mutual Healing in Wireless Sensor Networks
Sarita Agrawal, Jay Patel, Manik Lal Das
Sarita Agrawal, Jay Patel, Manik Lal Das
Towards Easy Leakage Certification
François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
François Durvaux, François-Xavier Standaert
François Durvaux, François-Xavier Standaert
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso, François-Xavier Standaert
Vincent Grosso, François-Xavier Standaert
Problems, solutions and experience of the first international student's Olympiad in cryptography
Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeria Vitkup
Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeria Vitkup
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
Xiaoshuang Ma, Kexin Qiao
Xiaoshuang Ma, Kexin Qiao
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
Mohammad Hajiabadi, Bruce M. Kapron
Mohammad Hajiabadi, Bruce M. Kapron
Practical Free-Start Collision Attacks on 76-step SHA-1
Pierre Karpman, Thomas Peyrin, Marc Stevens
Pierre Karpman, Thomas Peyrin, Marc Stevens
Power Analysis Attacks against IEEE 802.15.4 Nodes
Colin O'Flynn, Zhizhang Chen
Colin O'Flynn, Zhizhang Chen
SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall, Elisabeth Oswald
Carolyn Whitnall, Elisabeth Oswald
Generic Key Recovery Attack on Feistel Scheme
Takanori Isobe, Kyoji Shibutani
Takanori Isobe, Kyoji Shibutani
Short Randomizable Signatures
David Pointcheval, Olivier Sanders
David Pointcheval, Olivier Sanders
Secure Key Exchange Protocol based on Virtual Proof of Reality
Yansong Gao
Yansong Gao
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
Anja Becker, Nicolas Gama, Antoine Joux
Anja Becker, Nicolas Gama, Antoine Joux
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
Sergey Gorbunov, Silvio Micali
Sergey Gorbunov, Silvio Micali
A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
Yongge Wang
Yongge Wang
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
Ren Zhang, Bart Preneel
Ren Zhang, Bart Preneel
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Key-Recovery Attacks on ASASA
Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, and Brent Waters
Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, and Brent Waters
Computing Individual Discrete Logarithms Faster in $GF(p^n)$
Aurore Guillevic
Aurore Guillevic
Key Extraction from the Primary Side of a Switched-Mode Power Supply
Sami Saab, Andrew Leiserson, Michael Tunstall
Sami Saab, Andrew Leiserson, Michael Tunstall
Near Collision Side Channel Attacks
Baris Ege, Thomas Eisenbarth, Lejla Batina
Baris Ege, Thomas Eisenbarth, Lejla Batina
Equivoe-T: Transposition Equivocation Cryptography
Gideon Samid
Gideon Samid
A flaw in a theorem about Schnorr signatures
Daniel R. L. Brown
Daniel R. L. Brown
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra
Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra
Decomposing the ASASA Block Cipher Construction
Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander
Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander
Strong Non-Interference and Type-Directed Higher-Order Masking
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini
The Tower Number Field Sieve
Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
The Iterated Random Permutation Problem with Applications to Cascade Encryption
Brice Minaud, Yannick Seurin
Brice Minaud, Yannick Seurin
The Norwegian Internet Voting Protocol: A new Instantiation
Kristian Gjøsteen, Anders Smedstuen Lund
Kristian Gjøsteen, Anders Smedstuen Lund
Centrally Banked Cryptocurrencies
George Danezis, Sarah Meiklejohn
George Danezis, Sarah Meiklejohn
Multi-Prover Commitments Against Non-Signaling Attacks
Serge Fehr, Max Fillinger
Serge Fehr, Max Fillinger
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello, Christophe Giraud
Alberto Battistello, Christophe Giraud
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
Dennis Hofheinz
Dennis Hofheinz
Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Jiajun Zhang, Haining Fan
Jiajun Zhang, Haining Fan
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
Zhangxiang Hu, Payman Mohassel, Mike Rosulek
Zhangxiang Hu, Payman Mohassel, Mike Rosulek
Quantifying Location Privacy Leakage from Transaction Prices
Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
Improving algebraic attacks on stream ciphers based on linear feedback shifter registers over $F_{2^k}$
Sondre Rønjom
Sondre Rønjom
Cryptanalysis of the LSH and SHA-V Hash Functions
Yonglin Hao, Hongbo Yu
Yonglin Hao, Hongbo Yu
Fault Tolerant Infective Countermeasure for AES
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Vincent Grosso, François-Xavier Standaert, Sebastian Faust
Vincent Grosso, François-Xavier Standaert, Sebastian Faust
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa
Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Sonam Devgan Kaul, Amit K. Awasthi
Sonam Devgan Kaul, Amit K. Awasthi
Scalable and private media consumption with Popcorn
Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish
Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish
On Black-Box Complexity of Universally Composable Security in the CRS model
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, Cas Cremers
Jiangshan Yu, Mark Ryan, Cas Cremers
Turning Online Ciphers Off
Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam
Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam
More Rounds, Less Security?
Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolić
Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolić
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai, Adeline Langlois, Tancrëde Lepoint, Amin Sakzad, Damien Stehle, Ron Steinfeld
Shi Bai, Adeline Langlois, Tancrëde Lepoint, Amin Sakzad, Damien Stehle, Ron Steinfeld
How to build time-lock encryption
Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
Theodosis Mourouzis, Guangyan Song, Nicolas Courtois, Michalis Christofii
Theodosis Mourouzis, Guangyan Song, Nicolas Courtois, Michalis Christofii
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
How to Build Time-Lock Encryption
Tibor Jager
Tibor Jager
Authentication Key Recovery on Galois Counter Mode (GCM)
John Mattsson and Magnus Westerlund
John Mattsson and Magnus Westerlund
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Bart Mennink
Bart Mennink
Randomizing scalar multiplication using exact covering systems of congruences
Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
Fully Homomorphic Encryption without bootstrapping
Masahiro Yagisawa
Masahiro Yagisawa
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
Mehak Khurana, Meena Kumari
Mehak Khurana, Meena Kumari
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
On the power of Public-key Functional Encryption with Function Privacy
Vincenzo Iovino, Qiang Tang, Karol Żebrowski
Vincenzo Iovino, Qiang Tang, Karol Żebrowski
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
Andrew Miller, Rob Jansen
Andrew Miller, Rob Jansen
Practical Fully Homomorphic Encryption without Noise Reduction
Dongxi Liu
Dongxi Liu
The Oblivious Machine - or: How to Put the C into MPC
Marcel Keller
Marcel Keller
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
Zhou Tanping, Yang Xiaoyuan, Zhang Wei, Wu Liqiang
Zhou Tanping, Yang Xiaoyuan, Zhang Wei, Wu Liqiang
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Hwajeong Seo, Zhe Liu, Johann Groschadl, Howon Kim
Hwajeong Seo, Zhe Liu, Johann Groschadl, Howon Kim
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Florian Tschorsch, Björn Scheuermann
Florian Tschorsch, Björn Scheuermann
Multilinear Maps Using Random Matrix
Gu Chunsheng
Gu Chunsheng
Accelerating SWHE based PIRs using GPUs
Wei Dai, Yarkın Doröz, Berk Sunar
Wei Dai, Yarkın Doröz, Berk Sunar
Approximate Algorithms on Lattices with Small Determinant
Jung Hee Cheon, Changmin Lee
Jung Hee Cheon, Changmin Lee
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, Elaine Shi
Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, Elaine Shi
New Observation on Division Property
Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang
Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang
A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
Sheena Sathyan, Shaji R S
Sheena Sathyan, Shaji R S
Generic Conversions from CPA to CCA secure Functional Encryption
Mridul Nandi, Tapas Pandit
Mridul Nandi, Tapas Pandit
Collateral damage of Facebook Apps: an enhanced privacy scoring model
Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel
Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu, N. Asokan, Benny Pinkas
Jian Liu, N. Asokan, Benny Pinkas
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
An Optimization of Gu Map-1
Yupu Hu, Huiwen Jia
Yupu Hu, Huiwen Jia
Masks will Fall Off -- Higher-Order Optimal Distinguishers
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Sihong Su, Xiaohu Tang
Sihong Su, Xiaohu Tang
Adaptively Secure Computation with Partial Erasures
Carmit Hazay, Yehuda Lindell, Arpita Patra
Carmit Hazay, Yehuda Lindell, Arpita Patra
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu
Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu
A Comment on Gu Map-1
Yupu Hu, Huiwen Jia
Yupu Hu, Huiwen Jia
A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede
Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede
On the Amortized Complexity of Zero-knowledge Protocols
Ronald Cramer, Ivan Damgård, Marcel Keller
Ronald Cramer, Ivan Damgård, Marcel Keller
XLS is not a Strong Pseudorandom Permutation
Mridul Nandi
Mridul Nandi
Revisiting Security Claims of XLS and COPA
Mridul Nandi
Mridul Nandi
Security Evaluation and Enhancement of Bistable Ring PUFs
Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne Burleson
Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne Burleson
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Devu Manikantan Shila, Vivek Venugopalan, Cameron D Patterson
Devu Manikantan Shila, Vivek Venugopalan, Cameron D Patterson
Message-Locked Encryption for Lock-Dependent Messages
Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
On Concurrently Secure Computation in the Multiple Ideal Query Model
Vipul Goyal, Abhishek Jain
Vipul Goyal, Abhishek Jain
A Hybrid Approach for Proving Noninterference of Java Programs
Ralf Kuesters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr
Ralf Kuesters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr
A Note on the Unsoundness of vnTinyRAM's SNARK
Bryan Parno
Bryan Parno
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
On the (Fast) Algebraic Immunity of Boolean Power Functions
Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
Dickson Polynomials that are Involutions
Pascale Charpin, Sihem Mesnager, Sumanta Sarkar
Pascale Charpin, Sihem Mesnager, Sumanta Sarkar
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu
Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu
Non-Repudiable Proofs of Storage in Cloud
Hongyuan Wang, Liehuang Zhu, Yijia Lilong, Chang Xu
Hongyuan Wang, Liehuang Zhu, Yijia Lilong, Chang Xu
Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
Alex Biryukov, Daniel Dinu, Dmitry Khovratovich
Alex Biryukov, Daniel Dinu, Dmitry Khovratovich
Cryptanalysis of Round-Reduced LED
Ivica Nikolić, Lei Wang, Shuang Wu
Ivica Nikolić, Lei Wang, Shuang Wu
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic, Samuel Neves
Philipp Jovanovic, Samuel Neves
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava, Ken Mai
Mudit Bhargava, Ken Mai
Complementing Feistel Ciphers
Alex Biryukov, Ivica Nikolic
Alex Biryukov, Ivica Nikolic
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse, Ingo von Maurich, Tim Güneysu
Stefan Heyse, Ingo von Maurich, Tim Güneysu
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede
Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Marina Blanton, Fattaneh Bayatbabolghani
Marina Blanton, Fattaneh Bayatbabolghani
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede
Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede
What Information is Leaked under Concurrent Composition?
Vipul Goyal, Divya Gupta, Abhishek Jain
Vipul Goyal, Divya Gupta, Abhishek Jain
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani B. Srivastava
Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani B. Srivastava
Optimized Interpolation Attacks on LowMC
Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun, Mark Zhandry
Mark Bun, Mark Zhandry
HETest: A Homomorphic Encryption Testing Framework
Mayank Varia, Sophia Yakoubov, Yang Yang
Mayank Varia, Sophia Yakoubov, Yang Yang
STRIBOB / WHIRLBOB Security Analysis Addendum
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Mridul Nandi
Mridul Nandi
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal, Melissa Chase
Shashank Agrawal, Melissa Chase
The Birth of Cryptographic Obfuscation -- A Survey
Máté Horváth, Levente Buttyán
Máté Horváth, Levente Buttyán
Side-Channel Analysis of MAC-Keccak Hardware Implementations
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser
Efficient Ring-LWE Encryption on 8-bit AVR Processors
Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
Jie Chen, Romain Gay, Hoeteck Wee
Jie Chen, Romain Gay, Hoeteck Wee
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
Franck Rondepierre
Franck Rondepierre
Higher-Order Cryptanalysis of LowMC
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Cryptography for Parallel RAM from Indistinguishability Obfuscation
Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou
Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder
Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder
Zero-Knowledge Accumulators and Set Operations
Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos
Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos
Sequential Secret Sharing as a New Hierarchical Access Structure
Mehrdad Nojoumian, Douglas R. Stinson
Mehrdad Nojoumian, Douglas R. Stinson
Success through confidence: Evaluating the effectiveness of a side-channel attack
Adrian Thillard, Emmanuel Prouff, Thomas Roche
Adrian Thillard, Emmanuel Prouff, Thomas Roche
Simple Chosen-Ciphertext Security from Low-Noise LPN
Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
Stephen R. Tate, Roopa Vishwanathan
Stephen R. Tate, Roopa Vishwanathan
New attacks on RSA with Moduli $N=p^rq$
Abderrahmane Nitaj, Tajjeeddine Rachidi
Abderrahmane Nitaj, Tajjeeddine Rachidi
Factoring RSA moduli with weak prime factors
Abderrahmane Nitaj, Tajjeeddine Rachidi
Abderrahmane Nitaj, Tajjeeddine Rachidi
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi, Jooyoung Lee, Yannick Seurin, John Steinberger, Stefano Tessaro
Peter Gazi, Jooyoung Lee, Yannick Seurin, John Steinberger, Stefano Tessaro
Generalizing Homomorphic MACs for Arithmetic Circuits
Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo
Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
Biclique cryptanalysis of MIBS-80 and PRESENT-80
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba
Forgery Attacks on round-reduced ICEPOLE-128
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
On the Communication Complexity of Secure Computation
Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
Dual System Encryption Framework in Prime-Order Groups
Nuttapong Attrapadung
Nuttapong Attrapadung
Keccak
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
Succinct Garbled RAM
Ran Canetti, Justin Holmgren
Ran Canetti, Justin Holmgren
Method to Protect Passwords in Databases for Web Applications
Scott Contini
Scott Contini
Privately Evaluating Decision Trees and Random Forests
David J. Wu, Tony Feng, Michael Naehrig, Kristin Lauter
David J. Wu, Tony Feng, Michael Naehrig, Kristin Lauter
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas
Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas
Condensed Unpredictability
Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak
Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
Rafael Pass, abhi shelat
Rafael Pass, abhi shelat
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Sumit Chakraborty
Sumit Chakraborty
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
Céline Blondeau, Aslí Bay, Serge Vaudenay
Céline Blondeau, Aslí Bay, Serge Vaudenay
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
PAC Learning of Arbiter PUFs
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
Cluster Computing in Zero Knowledge
Alessandro Chiesa, Eran Tromer, Madars Virza
Alessandro Chiesa, Eran Tromer, Madars Virza
Cryptography from Post-Quantum Assumptions
Raza Ali Kazmi
Raza Ali Kazmi
Bounds on surmising remixed keys
Daniel R. L. Brown
Daniel R. L. Brown
On the Impossibility of Tight Cryptographic Reductions
Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
Publicly Verifiable Software Watermarking
Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan
Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan
Security Analysis of PRINCE
Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
Constant-Round MPC with Fairness and Guarantee of Output Delivery
S. Dov Gordon, Feng-Hao Liu, Elaine Shi
S. Dov Gordon, Feng-Hao Liu, Elaine Shi
Financial Cryptography: Discriminatory Pricing Mechanism
Sumit Chakraborty
Sumit Chakraborty
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Nir Bitansky, Omer Paneth
Nir Bitansky, Omer Paneth
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
Evgeny Sidorov
Evgeny Sidorov
Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
Achiya Bar-On
A random zoo: sloth, unicorn, and trx
Arjen K. Lenstra, Benjamin Wesolowski
Arjen K. Lenstra, Benjamin Wesolowski
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
Qiang Tang, Jun Wang
Qiang Tang, Jun Wang
Optimally Secure Tweakable Blockciphers
Bart Mennink
Bart Mennink
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem
Claude Crepeau, Raza Ali Kazmi
Claude Crepeau, Raza Ali Kazmi
Computationally binding quantum commitments
Dominique Unruh
Dominique Unruh
Achieving Differential Privacy with Bias-Control Limited Source
Yanqing Yao, Zhoujun Li
Yanqing Yao, Zhoujun Li
Higher-Order Side Channel Security and Mask Refreshing
Jean-Sebastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
Jean-Sebastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
On Generalized First Fall Degree Assumptions
Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi
Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi
A Group-theory Method to The Cycle Structures of Feedback Shift Registers
Ming Li, Yupeng Jiang, Dongdai Lin
Ming Li, Yupeng Jiang, Dongdai Lin
Succinct Randomized Encodings and their Applications
Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang
Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann
Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann
Matrix Computational Assumptions in Multilinear Groups
Paz Morillo, Carla Ràfols, Jorge L. Villar
Paz Morillo, Carla Ràfols, Jorge L. Villar
Broadcast from Minicast Secure Against General Adversaries
Pavel Raykov
Pavel Raykov
Database Outsourcing with Hierarchical Authenticated Data Structures
Mohammad Etemad, Alptekin Küpçü
Mohammad Etemad, Alptekin Küpçü
Improving Local Collisions: New Attacks on Reduced SHA-256
Florian Mendel, Tomislav Nad, Martin Schläffer
Florian Mendel, Tomislav Nad, Martin Schläffer
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
Chang Liu, Liehuang Zhu, Jinjun Chen
Chang Liu, Liehuang Zhu, Jinjun Chen
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar
Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar
Fault Analysis of Kuznyechik
Riham AlTawy, Onur Duman, Amr M. Youssef
Riham AlTawy, Onur Duman, Amr M. Youssef
End-to-End Verifiable Elections in the Standard Model∗
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Two Round Multiparty Computation via Multi-Key FHE
Pratyay Mukherjee, Daniel Wichs
Pratyay Mukherjee, Daniel Wichs
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Ryo Nishimaki, Daniel Wichs
Ryo Nishimaki, Daniel Wichs
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe
Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe
Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
Gilad Asharov, Gil Segev
Gilad Asharov, Gil Segev
A New Distinguisher on Grain v1 for 106 rounds
Santanu Sarkar
Santanu Sarkar
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen
Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen
Cryptanalysis of a fair anonymity for the tor network
Amadou Moctar Kane
Amadou Moctar Kane
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
Arithmetic Cryptography
Benny Applebaum, Jonathan Avron, Chris Brzuska
Benny Applebaum, Jonathan Avron, Chris Brzuska
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
On the Correlation Intractability of Obfuscated Pseudorandom Functions
Ran Canetti, Yilei Chen, Leonid Reyzin
Ran Canetti, Yilei Chen, Leonid Reyzin
Nearly Optimal Verifiable Data Streaming (Full Version)
Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger
Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger
Security Intelligence for Broadcast : Threat Analytics
Sumit Chakraborty
Sumit Chakraborty
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Megha Agrawal, Donghoon Chang, Somitra Sanadhya
Megha Agrawal, Donghoon Chang, Somitra Sanadhya
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
PAGES - A Family of Block Ciiphers
Dieter Schmidt
Dieter Schmidt
Strongly Secure Authenticated Key Exchange from Ideal Lattices
Xiaopeng Yang, Wenping Ma
Xiaopeng Yang, Wenping Ma
Some results on Sprout
Subhadeep Banik
Subhadeep Banik
Cryptanalysis of an Authenticated Image Encryption Scheme Based on Chaotic Maps and Memory Cellular Automata
Saeideh Kabirirad, Hamideh Hajiabadi
Saeideh Kabirirad, Hamideh Hajiabadi
Secure Multi-Party Computation with Identifiable Abort
Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
Divesh Aggarwal, Alexander Golovnev
Divesh Aggarwal, Alexander Golovnev
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
Peeter Laud, Alisa Pankova
Peeter Laud, Alisa Pankova
Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
Paolo D'Arco, Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Clauido Soriente
Paolo D'Arco, Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Clauido Soriente
Hybrid Publicly Verifiable Computation
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
Point Decomposition Problem in Binary Elliptic Curves
Koray Karabina
Koray Karabina
Practical Divisible E-Cash
Patrick Märtens
Patrick Märtens
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
Non-malleability under Selective Opening Attacks: Implication and Separation
Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
Query-Complexity Amplification for Random Oracles
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Certificate-Based Encryption Resilient to Key Leakage
Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang
Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev
Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
Pierre-Alain Fouque, Thomas Vannet
Pierre-Alain Fouque, Thomas Vannet
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
New algorithm for the discrete logarithm problem on elliptic curves
Igor Semaev
Igor Semaev
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
Authenticated Key Exchange over Bitcoin
Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao
Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao
Black-Box Garbled RAM
Sanjam Garg, Steve Lu, Rafail Ostrovsky
Sanjam Garg, Steve Lu, Rafail Ostrovsky
Analysis of VAES3 (FF2)
Morris Dworkin, Ray Perlner
Morris Dworkin, Ray Perlner
Foundations of Reconfigurable PUFs (Full Version)
Jonas Schneider, Dominique Schröder
Jonas Schneider, Dominique Schröder
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
The Design Space of Lightweight Cryptography
Nicky Mouha
Nicky Mouha
Boosting OMD for Almost Free Authentication of Associated Data
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
Cryptanalysis of GGH Map
Yupu Hu, Huiwen Jia
Yupu Hu, Huiwen Jia
Scalable Divisible E-cash
Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
A Note on the Lindell-Waisbard Private Web Search Scheme
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
Yongge Wang
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
The Uniform Distribution of Sequences Generated by Iteration of Polynomials
Emil Lerner
Emil Lerner
Security Analysis of Re-Encryption RPC Mix Nets
Ralf Kuesters, Tomasz Truderung
Ralf Kuesters, Tomasz Truderung
Accelerating Somewhat Homomorphic Evaluation using FPGAs
Erdi̇̀nç Öztürk, Yarkın Doröz, Berk Sunar, Erkay Savaş
Erdi̇̀nç Öztürk, Yarkın Doröz, Berk Sunar, Erkay Savaş
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Secret Shared Random Access Machine
Shlomi Dolev, Yin Li
Shlomi Dolev, Yin Li
Two Operands of Multipliers in Side-Channel Attack
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Joseph A. Akinyele, Christina Garman, Susan Hohenberger
Joseph A. Akinyele, Christina Garman, Susan Hohenberger
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin, Orhun Kara
Muhammed F. Esgin, Orhun Kara
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Aydin Aysu, Patrick Schaumont
Aydin Aysu, Patrick Schaumont
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
John M. Schanck, William Whyte, Zhenfei Zhang
John M. Schanck, William Whyte, Zhenfei Zhang
Impossible Differential Cryptanalysis of Reduced Round SIMON
Zhan Chen, Ning Wang, Xiaoyun Wang
Zhan Chen, Ning Wang, Xiaoyun Wang
Improved Linear Trails for the Block Cipher Simon
Tomer Ashur
Tomer Ashur
A Note on Scalar Multiplication Using Division Polynomials
Binglong Chen, Chuangqiang Hu, Chang-An Zhao
Binglong Chen, Chuangqiang Hu, Chang-An Zhao
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data
Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
Non-Interactive Secure Computation Based on Cut-and-Choose
Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
Secret Sharing and Statistical Zero Knowledge
Vinod Vaikuntanathan, Prashant Nalini Vasudevan
Vinod Vaikuntanathan, Prashant Nalini Vasudevan
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou
Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou
Improved Cryptanalysis of AES-like Permutations
Jérémy Jean, Maria Naya-Plasencia, Thomas Peyrin
Jérémy Jean, Maria Naya-Plasencia, Thomas Peyrin
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Sébastien Canard, David Pointcheval, Olivier Sanders
Sébastien Canard, David Pointcheval, Olivier Sanders
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
Marco Tomamichel, Serge Fehr, Jędrzej Kaniewski, Stephanie Wehner
Marco Tomamichel, Serge Fehr, Jędrzej Kaniewski, Stephanie Wehner
An Improvment of the Elliptic Net Algorithm
Binglong Chen, Chang-An Zhao
Binglong Chen, Chang-An Zhao
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai
Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai
Low Depth Circuits for Efficient Homomorphic Sorting
Gizem S. Çetin, Yarkın Doröz, Berk Sunar, Erkay Savaş
Gizem S. Çetin, Yarkın Doröz, Berk Sunar, Erkay Savaş
Dual System Encryption via Predicate Encodings
Hoeteck Wee
Hoeteck Wee
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
Baodong Qin, Shengli Liu
Baodong Qin, Shengli Liu
Toward Secure Implementation of McEliece Decryption
Mariya Georgieva, Frédéric de Portzamparc
Mariya Georgieva, Frédéric de Portzamparc
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
Markus Dichtl
Markus Dichtl
Ideal Multilinear Maps Based on Ideal Lattices
Gu Chunsheng
Gu Chunsheng
Improved Top-Down Techniques in Differential Cryptanalysis
Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
The Simplest Protocol for Oblivious Transfer
Tung Chou, Claudio Orlandi
Tung Chou, Claudio Orlandi
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
Password Hashing Competition - Survey and Benchmark
George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas
George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas
BlindBox: Deep Packet Inspection over Encrypted Traffic
Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy
Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
A look at the PGP ecosystem through the key server data
Hanno Böck
Hanno Böck
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
Computational Aspects of Correlation Power Analysis
Paul Bottinelli, Joppe W. Bos
Paul Bottinelli, Joppe W. Bos
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
Patrick Derbez, Pierre-Alain Fouque
Patrick Derbez, Pierre-Alain Fouque
Lightweight MDS Involution Matrices
Siang Meng Sim, Khoongming Khoo, Frédérique Oggier, Thomas Peyrin
Siang Meng Sim, Khoongming Khoo, Frédérique Oggier, Thomas Peyrin
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
Vadim Lyubashevsky, Thomas Prest
Vadim Lyubashevsky, Thomas Prest
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
Yang Lu, Quanling Zhang, Jiguo Li
Yang Lu, Quanling Zhang, Jiguo Li
A comprehensive analysis of game-based ballot privacy definitions
David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
Tornado Attack on RC4 with Applications to WEP and WPA
Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang, Dongdai Lin
Haiyan Wang, Dongdai Lin
Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang, Jianghua Zhong, Dongdai Lin
Haiyan Wang, Jianghua Zhong, Dongdai Lin
How to Construct UC-Secure Searchable Symmetric Encryption Scheme
Kaoru Kurosawa, Yasuhiro Ohtaki
Kaoru Kurosawa, Yasuhiro Ohtaki
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
Junji Shikata
Junji Shikata
Improved (Hierarchical) Inner-Product Encryption from Lattices
Keita Xagawa
Keita Xagawa
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Ryo Nishimaki, Keita Xagawa
Ryo Nishimaki, Keita Xagawa
Subgroup security in pairing-based cryptography
Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo Zanon
Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo Zanon
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee
Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee
Practical Attacks on the Round-reduced PRINCE
Pawel Morawiecki
Pawel Morawiecki
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
Jeremy Jean, Ivica Nikolic
Jeremy Jean, Ivica Nikolic
Reliable communication via semilattice properties of partial knowledge
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
Espresso: A Stream Cipher for 5G Wireless Communication Systems
Elena Dubrova, Martin Hell
Elena Dubrova, Martin Hell
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
Alex Biryukov, Patrick Derbez, Léo Perrin
Alex Biryukov, Patrick Derbez, Léo Perrin
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Patrick Derbez, Léo Perrin
Patrick Derbez, Léo Perrin
One Time Programs with Limited Memory
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michał Zając
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michał Zając
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers
Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey
Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey
Performance and Security Improvements for Tor: A Survey
Mashael AlSabah, Ian Goldberg
Mashael AlSabah, Ian Goldberg
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
Ben Smyth, Steven Frink, Michael R. Clarkson
Ben Smyth, Steven Frink, Michael R. Clarkson
Cryptanalysis of Full Sprout
Virginie Lallemand, María Naya-Plasencia
Virginie Lallemand, María Naya-Plasencia
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
Yonglin Hao
Yonglin Hao
W-SPS: Designing a Wide-Area Secure Positioning System
Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Reza Hooshmand
Reza Hooshmand
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
Konrad Durnoga, Tomasz Kazana, Michał Zając, Maciej Zdanowicz
Konrad Durnoga, Tomasz Kazana, Michał Zając, Maciej Zdanowicz
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov, Dmitry Khovratovich
Alex Biryukov, Dmitry Khovratovich
Secure Physical Computation using Disposable Circuits
Ben Fisch, Daniel Freund, Moni Naor
Ben Fisch, Daniel Freund, Moni Naor
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar
Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar
Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, Bart Mennink
Elena Andreeva, Andrey Bogdanov, Bart Mennink
Tighter, faster, simpler side-channel security evaluations beyond computing power
Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal
Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal
Key Homomorphic PRFs and Their Applications
Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan
Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan
Efficient Format Preserving Encrypted Databases
Prakruti C, Sashank Dara, V. N. Muralidhara
Prakruti C, Sashank Dara, V. N. Muralidhara
Efficient k-out-of-n oblivious transfer protocol
wang qinglong
wang qinglong
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
Subhamoy Maitra, Goutam Paul, Willi Meier
Subhamoy Maitra, Goutam Paul, Willi Meier
Quasi-Adaptive NIZK for Linear Subspaces Revisited
Eike Kiltz, Hoeteck Wee
Eike Kiltz, Hoeteck Wee
A revocable anonymity in Tor
Amadou Moctar Kane
Amadou Moctar Kane
GCM Security Bounds Reconsidered
Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata
Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata
Attribute-Based Versions of Schnorr and ElGamal
Javier Herranz
Javier Herranz
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
Thijs Laarhoven, Benne de Weger
Thijs Laarhoven, Benne de Weger
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Chenglu Jin, Marten van Dijk
Chenglu Jin, Marten van Dijk
Triathlon of Lightweight Block Ciphers for the Internet of Things
Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
Towards Secure Distance Bounding
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
Tobias Schneider, Amir Moradi
Tobias Schneider, Amir Moradi
Efficient and Secure Delegation of Group Exponentiation to a Single Server
Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain
Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Jooyoung Lee
Jooyoung Lee
Leakage-Resilient Symmetric Encryption via Re-keying
Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
Adaptively Secure Coin-Flipping, Revisited
Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park
Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park
Statistical Properties of Multiplication mod $2^n$
A. Mahmoodi Rishakani, S. M. Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
A. Mahmoodi Rishakani, S. M. Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu
Alexander Wild, Amir Moradi, Tim Güneysu
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Amir Moradi, Gesine Hinterwälder
Amir Moradi, Gesine Hinterwälder
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
N. Nalla Anandakumar
N. Nalla Anandakumar
Tighter Reductions for Forward-Secure Signature Schemes
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists
Stephanie Bayer, Jens Groth
Stephanie Bayer, Jens Groth
Practical Homomorphic MACs for Arithmetic Circuits
Dario Catalano, Dario Fiore
Dario Catalano, Dario Fiore
Improving Modular Inversion in RNS using the Plus-Minus Method
Karim Bigou, Arnaud Tisserand
Karim Bigou, Arnaud Tisserand
Memory-saving computation of the pairing final exponentiation on BN curves
Sylvain DUQUESNE, Loubna GHAMMAM
Sylvain DUQUESNE, Loubna GHAMMAM
iDASH Secure Genome Analysis Competition Using ObliVM
Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi
Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi
Multi-Client Non-Interactive Verifiable Computation
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár
Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Juan Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
Juan Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
Higher Order Differential Analysis of NORX
Sourav Das, Subhamoy Maitra, Willi Meier
Sourav Das, Subhamoy Maitra, Willi Meier
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben Smeets
Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben Smeets
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
Céline Blondeau, Kaisa Nyberg
Céline Blondeau, Kaisa Nyberg
New Links Between Differential and Linear Cryptanalysis
Céline Blondeau, Kaisa Nyberg
Céline Blondeau, Kaisa Nyberg
Tweakable Blockciphers with Asymptotically Optimal Security
Rodolphe Lampe, Yannick Seurin
Rodolphe Lampe, Yannick Seurin
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li
Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li
Key-Homomorphic Constrained Pseudorandom Functions
Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
Palash Sarkar, Shashank Singh
Palash Sarkar, Shashank Singh
How to Incentivize Data-Driven Collaboration Among Competing Parties
Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park
Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park
On the Security of an Efficient Group Key Agreement Scheme for MANETs
Purushothama B R, Nishat Koti
Purushothama B R, Nishat Koti
Key Recovery for LWE in Polynomial Time
Kim Laine, Kristin Lauter
Kim Laine, Kristin Lauter
Trivial Nonce-Misusing Attack on Pure OMD
Tomer Ashur, Bart Mennink
Tomer Ashur, Bart Mennink
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
Indistinguishability Obfuscation from Compact Functional Encryption
Prabhanjan Ananth, Abhishek Jain
Prabhanjan Ananth, Abhishek Jain
Silent Simon: A Threshold Implementation under 100 Slices
Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
Authenticated Network Time Synchronization
Benjamin Dowling, Douglas Stebila, Greg Zaverucha
Benjamin Dowling, Douglas Stebila, Greg Zaverucha
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
Short Schnorr signatures require a hash function with more than just random-prefix resistance
Daniel R. L. Brown
Daniel R. L. Brown
More PS and H-like bent functions
C. Carlet
C. Carlet
Post-Zeroizing Obfuscation: The case of Evasive Circuits
Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
Naturally Rehearsing Passwords
Jeremiah Blocki, Manuel Blum, Anupam Datta
Jeremiah Blocki, Manuel Blum, Anupam Datta
The Cryptographic Hardness of Random Local Functions -- Survey
Benny Applebaum
Benny Applebaum
Constant Size Ring Signature Without Random Oracle
Priyanka Bose, Dipanjan Das, C. Pandu Rangan
Priyanka Bose, Dipanjan Das, C. Pandu Rangan
Indistinguishability Obfuscation from Functional Encryption
Nir Bitansky, Vinod Vaikuntanathan
Nir Bitansky, Vinod Vaikuntanathan
New Multilinear Maps over the Integers
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
Differential-Linear Cryptanalysis of ICEPOLE
Tao Huang, Ivan Tjuawinata, Hongjun Wu
Tao Huang, Ivan Tjuawinata, Hongjun Wu
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu
Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Zvika Brakerski, Ilan Komargodski, Gil Segev
Zvika Brakerski, Ilan Komargodski, Gil Segev
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Nuttapong Attrapadung, Shota Yamada
Nuttapong Attrapadung, Shota Yamada
Building Lossy Trapdoor Functions from Lossy Encryption
Brett Hemenway, Rafail Ostrovsky
Brett Hemenway, Rafail Ostrovsky
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor
Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor
Circuits Resilient to Additive Attacks with Applications to Secure Computation
Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer
Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer
Functional Encryption from (Small) Hardware Tokens
Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
Ronan Lashermes, Jacques Fournier, Louis Goubin
Ronan Lashermes, Jacques Fournier, Louis Goubin
Bad directions in cryptographic hash functions
Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen
Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen
Insynd: Improved Privacy-Preserving Transparency Logging
Roel Peeters, Tobias Pulls
Roel Peeters, Tobias Pulls
Cryptanalysis of HMAC/NMAC-Whirlpool
Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu
Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage
Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage
New Attacks on Feistel Structures with Improved Memory Complexities
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Observations on the SIMON block cipher family
Stefan Kölbl, Gregor Leander, Tyge Tiessen
Stefan Kölbl, Gregor Leander, Tyge Tiessen
Security of the AES with a Secret S-box
Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen
Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
Erich Wenger, Paul Wolfger
Erich Wenger, Paul Wolfger
Multi-Client Verifiable Computation with Stronger Security Guarantees
S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
Céline Blondeau, Marine Minier
Céline Blondeau, Marine Minier
The Random Oracle Model: A Twenty-Year Retrospective
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Performance Analysis of Some Password Hashing Schemes
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
A Practical Key Exchange for the Internet using Lattice Cryptography
Vikram Singh
Vikram Singh
Multi-keyword Similarity Search Over Encrypted Cloud Data
Mikhail Strizhov, Indrajit Ray
Mikhail Strizhov, Indrajit Ray
Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs
Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto
Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto
Generalizing Efficient Multiparty Computation
Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp
Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
Pierre Karpman
Pierre Karpman
Private Computation on Encrypted Genomic Data
Kristin Lauter, Adriana Lopez-Alt, Michael Naehrig
Kristin Lauter, Adriana Lopez-Alt, Michael Naehrig
Homomorphic Computation of Edit Distance
Jung Hee Cheon, Miran Kim, Kristin Lauter
Jung Hee Cheon, Miran Kim, Kristin Lauter
On Lightweight Stream Ciphers with Shorter Internal States
Frederik Armknecht, Vasily Mikhalev
Frederik Armknecht, Vasily Mikhalev
How to Bootstrap Anonymous Communication
Sune K. Jakobsen, Claudio Orlandi
Sune K. Jakobsen, Claudio Orlandi
Block-wise Non-Malleable Codes
Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay
Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
Ricardo Dahab, Steven Galbraith, Eduardo Morais
Ricardo Dahab, Steven Galbraith, Eduardo Morais
Perfect Structure on the Edge of Chaos
Nir Bitansky, Omer Paneth, Daniel Wichs
Nir Bitansky, Omer Paneth, Daniel Wichs
Multilinear Pseudorandom Functions
Aloni Cohen, Justin Holmgren
Aloni Cohen, Justin Holmgren
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu
Alexander Wild, Amir Moradi, Tim Güneysu
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
Dennis Hofheinz, Jessica Koch, Christoph Striecks
Dennis Hofheinz, Jessica Koch, Christoph Striecks
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry, Erik-Oliver Blass, Guevara Noubir
Travis Mayberry, Erik-Oliver Blass, Guevara Noubir
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm
Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm
Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version)
Alexandre Duc, Sebastian Faust, François-Xavier Standaert
Alexandre Duc, Sebastian Faust, François-Xavier Standaert
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
Takahiro Matsuda, Goichiro Hanaoka
Takahiro Matsuda, Goichiro Hanaoka
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
Maciej Skorski
Maciej Skorski
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs
Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabâa, Ammar Bouallègue
Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabâa, Ammar Bouallègue
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
Muhammad Yasir Malik
Muhammad Yasir Malik
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
The Multivariate Hidden Number Problem
Steven D. Galbraith, Barak Shani
Steven D. Galbraith, Barak Shani
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
Shijun Zhao, Qianying Zhang
Shijun Zhao, Qianying Zhang
TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM
Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
Attila A. Yavuz, Jorge Guajardo
Attila A. Yavuz, Jorge Guajardo
Provably weak instances of Ring-LWE
Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
Inner Product Masking Revisited
Josep Balasch, Sebastian Faust, Benedikt Gierlichs
Josep Balasch, Sebastian Faust, Benedikt Gierlichs
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges
Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges
Mergeable Functional Encryption
Vincenzo Iovino, Karol Zebrowski
Vincenzo Iovino, Karol Zebrowski
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Shay Gueron, Yehuda Lindell
Shay Gueron, Yehuda Lindell
Multi-Key Security: The Even-Mansour Construction Revisited
Nicky Mouha, Atul Luykx
Nicky Mouha, Atul Luykx
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
Christian Wittke, Zoya Dyka, Peter Langendoerfer
Christian Wittke, Zoya Dyka, Peter Langendoerfer
Universally Composable Firewall Architectures using Trusted Hardware
Dirk Achenbach, Jörn Müller-Quade, Jochen Rill
Dirk Achenbach, Jörn Müller-Quade, Jochen Rill
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
Shantian Cheng, Juanyang Zhang
Shantian Cheng, Juanyang Zhang
Surreptitiously Weakening Cryptographic Systems
Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart
Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart
A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham AlTawy, Amr M. Youssef
Riham AlTawy, Amr M. Youssef
Rotational Cryptanalysis of ARX Revisited
Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
Some New Results on Binary Polynomial Multiplication
Murat Cenk, M. Anwar Hasan
Murat Cenk, M. Anwar Hasan
Generalization of Statistical Criteria for Sboxes
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY
Grasha Jacob, Dr. A. Murugan, Irine Viola
Grasha Jacob, Dr. A. Murugan, Irine Viola
Related-Key Forgeries for Prøst-OTR
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel
Structural Evaluation by Generalized Integral Property
Yosuke Todo
Yosuke Todo
On the security margin of MAC striping
Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt
Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt
Structural Weaknesses in the Open Smart Grid Protocol
Klaus Kursawe, Christiane Peters
Klaus Kursawe, Christiane Peters
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
David Derler, Christian Hanser, Daniel Slamanig
David Derler, Christian Hanser, Daniel Slamanig
Practical Compact E-Cash with Arbitrary Wallet Size
Patrick Märtens
Patrick Märtens
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Anne Canteaut, Joëlle Roué
Anne Canteaut, Joëlle Roué
On the Disadvantages of Pairing-based Cryptography
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Massimo Chenal, Qiang Tang
Massimo Chenal, Qiang Tang
On the Difficulty of Securing Web Applications using CryptDB
İhsan Haluk AKIN, Berk Sunar
İhsan Haluk AKIN, Berk Sunar
Amortizing Garbled Circuits
Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Feng Hao, Xun Yi, Liqun Chen, Siamak F. Shahandashti
Feng Hao, Xun Yi, Liqun Chen, Siamak F. Shahandashti
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Jiqiang Lu
Jiqiang Lu
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
GU Chun-xiang, Xin Dan, ZHENG Yong-hui, KANG Yuan-ji
GU Chun-xiang, Xin Dan, ZHENG Yong-hui, KANG Yuan-ji
On the Primary Constructions of Vectorial Boolean Bent Functions
Yuwei Xu, Chuankun Wu
Yuwei Xu, Chuankun Wu
Fully Structure-Preserving Signatures and Shrinking Commitments
Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi
Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen
Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt
Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Olivier Blazy, Céline Chevalier, Damien Vergnaud
Olivier Blazy, Céline Chevalier, Damien Vergnaud
Factoring N=p^r q^s for Large r and s
Jean-Sebastien Coron, Jean-Charles Faugere, Guenael Renault, Rina Zeitoun
Jean-Sebastien Coron, Jean-Charles Faugere, Guenael Renault, Rina Zeitoun
The Sum Can Be Weaker Than Each Part
Gaëtan Leurent, Lei Wang
Gaëtan Leurent, Lei Wang
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
Benoît Cogliati, Yannick Seurin
Benoît Cogliati, Yannick Seurin
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Gregor Leander, Brice Minaud, Sondre Rønjom
Gregor Leander, Brice Minaud, Sondre Rønjom
Non-black-box Simulation in the Fully Concurrent Setting, Revisited
Susumu Kiyoshima
Susumu Kiyoshima
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
Tobias Schneider, Amir Moradi, Tim Güneysu
Tobias Schneider, Amir Moradi, Tim Güneysu
A lightweight-friendly modifcation of GOST block cipher
Andrey Dmukh, Denis Dygin, Grigory Marshalko
Andrey Dmukh, Denis Dygin, Grigory Marshalko
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
Handan Kılınç, Alptekin Küpçü
Handan Kılınç, Alptekin Küpçü
CamlCrush: A PKCS\#11 Filtering Proxy
R. Benadjila, T. Calderon, M. Daubignard
R. Benadjila, T. Calderon, M. Daubignard
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Yuval Yarom, Gefei Li, Damith C. Ranasinghe
Yuval Yarom, Gefei Li, Damith C. Ranasinghe
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
Verified Proofs of Higher-Order Masking
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Berry Schoenmakers, Meilof Veeningen
Berry Schoenmakers, Meilof Veeningen
Cold Boot Attacks in the Discrete Logarithm Setting
Bertram Poettering, Dale L. Sibborn
Bertram Poettering, Dale L. Sibborn
Better Algorithms for LWE and LWR
Alexandre Duc, Florian Tramèr, Serge Vaudenay
Alexandre Duc, Florian Tramèr, Serge Vaudenay
Richer Efficiency/Security Trade-offs in 2PC
Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
Non-committing encryption from $\Phi$-hiding
Brett Hemenway, Rafail Ostrovsky, Alon Rosen
Brett Hemenway, Rafail Ostrovsky, Alon Rosen
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
Interactive Message-Locked Encryption and Secure Deduplication
Mihir Bellare, Sriram Keelveedhi
Mihir Bellare, Sriram Keelveedhi
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Li Lin, Wenling Wu
Li Lin, Wenling Wu
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
Carla Ràfols
Carla Ràfols
On Solving Lpn using BKW and Variants
Sonia Bogos, Florian Tramer, Serge Vaudenay
Sonia Bogos, Florian Tramer, Serge Vaudenay
On Obfuscation with Random Oracles
Ran Canetti, Yael Tauman Kalai, Omer Paneth
Ran Canetti, Yael Tauman Kalai, Omer Paneth
Linearly Homomorphic Encryption from DDH
Guilhem Castagnos, Fabien Laguillaumie
Guilhem Castagnos, Fabien Laguillaumie
On the concrete hardness of Learning with Errors
Martin R. Albrecht, Rachel Player, Sam Scott
Martin R. Albrecht, Rachel Player, Sam Scott
Reliable Information Extraction for Single Trace Attacks
Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Binanda Sengupta, Abhijit Das
Binanda Sengupta, Abhijit Das
Group Signature with Deniability: How to Disavow a Signature
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
High Performance Lattice-based CCA-secure Encryption
Rachid El Bansarkhani, Johannes Buchmann
Rachid El Bansarkhani, Johannes Buchmann
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
Artur Mariano, Thijs Laarhoven, Christian Bischof
Artur Mariano, Thijs Laarhoven, Christian Bischof
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref
Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref
Type-Based Verification of Electronic Voting Protocols
Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling
Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling
Aggregate Pseudorandom Functions and Connections to Learning
Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref
Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref
Faster software for fast endomorphisms
Billy Bob Brumley
Billy Bob Brumley
Cryptographically Secure CRC for Lightweight Message Authentication
Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
Suit up! Made-to-Measure Hardware Implementations of Ascon
Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer
Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
Zvika Brakerski, Vinod Vaikuntanathan
Zvika Brakerski, Vinod Vaikuntanathan
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
Kai-Min Chung, Rafael Pass
Kai-Min Chung, Rafael Pass
Cryptanalysis of Ascon
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
Predicate Encryption for Circuits from LWE
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
Jeremy Maitin-Shepard
Jeremy Maitin-Shepard
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
Adam Smith, Ye Zhang
Adam Smith, Ye Zhang
A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
Obfuscating Circuits via Composite-Order Graded Encoding
Benny Applebaum, Zvika Brakerski
Benny Applebaum, Zvika Brakerski
Non-Abelian Analogs of Lattice Rounding
Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan
Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan
Multilinear Maps Using Ideal Lattices without Encodings of Zero
Gu Chunsheng
Gu Chunsheng
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang
Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
Xin Li
Xin Li
Simpler Efficient Group Signatures from Lattices
Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS
JINTAI DING, ALEXEI MIASNIKOV, ALEXANDER USHAKOV
JINTAI DING, ALEXEI MIASNIKOV, ALEXANDER USHAKOV
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Yannis Rouselakis, Brent Waters
Yannis Rouselakis, Brent Waters
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
Florian Bergsma, Tibor Jager, Jörg Schwenk
Florian Bergsma, Tibor Jager, Jörg Schwenk
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
San Ling, Khoa Nguyen, Huaxiong Wang
San Ling, Khoa Nguyen, Huaxiong Wang
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Nico Döttling
Nico Döttling
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Tancrède Lepoint, Mehdi Tibouchi
Tancrède Lepoint, Mehdi Tibouchi
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
Benjamin Buhrow, Paul Riemer, Mike Shea, Barry Gilbert, Erik Daniel
Benjamin Buhrow, Paul Riemer, Mike Shea, Barry Gilbert, Erik Daniel
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
Shengli Liu, Kenneth G. Paterson
Shengli Liu, Kenneth G. Paterson
Rig: A simple, secure and flexible design for Password Hashing
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Satrajit Ghosh, Aniket Kate
Satrajit Ghosh, Aniket Kate
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls, Roel Peeters
Tobias Pulls, Roel Peeters
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch, Robert R. Enderlein, Gregory Neven
Jan Camenisch, Robert R. Enderlein, Gregory Neven
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs
Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Carmit Hazay
Carmit Hazay
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
Characterization of MDS mappings
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
A note on the security of Higher-Order Threshold Implementations
Oscar Reparaz
Oscar Reparaz
On the Cryptographic Hardness of Finding a Nash Equilibrium
Nir Bitansky, Omer Paneth, Alon Rosen
Nir Bitansky, Omer Paneth, Alon Rosen
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Payal Chaudhari, Manik Lal Das, Anish Mathuria
Payal Chaudhari, Manik Lal Das, Anish Mathuria
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky, Daniel Wichs
Vadim Lyubashevsky, Daniel Wichs
Lattices with Symmetry
H. W. Lenstra Jr., A. Silverberg
H. W. Lenstra Jr., A. Silverberg
XPIR: Private Information Retrieval for Everyone
Carlos Aguilar-Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian
Carlos Aguilar-Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian
Cryptanalysis of the Co-ACD Assumption
Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
Nathan E. Price, Alan T. Sherman
Nathan E. Price, Alan T. Sherman
Topology-Hiding Computation
Tal Moran, Ilan Orlov, Silas Richelson
Tal Moran, Ilan Orlov, Silas Richelson
Tightly-Secure Signatures from Chameleon Hash Functions
Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
Xiaoming Tang, Weidong Qiu, Zheng Gong, Zheng Huang, Jie Guo
Xiaoming Tang, Weidong Qiu, Zheng Gong, Zheng Huang, Jie Guo
Algebraic Algorithms for LWE
Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
Foteini Baldimtsi, Olga Ohrimenko
Foteini Baldimtsi, Olga Ohrimenko
Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
Compact Accumulator using Lattices
Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
Double-and-Add with Relative Jacobian Coordinates
Björn Fay
Björn Fay
Computational Independence
Björn Fay
Björn Fay
The Boomerang Attacks on BLAKE and BLAKE2
Yonglin Hao
Yonglin Hao
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Alex Biryukov, Ivan Pustogarov
Alex Biryukov, Ivan Pustogarov
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Mohsen Toorani
Mohsen Toorani
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman
Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman
DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
Fair Multiple-bank E-cash in the Standard Model
Jiangxiao Zhang, Yanwu Gao, Chunhui Feng, Hua Guo, Zhoujun Li
Jiangxiao Zhang, Yanwu Gao, Chunhui Feng, Hua Guo, Zhoujun Li
Simple composition theorems of one-way functions -- proofs and presentations
Jaime Gaspar, Eerke Boiten
Jaime Gaspar, Eerke Boiten
A pure block chain based decentralized exchange.
Harsh Patel
Harsh Patel
CONIKS: Bringing Key Transparency to End Users
Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman
Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman
COFFE: Ciphertext Output Feedback Faithful Encryption
Christian Forler, David McGrew, Stefan Lucks, Jakob Wenzel
Christian Forler, David McGrew, Stefan Lucks, Jakob Wenzel
Experiments in Encrypted and Searchable Network Audit Logs
Bhanu Prakash Gopularam, Sashank Dara, Nalini N
Bhanu Prakash Gopularam, Sashank Dara, Nalini N
Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
Xiaopeng Yang, Wenping Ma, Chengli Zhang
Xiaopeng Yang, Wenping Ma, Chengli Zhang
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
Yongdae Kim, Hyunsoo Yoon
Yongdae Kim, Hyunsoo Yoon
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
Gus Gutoski, Douglas Stebila
Gus Gutoski, Douglas Stebila
Constants Count: Practical Improvements to Oblivious RAM
Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas
Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas
Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
Maike Massierer
Maike Massierer
Partial Garbling Schemes and Their Applications
Yuval Ishai, Hoeteck Wee
Yuval Ishai, Hoeteck Wee
Key-Policy Multi-authority Attribute-Based Encryption
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendoerfer
Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendoerfer
Incentivized Outsourced Computation Resistant to Malicious Contractors
Alptekin Kupcu
Alptekin Kupcu
Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
Kai-Min Chung, Huijia Lin, Rafael Pass
Kai-Min Chung, Huijia Lin, Rafael Pass
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Pille Pullonen, Sander Siim
Pille Pullonen, Sander Siim
Controlled Homomorphic Encryption: Definition and Construction
Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti
Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti
Armadillo: a compilation chain for privacy preserving applications
Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
Cryptanalysis of Full PRIDE Block Cipher
Yibin Dai, Shaozhen Chen
Yibin Dai, Shaozhen Chen
Related-Key Differential Attack on Round Reduced RECTANGLE-80
Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma
Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Bartosz Zoltak
Bartosz Zoltak
Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
Michael Peter, Jan Nordholz, Matthias Petschick, Janis Danisevskis, Julian Vetter, Jean-Pierre Seifert
Michael Peter, Jan Nordholz, Matthias Petschick, Janis Danisevskis, Julian Vetter, Jean-Pierre Seifert
Public Verification of Private Effort
Giulia Alberini, Tal Moran, Alon Rosen
Giulia Alberini, Tal Moran, Alon Rosen
Outlier Privacy
Edward Lui, Rafael Pass
Edward Lui, Rafael Pass
Publicly Verifiable Non-Interactive Arguments for Delegating Computation
Omer Paneth, Guy N. Rothblum
Omer Paneth, Guy N. Rothblum
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
The Chaining Lemma and its application
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
Improved Differential Analysis of Block Cipher PRIDE
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma
A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
Geppetto: Versatile Verifiable Computation
Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
Non-Linearity and Affine Equivalence of Permutations
P R Mishra, Indivar Gupta, N Rajesh Pillai
P R Mishra, Indivar Gupta, N Rajesh Pillai
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma
Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Haining Fan
Haining Fan
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Y. Wei, E. Pasalic, F. Zhang, W. Wu
Y. Wei, E. Pasalic, F. Zhang, W. Wu
Jackpot Stealing Information From Large Caches via Huge Pages
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
Privacy-Preserving Face Recognition with Outsourced Computation
Can Xiang, Chunming Tang
Can Xiang, Chunming Tang
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
Jorge Munilla, Mike Burmester, Albert Peinado
Jorge Munilla, Mike Burmester, Albert Peinado
A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
Maciej Skorski
Maciej Skorski
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
Kan Yang, Xiaohua Jia, Kuan Zhang, Xuemin (Sherman) Shen
Kan Yang, Xiaohua Jia, Kuan Zhang, Xuemin (Sherman) Shen
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
Romain Gay, Pierrick Méaux, Hoeteck Wee
Romain Gay, Pierrick Méaux, Hoeteck Wee
On two windows multivariate cryptosystem depending on random parameters
Urszula Romańczuk-Polubiec, Vasyl Ustimenko
Urszula Romańczuk-Polubiec, Vasyl Ustimenko
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
Solving Polynomial Systems with Noise over F_2: Revisited
Zhenyu Huang, Dongdai Lin
Zhenyu Huang, Dongdai Lin
When are Fuzzy Extractors Possible?
Benjamin Fuller, Leonid Reyzin, Adam Smith
Benjamin Fuller, Leonid Reyzin, Adam Smith
Non-Interactive Secure Multiparty Computation
Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
Authenticated Encryption: How Reordering can Impact Performance
Basel Alomair
Basel Alomair
Black Box Separations for Differentially Private Protocols
Dakshita Khurana, Hemanta K. Maji, Amit Sahai
Dakshita Khurana, Hemanta K. Maji, Amit Sahai
Tamper Detection and Continuous Non-Malleable Codes
Zahra Jafargholi, Daniel Wichs
Zahra Jafargholi, Daniel Wichs
On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
Algebraic Fault Analysis of Katan
Frank Quedenfeld
Frank Quedenfeld
The Related-Key Security of Iterated Even-Mansour Ciphers
Pooya Farshim, Gordon Procter
Pooya Farshim, Gordon Procter
Balanced Encoding to Mitigate Power Analysis: A Case Study
Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye
Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye
Modified Alternating Step Generators with Non-Linear Scrambler
Robert Wicik, Tomasz Rachwalik, Rafał Gliwa
Robert Wicik, Tomasz Rachwalik, Rafał Gliwa
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda
Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda
Simplification/complication of the basis of prime Boolean ideal
Alexander Rostovtsev, Anna Shustrova
Alexander Rostovtsev, Anna Shustrova
Lattice Point Enumeration on Block Reduced Bases
Michael Walter
Michael Walter
The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
On a new fast public key cryptosystem
Samir Bouftass, Abdelhak Azhari
Samir Bouftass, Abdelhak Azhari
Boomerang Attack on Step-Reduced SHA-512
Hongbo Yu, Dongxia Bai
Hongbo Yu, Dongxia Bai
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Advancing the State-of-the-Art in Hardware Trojans Detection
Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk
Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk
Public-Coin Differing-Inputs Obfuscation and Its Applications
Yuval Ishai, Omkant Pandey, Amit Sahai
Yuval Ishai, Omkant Pandey, Amit Sahai
Garbled RAM From One-Way Functions
Sanjam Garg, Steve Lu, Rafail Ostrovsky, Alessandra Scafuro
Sanjam Garg, Steve Lu, Rafail Ostrovsky, Alessandra Scafuro
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Security Analysis of an Authentication Scheme Using Smart Cards
Gaurav Tiwari, Amit K. Awasthi, Neha Shukla
Gaurav Tiwari, Amit K. Awasthi, Neha Shukla
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
Analysis of Lewko-Sahai-Waters Revocation System
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler
Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia
Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia
Efficient Generic Zero-Knowledge Proofs from Commitments
Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias
Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias
Certificateless Proxy Re-Encryption Without Pairing: Revisited
Akshayaram Srinivasan, C. Pandu Rangan
Akshayaram Srinivasan, C. Pandu Rangan
Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
Cryptanalysis of JAMBU
Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
Immunizing Multilinear Maps Against Zeroizing Attacks
Dan Boneh, David J. Wu, Joe Zimmerman
Dan Boneh, David J. Wu, Joe Zimmerman
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai
Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
Physical functions : the common factor of side-channel and fault attacks ?
Bruno Robisson, Hélène Le Bouder
Bruno Robisson, Hélène Le Bouder
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Keita Emura, Takuya Hayashi
Keita Emura, Takuya Hayashi
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Venkata Koppula, Allison Bishop Lewko, Brent Waters
Venkata Koppula, Allison Bishop Lewko, Brent Waters
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
Antoine Joux, Cécile Pierrot
Antoine Joux, Cécile Pierrot
New Cryptosystem Using The CRT And The Jordan Normal Form
Hemlata Nagesh, Birendra Kumar Sharma
Hemlata Nagesh, Birendra Kumar Sharma
Differential Analysis of Block Ciphers SIMON and SPECK
Alex Biryukov, Arnab Roy, Vesselin Velichkov
Alex Biryukov, Arnab Roy, Vesselin Velichkov
Batch NFS
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schueth, François-Xavier Standaert
Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schueth, François-Xavier Standaert
Experimenting with Shuffle Block Cipher and SMT Solvers
Martin Stanek
Martin Stanek
Web Tap Payment Authentication and Encryption With Zero Customer Effort
Henry Ng
Henry Ng
From Selective to Adaptive Security in Functional Encryption
Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan
Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan
Adaptively Secure Fully Homomorphic Signatures Based on Lattices
Xavier Boyen, Xiong Fan, Elaine Shi
Xavier Boyen, Xiong Fan, Elaine Shi
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014
Yanbin Pan
Yanbin Pan
Cryptography with One-Way Communication
Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Low-Cost Concurrent Error Detection for GCM and CCM
Xiaofei Guo, Ramesh Karri
Xiaofei Guo, Ramesh Karri
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
Jethro Beekman
Jethro Beekman
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
Vanishree Rao
Vanishree Rao
Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop Lewko, Valerio Pastro
Allison Bishop Lewko, Valerio Pastro
Practical UC security with a Global Random Oracle
Ran Canetti, Abhishek Jain, Alessandra Scafuro
Ran Canetti, Abhishek Jain, Alessandra Scafuro
Finding shortest lattice vectors faster using quantum search
Thijs Laarhoven, Michele Mosca, Joop van de Pol
Thijs Laarhoven, Michele Mosca, Joop van de Pol
Cryptanalysis on the Multilinear Map over the Integers and its Related Problems
Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehle
Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehle
Primary-Secondary-Resolver Membership Proof Systems
Moni Naor, Asaf Ziv
Moni Naor, Asaf Ziv
How Secure is TextSecure?
Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, Thorsten Holz
Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, Thorsten Holz
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
The Power of Negations in Cryptography
Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
Kenneth G. Paterson, Mario Strefler
Kenneth G. Paterson, Mario Strefler
Some Security Results of the RC4+ Stream Cipher
Subhadeep Banik, Sonu Jha
Subhadeep Banik, Sonu Jha
Side Channel Power Analysis of an AES-256 Bootloader
Colin O'Flynn, Zhizhang Chen
Colin O'Flynn, Zhizhang Chen
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
Eduardo Morais, Ricardo Dahab
Eduardo Morais, Ricardo Dahab
Leveled Fully Homomorphic Signatures from Standard Lattices
Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs
Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs
Efficiently Making Secure Two-Party Computation Fair
Handan Kılınç, Alptekin Küpçü
Handan Kılınç, Alptekin Küpçü
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
Kerry A. McKay, Poorvi L. Vora
Kerry A. McKay, Poorvi L. Vora
THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
Joe Chiarella, Greg Mosher, Dr. J. Robert Buchanan
Joe Chiarella, Greg Mosher, Dr. J. Robert Buchanan
Advanced Algebraic Attack on Trivium
Frank Quedenfeld, Christopher Wolf
Frank Quedenfeld, Christopher Wolf
Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
Georg Fuchsbauer
Georg Fuchsbauer
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Jean-Sebastien Coron, Johann Groszschaedl, Praveen Kumar Vadnala, Mehdi Tibouchi
Jean-Sebastien Coron, Johann Groszschaedl, Praveen Kumar Vadnala, Mehdi Tibouchi
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
Jean-Sebastien Coron, Arnab Roy, Srinivas Vivek
Jean-Sebastien Coron, Arnab Roy, Srinivas Vivek
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
Distance Lower Bounding
Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo, Yu-Lun Lin, Zhen Wang, Mark Karpovsky
Pei Luo, Yu-Lun Lin, Zhen Wang, Mark Karpovsky
Accountable Storage
Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
Marios O. Choudary, Markus G. Kuhn
Marios O. Choudary, Markus G. Kuhn
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo, Yunsi Fei
Pei Luo, Yunsi Fei
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo, Yunsi Fei
Pei Luo, Yunsi Fei
Obfuscation of Probabilistic Circuits and Applications
Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Joppe W. Bos, Michael Naehrig, Joop van de Pol
Joppe W. Bos, Michael Naehrig, Joop van de Pol
Watch your Constants: Malicious Streebog
Riham AlTawy, Amr M. Youssef
Riham AlTawy, Amr M. Youssef
Protecting obfuscation against arithmetic attacks
Eric Miles, Amit Sahai, Mor Weiss
Eric Miles, Amit Sahai, Mor Weiss
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
Daniel R. L. Brown
Daniel R. L. Brown
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
Mihir Bellare, Viet Tung Hoang
Mihir Bellare, Viet Tung Hoang
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
Accelerating Bliss: the geometry of ternary polynomials
Léo Ducas
Léo Ducas
Bootstrapping for HElib
Shai Halevi, Victor Shoup
Shai Halevi, Victor Shoup
Recent Results in Scalable Multi-Party Computation
Jared Saia, Mahdi Zamani
Jared Saia, Mahdi Zamani
An algorithm for MD5 single-block collision attack using high-performance computing cluster
Anton A. Kuznetsov
Anton A. Kuznetsov
Dynamic Behavior of RS latches using FIB processing and probe connection
Naoya Torii, Dai Yamamoto, Masahiko Takenaka, Tsutomu Matsumoto
Naoya Torii, Dai Yamamoto, Masahiko Takenaka, Tsutomu Matsumoto
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Werner Schindler
Werner Schindler
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
Ilan Komargodski, Gil Segev, Eylon Yogev
Ilan Komargodski, Gil Segev, Eylon Yogev
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Chris Brzuska, Pooya Farshim, Arno Mittelbach
Chris Brzuska, Pooya Farshim, Arno Mittelbach
Self-Destruct Non-Malleability
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Impossibility of Black-Box Simulation Against Leakage Attacks
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
How to Choose Interesting Points for Template Attacks More Effectively
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts
Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
İhsan Haluk Akın
İhsan Haluk Akın
Differential Factors: Improved Attacks on SERPENT
Cihangir Tezcan, Ferruh Özbudak
Cihangir Tezcan, Ferruh Özbudak
Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
SK Hafizul Islam, G. P. Biswas
SK Hafizul Islam, G. P. Biswas
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
Dana Dachman-Soled, Jonathan Katz, Vanishree Rao
Dana Dachman-Soled, Jonathan Katz, Vanishree Rao
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz, Andrew Miller, Elaine Shi
Jonathan Katz, Andrew Miller, Elaine Shi
Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware
Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou
Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou
Relating Undisturbed Bits to Other Properties of Substitution Boxes
Rusydi H. Makarim, Cihangir Tezcan
Rusydi H. Makarim, Cihangir Tezcan
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner
David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner
Faster ECC over $\mathbb{F}_{2^{521}-1}$
Robert Granger, Michael Scott
Robert Granger, Michael Scott
Near Optimal Rate Homomorphic Encryption for Branching Programs
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks
Ryotaro Hayashi, Tatsuyuki Matsushita
Ryotaro Hayashi, Tatsuyuki Matsushita
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda
Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda
Reflections on Slide with a Twist Attacks
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Verifiable computation using multiple provers
Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish
Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish
Adaptively secure two-party computation from indistinguishability obfuscation
Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya
Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Sanjam Garg, Antigoni Polychroniadou
Sanjam Garg, Antigoni Polychroniadou
Solving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng
Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Explicit Non-malleable Codes Resistant to Permutations and Perturbations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Constrained PRFs for Unbounded Inputs
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
Koji Nuida, Naoto Itakura, Kaoru Kurosawa
Koji Nuida, Naoto Itakura, Kaoru Kurosawa
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Alhassan Khedr, Glenn Gulak, Vinod Vaikuntanathan
Alhassan Khedr, Glenn Gulak, Vinod Vaikuntanathan
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
Maciej Skorski
Maciej Skorski
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Maciej Skorski
Maciej Skorski
Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman
Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
Essam Ghadafi
Essam Ghadafi
Requirements for Standard Elliptic Curves
Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean, Ivica Nikolić, Thomas Peyrin
Jérémy Jean, Ivica Nikolić, Thomas Peyrin
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao
Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao
Additively Homomorphic UC commitments with Optimal Amortized Overhead
Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Zhengjun Cao, Zhenfu Cao, Lihua Liu
Zhengjun Cao, Zhenfu Cao, Lihua Liu
Interactive Coding for Interactive Proofs
Yevgeniy Dodis, Allison Bishop Lewko
Yevgeniy Dodis, Allison Bishop Lewko
Learning with Errors in the Exponent
Ozgur Dagdelen, Sebastian Gajek, Florian Gopfert
Ozgur Dagdelen, Sebastian Gajek, Florian Gopfert
Towards Optimal Bounds for Implicit Factorization Problem
Yao Lu, Liqiang Peng, Rui Zhang, Dongdai Lin
Yao Lu, Liqiang Peng, Rui Zhang, Dongdai Lin
Accountable Tracing Signatures
Markulf Kohlweiss, Ian Miers
Markulf Kohlweiss, Ian Miers
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Rafael Dowsley, Anderson C. A. Nascimento
Rafael Dowsley, Anderson C. A. Nascimento
Ballot secrecy with malicious bulletin boards
David Bernhard, Ben Smyth
David Bernhard, Ben Smyth
Non-malleable Reductions and Applications
Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
Operational Signature Schemes
Michael Backes, Ozgur Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder
Michael Backes, Ozgur Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder
Riding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov, Dhinakaran Vinayagamurthy
Sergey Gorbunov, Dhinakaran Vinayagamurthy
Circulant Matrices and Differential Privacy
Jalaj Upadhyay
Jalaj Upadhyay
Optimized Karatsuba Squaring on 8-bit AVR Processors
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
FHEW: Bootstrapping Homomorphic Encryption in less than a second
Léo Ducas, Daniele Micciancio
Léo Ducas, Daniele Micciancio
A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
Palash Sarkar, Shashank Singh
Palash Sarkar, Shashank Singh
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing
Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina
Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Dario Catalano, Dario Fiore
Dario Catalano, Dario Fiore
Search-and-compute on Encrypted Data
Jung Hee Cheon, Miran Kim, Myungsun Kim
Jung Hee Cheon, Miran Kim, Myungsun Kim
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Vincenzo Iovino, Karol Zebrowski
Vincenzo Iovino, Karol Zebrowski
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
Online/Off-line Ring Signature Scheme with Provable Security
Jayaprakash Kar
Jayaprakash Kar
Leakage-resilient non-malleable codes
Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Summation polynomial algorithms for elliptic curves in characteristic two
Steven D. Galbraith, Shishay W. Gebregiyorgis
Steven D. Galbraith, Shishay W. Gebregiyorgis
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Charanjit S. Jutla, Arnab Roy
Charanjit S. Jutla, Arnab Roy
Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
Jacob Alperin-Sheriff
Jacob Alperin-Sheriff
A Decentralized Public Key Infrastructure with Identity Retention
Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
Physical Characterization of Arbiter PUFs
Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties
Georgi Ivanov, Nikolay Nikolov, Svetla Nikova
Georgi Ivanov, Nikolay Nikolov, Svetla Nikova
Efficient Pairings and ECC for Embedded Systems
Thomas Unterluggauer, Erich Wenger
Thomas Unterluggauer, Erich Wenger
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
Tibor Jager
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
Michael Clear, Ciarán McGoldrick
Michael Clear, Ciarán McGoldrick
Tightly-Secure Authenticated Key Exchange
Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz, Stefan Dziembowski
Marcin Andrychowicz, Stefan Dziembowski
SPHINCS: practical stateless hash-based signatures
Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn
Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn
Efficient Identity-Based Encryption over NTRU Lattices
Léo Ducas, Vadim Lyubashevsky, Thomas Prest
Léo Ducas, Vadim Lyubashevsky, Thomas Prest
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
General Classification of the Authenticated Encryption Schemes for the CAESAR Competition
Farzaneh abed, Christian Forler, Stefan Lucks
Farzaneh abed, Christian Forler, Stefan Lucks
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof
Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan
Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Sarani Bhattacharya, Debdeep Mukhopadhyay
Sarani Bhattacharya, Debdeep Mukhopadhyay
Statistical Properties of the Square Map Modulo a Power of Two
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
Tuning GaussSieve for Speed
Robert Fitzpatrick, Christian Bischof, Johannes Buchmann, Ozgur Dagdelen, Florian Gopfert, Artur Mariano, Bo-Yin Yang
Robert Fitzpatrick, Christian Bischof, Johannes Buchmann, Ozgur Dagdelen, Florian Gopfert, Artur Mariano, Bo-Yin Yang
Another Tor is possible
Amadou Moctar Kane
Amadou Moctar Kane
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Chun Guo, Dongdai Lin
Chun Guo, Dongdai Lin
Divisible E-Cash Made Practical
Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
Weak Instances of PLWE
Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter
Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis
Raghavan Kumar, Philipp Jovanovic, Ilia Polian
Raghavan Kumar, Philipp Jovanovic, Ilia Polian
Tally-based simple decoders for traitor tracing and group testing
Boris Skoric
Boris Skoric
Deterministic Public-Key Encryption under Continual Leakage
Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
Implementing Cryptographic Program Obfuscation
Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
Anonymous IBE from Quadratic Residuosity with Improved Performance
Michael Clear, Hitesh Tewari, Ciarán McGoldrick
Michael Clear, Hitesh Tewari, Ciarán McGoldrick
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
Koji Nuida, Kaoru Kurosawa
Koji Nuida, Kaoru Kurosawa
How to Obfuscate Programs Directly
Joe Zimmerman
Joe Zimmerman
Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation
Artur Mariano, Shahar Timnat, Christian Bischof
Artur Mariano, Shahar Timnat, Christian Bischof
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
Alex J. Malozemoff, Jonathan Katz, Matthew D. Green
Alex J. Malozemoff, Jonathan Katz, Matthew D. Green
Obfuscating Low-Rank Matrix Branching Programs
Amit Sahai, Mark Zhandry
Amit Sahai, Mark Zhandry
Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps
Nuttapong Attrapadung
Nuttapong Attrapadung
Succinct Randomized Encodings and their Applications
Nir Bitansky, Sanjam Garg, Sidharth Telang
Nir Bitansky, Sanjam Garg, Sidharth Telang
AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation
Takaaki Mizuki, Yu-ichi Hayashi
Takaaki Mizuki, Yu-ichi Hayashi
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs
Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan
Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation
Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu
Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu
Algebraic Attacks on Human Identification Protocols
Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar, Josef Pieprzyk
Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar, Josef Pieprzyk
Succinct Garbling Schemes and Applications
Huijia Lin, Rafael Pass
Huijia Lin, Rafael Pass
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay, Aggelos Kiayias, Nikos Leonardos
Juan Garay, Aggelos Kiayias, Nikos Leonardos
One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
Jens Groth, Markulf Kohlweiss
Jens Groth, Markulf Kohlweiss
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun
Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun
Access Control in Publicly Verifiable Outsourced Computation
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
Cryptanalysis of Reduced-round SIMON32 and SIMON48
Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo
Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo
Montgomery Modular Multiplication on ARM-NEON Revisited
Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim
Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek
Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek
Cryptographic Reverse Firewalls
Ilya Mironov, Noah Stephens-Davidowitz
Ilya Mironov, Noah Stephens-Davidowitz
Adaptively Secure Broadcast Encryption with Small System Parameters
Mark Zhandry
Mark Zhandry
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
Samee Zahur, Mike Rosulek, David Evans
Samee Zahur, Mike Rosulek, David Evans
Computing Mod Without Mod
Mark A. Will, Ryan K. L. Ko
Mark A. Will, Ryan K. L. Ko
Bilinear Entropy Expansion from the Decisional Linear Assumption
Lucas Kowalczyk, Allison Bishop Lewko
Lucas Kowalczyk, Allison Bishop Lewko
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
Alonso Gonzalez-Ulloa, Alejandro Hevia
Alonso Gonzalez-Ulloa, Alejandro Hevia
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci
Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci
Higher-Order Threshold Implementations
Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Hardware Trojan Horses in Cryptographic IP Cores
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
Daniel E. Holcomb, Kevin Fu
Daniel E. Holcomb, Kevin Fu
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Mehmet Sabır Kiraz, Osmanbey Uzunkol
Mehmet Sabır Kiraz, Osmanbey Uzunkol
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
Decoy-based information security
Vladimir Shpilrain
Vladimir Shpilrain
Universal Signature Aggregators
Susan Hohenberger, Venkata Koppula, Brent Waters
Susan Hohenberger, Venkata Koppula, Brent Waters
Sieving for shortest vectors in lattices using angular locality-sensitive hashing
Thijs Laarhoven
Thijs Laarhoven
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
Benoit Libert, Marc Joye, Moti Yung, Thomas Peters
Benoit Libert, Marc Joye, Moti Yung, Thomas Peters
A survey of Fault Attacks in Pairing Based Cryptography
Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes
Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes
Eliminating Leakage in Reverse Fuzzy Extractors
André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
Non-existence of [n; 5] type Generalized Bent function.
Shashi Kant Pandey, P. R Mishra, B. K Dass
Shashi Kant Pandey, P. R Mishra, B. K Dass
SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers
Smile Markovski, Aleksandra Mileva, Vesna Dimitrova
Smile Markovski, Aleksandra Mileva, Vesna Dimitrova
A Very Compact FPGA Implementation of LED and PHOTON
N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann
N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann
Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings
SK Hafizul Islam, Abhishek Singh
SK Hafizul Islam, Abhishek Singh
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
Dealer-Leakage Resilient Verifiable Secret Sharing
Ruxandra F. Olimid
Ruxandra F. Olimid
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic
Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic
Augmented Learning with Errors: The Untapped Potential of the Error Term
Rachid El~Bansarkhani, Özgür Dagdelen, Johannes Buchmann
Rachid El~Bansarkhani, Özgür Dagdelen, Johannes Buchmann
Resizable Tree-Based Oblivious RAM
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
Secure modular password authentication for the web using channel bindings
Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham
Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham
Differentially Private Linear Algebra in the Streaming Model
Jalaj Upadhyay
Jalaj Upadhyay
Faster Binary-Field Multiplication and Faster Binary-Field MACs
Daniel J. Bernstein, Tung Chou
Daniel J. Bernstein, Tung Chou
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
Benjamin Smith
Benjamin Smith
CIARP: A RISC Processor For Cryptography Applications
Nima Karimpour Darav, Reza Ebrahimi Atani, Erfan Aghaei, Ahmad Tahmasivand, Mahsa Rahmani, Mina Moazzam Jazi
Nima Karimpour Darav, Reza Ebrahimi Atani, Erfan Aghaei, Ahmad Tahmasivand, Mahsa Rahmani, Mina Moazzam Jazi
Efficient Software Implementation of Ring-LWE Encryption
Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Protecting Encrypted Cookies from Compression Side-Channel Attacks
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
Yalin Chen, Jue-Sam Chou
Yalin Chen, Jue-Sam Chou
Differential Cryptanalysis of SipHash
Christoph Dobraunig, Florian Mendel, Martin Schläffer
Christoph Dobraunig, Florian Mendel, Martin Schläffer
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers
Zhengjun Cao, Zhenfu Cao
Zhengjun Cao, Zhenfu Cao
Adaptively Secure Constrained Pseudorandom Functions
Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters
Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters
Bivariate Polynomials Modulo Composites and their Applications
Dan Boneh, Henry Corrigan-Gibbs
Dan Boneh, Henry Corrigan-Gibbs
Square Span Programs with Applications to Succinct NIZK Arguments
George Danezis, Cedric Fournet, Jens Groth, Markulf Kohlweiss
George Danezis, Cedric Fournet, Jens Groth, Markulf Kohlweiss
How to Split a Secret into Unknown Shares
Ruxandra F. Olimid
Ruxandra F. Olimid
Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
Amir Moradi
Amir Moradi
Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
A comprehensive empirical comparison of parallel ListSieve and GaussSieve
Artur Mariano, Ozgur Dagdelen, Christian Bischof
Artur Mariano, Ozgur Dagdelen, Christian Bischof
Co-Location-Resistant Clouds
Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd
Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Mohammad Wazid
Mohammad Wazid
New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$
Masao KASAHARA
Masao KASAHARA
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Yehuda Lindell
Yehuda Lindell
A Note on Quantum Security for Post-Quantum Cryptography
Fang Song
Fang Song
Formal Treatment of Privacy-Enhancing Credential Systems
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
Analysis Of Variance and CPA in SCA
Sebastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles Ducharme, Philippe Maurine
Sebastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles Ducharme, Philippe Maurine
The Feasibility of Outsourced Database Search in the Plain Model
Carmit Hazay, Hila Zarosim
Carmit Hazay, Hila Zarosim
Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Christian Hanser, Daniel Slamanig
Christian Hanser, Daniel Slamanig
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su, Shuwang Lü, Daqiang Dong
Shenghui Su, Shuwang Lü, Daqiang Dong
Linearity Measures for MQ Cryptography
Simona Samardjiska, Danilo Gligoroski
Simona Samardjiska, Danilo Gligoroski
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
Benoit Feix, Hugues Thiebeauld
Benoit Feix, Hugues Thiebeauld
A Practical Iterative Side Channel Cube Attack on AES-128/256
Erfan Aghaee, Majid Rahimi, Hamed Yusefi
Erfan Aghaee, Majid Rahimi, Hamed Yusefi
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu
Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
Christina Boura, María Naya-Plasencia, Valentin Suder
Christina Boura, María Naya-Plasencia, Valentin Suder
HIMMO - A lightweight collusion-resistant key predistribution scheme
Oscar Garcia-Morchon, Domingo Gomez-Perez, Jaime Gutierrez, Ronald Rietman, Berry Schoenmakers, Ludo Tolhuizen
Oscar Garcia-Morchon, Domingo Gomez-Perez, Jaime Gutierrez, Ronald Rietman, Berry Schoenmakers, Ludo Tolhuizen
A Fully Homomorphic Encryption Scheme with Better Key Size
Zhigang Chen, Jian Wang, ZengNian Zhang, Xinxia Song
Zhigang Chen, Jian Wang, ZengNian Zhang, Xinxia Song
Security Proofs for the BLT Signature Scheme
Ahto Buldas, Risto Laanoja, Ahto Truu
Ahto Buldas, Risto Laanoja, Ahto Truu
Proof of Proximity of Knowledge
Serge Vaudenay
Serge Vaudenay
Malicious Hashing: Eve's Variant of SHA-1
Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, and Martin Schläffer
Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, and Martin Schläffer
Optimal Proximity Proofs
Ioana Boureanu, Serge Vaudenay
Ioana Boureanu, Serge Vaudenay
Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead
Enrique Larraia
Enrique Larraia
Integration of hardware tokens in the Idemix library
Antonio de la Piedra
Antonio de la Piedra
Efficient Interval Check in the Presence of Malicious Adversaries
Genqiang Wu, Yeping He, Yi Lu, Liping Ding
Genqiang Wu, Yeping He, Yi Lu, Liping Ding
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
Ahto Buldas, Risto Laanoja, Ahto Truu
Ahto Buldas, Risto Laanoja, Ahto Truu
White-Box AES Implementation Revisited
Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong
Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong
Reducing the Complexity of Normal Basis Multiplication
Omer Egecioglu, Cetin Kaya Koc
Omer Egecioglu, Cetin Kaya Koc
A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
Ming Li, Dongdai Lin
Ming Li, Dongdai Lin
Bit Security of the CDH Problems over Finite Field
Mingqiang Wang, Tao Zhan, Haibin Zhang
Mingqiang Wang, Tao Zhan, Haibin Zhang
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
Error-Tolerant Algebraic Side-Channel Attacks Using BEE
Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
A Unified Formalism for Physical Attacks
Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria
Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria
Improved Linear Cryptanalysis of Reduced-round SIMON
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen
Remarks on the Cryptographic Primitive of Attribute-based Encryption
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
A Note on the Bellare-Rivest Protocol for Translucent Cryptography
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
A Counterexample to the Chain Rule for Conditional HILL Entropy
Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
Attacks in Stream Ciphers: A Survey
Gustavo Banegas
Gustavo Banegas
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Zhen Liu, Zhenfu Cao, Duncan S. Wong
Zhen Liu, Zhenfu Cao, Duncan S. Wong
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby, Srinath Setty, Max Howald, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish
Riad S. Wahby, Srinath Setty, Max Howald, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang, Hubert Chan, Elaine Shi
Xiao Wang, Hubert Chan, Elaine Shi
SCORAM: Oblivious RAM for Secure Computation
Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, Elaine Shi
Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, Elaine Shi
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
On the Communication Complexity of Secure Function Evaluation with Long Output
Pavel Hubacek, Daniel Wichs
Pavel Hubacek, Daniel Wichs
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation
Ran Cohen, Yehuda Lindell
Ran Cohen, Yehuda Lindell
Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings
Yehuda Lindell, Ben Riva
Yehuda Lindell, Ben Riva
Functional Encryption Without Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves
William R. Trost, Guangwu Xu
William R. Trost, Guangwu Xu
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
Outsourced Pattern Matching
Sebastian Faust, Carmit Hazay, Daniele Venturi
Sebastian Faust, Carmit Hazay, Daniele Venturi
One-Round Deniable Key Exchange with Perfect Forward Security
Weiqiang Wen, Libin Wang, Min Xie
Weiqiang Wen, Libin Wang, Min Xie
Interactive Proofs under Continual Memory Leakage
Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
On the Primitivity of Trinomials over Small Finite Fields
YUjuan Li, Jinhua Zhao, Huaifu Wang
YUjuan Li, Jinhua Zhao, Huaifu Wang
The Adjacency Graphs of Some Feedback Shift Registers
Ming Li, Yupeng Jiang, Dongdai Lin
Ming Li, Yupeng Jiang, Dongdai Lin
On the cycle decomposition of the WG-NLFSR
YUjuan Li, Wnehua Shen, Huaifu Wang, Peipei Zhou
YUjuan Li, Wnehua Shen, Huaifu Wang, Peipei Zhou
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Itai Dinur
Itai Dinur
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
Bo Zhu, Xinxin Fan, Guang Gong
Bo Zhu, Xinxin Fan, Guang Gong
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay
Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay
Mersenne factorization factory
Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra
Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra
A Dynamic Cube Attack on $105$ round Grain v1
Subhadeep Banik
Subhadeep Banik
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
Pavol Zajac
Pavol Zajac
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
An Equivalent Condition on the Switching Construction of Differentially $4$-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function
Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu
Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu
Universally Composable Secure Group Communication
Youliang Tian, Changgen Peng
Youliang Tian, Changgen Peng
High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems
Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Pao, Ingrid Verbauwhede
Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Pao, Ingrid Verbauwhede
Graph-Induced Multilinear Maps from Lattices
Craig Gentry, Sergey Gorbunov, Shai Halevi
Craig Gentry, Sergey Gorbunov, Shai Halevi
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai
On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
Ashok Kumar Das
Ashok Kumar Das
Balanced permutations Even-Mansour ciphers
Shoni Gilboa, Shay Gueron
Shoni Gilboa, Shay Gueron
The Multiple Number Field Sieve with Conjugation Method
Cécile Pierrot
Cécile Pierrot
Revocation in Publicly Verifiable Outsourced Computation
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines
Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
Substring-Searchable Symmetric Encryption
Melissa Chase, Emily Shen
Melissa Chase, Emily Shen
Generic Hardness of the Multiple Discrete Logarithm Problem
Aaram Yun
Aaram Yun
Improved Timing Attacks on ECDSA
Vikram Singh
Vikram Singh
Type 2 Structure-Preserving Signature Schemes Revisited
Sanjit Chatterjee, Alfred Menezes
Sanjit Chatterjee, Alfred Menezes
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
Hongda Li, Qihua Niu, Guifang Huang
Hongda Li, Qihua Niu, Guifang Huang
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity
Ran Canetti, Abhishek Jain, Omer Paneth
Ran Canetti, Abhishek Jain, Omer Paneth
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
Zipf’s Law in Passwords
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
Peeter Laud
Peeter Laud
Two-factor authentication for the Bitcoin protocol
Christopher Mann, Daniel Loebenberger
Christopher Mann, Daniel Loebenberger
An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai
Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
Debrup Chakraborty, Palash Sarkar
Debrup Chakraborty, Palash Sarkar
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
Daniel Genkin, Itamar Pipman, Eran Tromer
Daniel Genkin, Itamar Pipman, Eran Tromer
Pretty Understandable Democracy 2.0
Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
Privacy with Imperfect Randomness
Yevgeniy Dodis, Yanqing Yao
Yevgeniy Dodis, Yanqing Yao
Fully Secure Attribute Based Encryption from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi
Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi
The M3dcrypt Password Hashing Function
Isaiah Makwakwa
Isaiah Makwakwa
THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
Mohammad Sadegh Nemati Nia, Ali Payandeh
Mohammad Sadegh Nemati Nia, Ali Payandeh
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
Florian Böhl, Simon Greiner, Patrik Scheidecker
Florian Böhl, Simon Greiner, Patrik Scheidecker
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk
Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk
Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Zhen Liu, Duncan S. Wong
Zhen Liu, Duncan S. Wong
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults
Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas
Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)
Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
A Security Analysis of the Composition of ChaCha20 and Poly1305
Gordon Procter
Gordon Procter
Attribute-Based Encryption Optimized for Cloud Computing
Máté Horváth
Máté Horváth
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation
Shlomi Dolev, Niv Gilboa, Ximing Li
Shlomi Dolev, Niv Gilboa, Ximing Li
Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation
Craig Gentry
Craig Gentry
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
A Multi-Function Provable Data Possession Scheme in Cloud Computing
Xiaojun Yu, Qiaoyan Wen
Xiaojun Yu, Qiaoyan Wen
On the Limitations of Computational Fuzzy Extractors
Kenji Yasunaga, Kosuke Yuzawa
Kenji Yasunaga, Kosuke Yuzawa
Private Web Search with Constant Round Efficiency
Bolam Kang, Sung Cheol Goh, Myungsun Kim
Bolam Kang, Sung Cheol Goh, Myungsun Kim
Recursive Trees for Practical ORAM
Tarik Moataz, Erik-Oliver Blass, Guevara Noubir
Tarik Moataz, Erik-Oliver Blass, Guevara Noubir
A Cryptographic Study of Tokenization Systems
Sandra Diaz-Santiago, Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
Sandra Diaz-Santiago, Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
Adaptive versus Static Security in the UC Model
Ivan Damgård, Jesper Buus Nielsen
Ivan Damgård, Jesper Buus Nielsen
DTKI: a new formalized PKI with no trusted parties
Jiangshan Yu, Vincent Cheval, Mark Ryan
Jiangshan Yu, Vincent Cheval, Mark Ryan
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi
Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi
Invisible Adaptive Attacks
Jesper Buus Nielsen, Mario Strefler
Jesper Buus Nielsen, Mario Strefler
Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
Marina Blanton, Siddharth Saraph
Marina Blanton, Siddharth Saraph
Scalable Zero Knowledge via Cycles of Elliptic Curves
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
Oblivious Parallel RAM and Applications
Elette Boyle, Kai-Min Chung, Rafael Pass
Elette Boyle, Kai-Min Chung, Rafael Pass
Improved Exponential-time Algorithms for Inhomogeneous-SIS
Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield
Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield
Multiprecision multiplication on AVR revisited
Michael Hutter, Peter Schwabe
Michael Hutter, Peter Schwabe
Compact and Side Channel Secure Discrete Gaussian Sampling
Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, Ingrid Verbauwhede
Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, Ingrid Verbauwhede
Automated algebraic analysis of structure-preserving signature schemes
Joeri de Ruiter
Joeri de Ruiter
Authenticated Key Exchange from Ideal Lattices
Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
A Punctured Programming Approach to Adaptively Secure Functional Encryption
Brent Waters
Brent Waters
Non-interactive zero-knowledge proofs in the quantum random oracle model
Dominique Unruh
Dominique Unruh
An Algebraic Approach to Non-Malleability
Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
The SPEKE Protocol Revisited
Feng Hao, Siamak F. Shahandashti
Feng Hao, Siamak F. Shahandashti
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
Olivier Blazy, Eike Kiltz, Jiaxin Pan
Olivier Blazy, Eike Kiltz, Jiaxin Pan
The Hunting of the SNARK
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer
Scan Based Side Channel Attack on Grain v1
Sonu Kumar Jha
Sonu Kumar Jha
The Exact PRF-Security of NMAC and HMAC
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Peter Gaži, Krzysztof Pietrzak, Michal Rybár
Reducing Communication Overhead of the Subset Difference Scheme
Sanjay Bhattacherjee, Palash Sarkar
Sanjay Bhattacherjee, Palash Sarkar
Vernam Two
Dan P. Milleville
Dan P. Milleville
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Security Analysis of Multilinear Maps over the Integers
Hyung Tae Lee, Jae Hong Seo
Hyung Tae Lee, Jae Hong Seo
A new public key system based on Polynomials over finite fields GF(2)
Gurgen Khachatrian
Gurgen Khachatrian
On the Optimality of Differential Fault Analyses on CLEFIA
Juliane Krämer, Anke Stüber, Ágnes Kiss
Juliane Krämer, Anke Stüber, Ágnes Kiss
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
Deja Q: Using Dual Systems to Revisit q-Type Assumptions
Melissa Chase, Sarah Meiklejohn
Melissa Chase, Sarah Meiklejohn
Fast Lattice Point Enumeration with Minimal Overhead
Daniele Micciancio, Michael Walter
Daniele Micciancio, Michael Walter
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
Masao KASAHARA
Masao KASAHARA
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation
Hiroaki Anada, Seiko Arita, Kouichi Sakurai
Hiroaki Anada, Seiko Arita, Kouichi Sakurai
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Daniel Augot, Matthieu Finiasz
Daniel Augot, Matthieu Finiasz
Kangaroos in Side-Channel Attacks
Tanja Lange, Christine van Vredendaal, Marnix Wakker
Tanja Lange, Christine van Vredendaal, Marnix Wakker
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
Massoud Hadian Dehkordi, Reza Ghasemi
Massoud Hadian Dehkordi, Reza Ghasemi
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Aleksandar Kircanski
Aleksandar Kircanski
hHB: a Harder HB+ Protocol
Ka Ahmad Khoureich
Ka Ahmad Khoureich
Performance Increasing Approaches For Binary Field Inversion
Vladislav Kovtun, Maria Bulakh
Vladislav Kovtun, Maria Bulakh
Towards Forward Security Properties for PEKS and IBE
Qiang Tang
Qiang Tang
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
Pablo Rauzy, Sylvain Guilley
Pablo Rauzy, Sylvain Guilley
Double shielded Public Key Cryptosystems
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin, Weijian Wang
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin, Weijian Wang
Round-Efficient Black-Box Construction of Composable Multi-Party Computation
Susumu Kiyoshima
Susumu Kiyoshima
Securing Cloud Data in the New Attacker Model
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
On Virtual Grey Box Obfuscation for General Circuits
Nir Bitansky, Ran Canetti, Yael Tauman-Kalai, Omer Paneth
Nir Bitansky, Ran Canetti, Yael Tauman-Kalai, Omer Paneth
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti, Asaf Cohen, Yehuda Lindell
Ran Canetti, Asaf Cohen, Yehuda Lindell
Efficient Record-Level Keyless Signatures for Audit Logs
Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards
Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
Function-Private Functional Encryption in the Private-Key Setting
Zvika Brakerski, Gil Segev
Zvika Brakerski, Gil Segev
New Attacks on the RSA Cryptosystem
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
Implicit factorization of unbalanced RSA moduli
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin
Authentication Codes Based on Resilient Boolean Maps
Juan Carlos Ku-Cauich, Guillermo Morales-Luna
Juan Carlos Ku-Cauich, Guillermo Morales-Luna
Anonymous and Publicly Linkable Reputation Systems
Johannes Blömer, Jakob Juhnke, Christina Kolb
Johannes Blömer, Jakob Juhnke, Christina Kolb
Solving closest vector instances using an approximate shortest independent vectors oracle
Chengliang Tian, Wei Wei, Dongdai Lin
Chengliang Tian, Wei Wei, Dongdai Lin
Secure Mutual Testing Strategy for Cryptographic SoCs
Amitabh Das, Dusko Karaklajic, Ingrid Verbauwhede
Amitabh Das, Dusko Karaklajic, Ingrid Verbauwhede
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
On the Multi-output Filtering Model and Its Applications
Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu
Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
Optimized Architecture for AES
Abhijith P. S, Dr. Manish Goswami, S. Tadi, Kamal Pandey
Abhijith P. S, Dr. Manish Goswami, S. Tadi, Kamal Pandey
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang
Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang
A Secure Cloud-based NFC Mobile Payment Protocol
pardis pourghomi, muhammad qasim saeed, george ghinea
pardis pourghomi, muhammad qasim saeed, george ghinea
Constrained Verifiable Random Functions
Georg Fuchsbauer
Georg Fuchsbauer
A Survey and New Results on the Decomposition of an NFSR into a Cascade Connection of Two Smaller NFSRs
Tian Tian, Jia-Min Zhang, Chen-Dong Ye, Wen-Feng Qi
Tian Tian, Jia-Min Zhang, Chen-Dong Ye, Wen-Feng Qi
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Massimo Chenal, Qiang Tang
Massimo Chenal, Qiang Tang
Differential Power Analysis of a McEliece Cryptosystem
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions
Jaiganesh Balasundaram
Jaiganesh Balasundaram
On the Pitfalls of using Arbiter-PUFs as Building Blocks
Georg T. Becker
Georg T. Becker
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
Paolo Palmieri, Luca Calderoni, Dario Maio
Paolo Palmieri, Luca Calderoni, Dario Maio
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
Leakage-Resilient Signatures with Graceful Degradation
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
Annelie Heuser, Olivier Rioul, Sylvain Guilley
Annelie Heuser, Olivier Rioul, Sylvain Guilley
Curve41417: Karatsuba revisited
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
Differential Analysis on Block Cipher PRIDE
Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong
Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong
Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Chunming Tang, Yanfeng Qi
Chunming Tang, Yanfeng Qi
Fully Secure and Fast Signing from Obfuscation
Kim Ramchen, Brent Waters
Kim Ramchen, Brent Waters
Constrained Pseudorandom Functions: Verifiable and Delegatable
Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger, Venkata Koppula, Brent Waters
Susan Hohenberger, Venkata Koppula, Brent Waters
Squares of Random Linear Codes
Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Gilles Zémor
Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Gilles Zémor
Realizing Pico: Finally No More Passwords!
Jens Hermans, Roel Peeters
Jens Hermans, Roel Peeters
Cryptography from Compression Functions: The UCE Bridge to the ROM
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
On the Classification of Finite Boolean Functions up to Fairness
Nikolaos Makriyannis
Nikolaos Makriyannis
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Nasrollah Pakniat, Ziba Eslami, Mehrdad Nojoumian
Nasrollah Pakniat, Ziba Eslami, Mehrdad Nojoumian
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili
Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
Noboru Kunihiro, Junya Honda
Noboru Kunihiro, Junya Honda
Rmind: a tool for cryptographically secure statistical analysis
Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
Johannes Blömer, Gennadij Liske
Johannes Blömer, Gennadij Liske
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
Privacy preserving delegated word search in the cloud
Kaoutar Elkhiyaoui, Melek Onen, Refik Molva
Kaoutar Elkhiyaoui, Melek Onen, Refik Molva
Reversing Stealthy Dopant-Level Circuits
Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino
Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino
How to Generate and use Universal Samplers
Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
Finding Roots in GF(p^n) with the Successive Resultant Algorithm
Christophe Petit
Christophe Petit
On the quaternion $\ell$-isogeny path problem
David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
A Provable Security Analysis of Intel's Secure Key RNG
Thomas Shrimpton, R. Seth Terashima
Thomas Shrimpton, R. Seth Terashima
Efficient Hidden Vector Encryption with Constant-Size Ciphertext
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
What's the Gist? Privacy-Preserving Aggregation of User Profiles
Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun
Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun
WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
Markku--Juhani O. Saarinen, Billy Bob Brumley
Markku--Juhani O. Saarinen, Billy Bob Brumley
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang, Chunming Tang
Can Xiang, Chunming Tang
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
Mehmet Sabır Kiraz, Ziya Alper Genç, Süleyman Kardaş
Mehmet Sabır Kiraz, Ziya Alper Genç, Süleyman Kardaş
Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
Souvik Kolay, Debdeep Mukhopadhyay
Souvik Kolay, Debdeep Mukhopadhyay
NREPO:Normal Basis Recomputing with Permuted Operands
Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri
Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
Improved Short Lattice Signatures in the Standard Model
Léo Ducas, Daniele Micciancio
Léo Ducas, Daniele Micciancio
Hardness of k-LWE and Applications in Traitor Tracing
San Ling, Duong Hieu Phan, Damien Stehle, Ron Steinfeld
San Ling, Duong Hieu Phan, Damien Stehle, Ron Steinfeld
Arithmetic on Abelian and Kummer Varieties
David Lubicz, Damien Robert
David Lubicz, Damien Robert
Fault attacks on pairing-based protocols revisited
Sanjit Chatterjee, Koray Karabina, Alfred Menezes
Sanjit Chatterjee, Koray Karabina, Alfred Menezes
Bootstrappable Identity-Based Fully Homomorphic Encryption
Michael Clear, Ciarán McGoldrick
Michael Clear, Ciarán McGoldrick
Universally Composable secure TNC protocol based on IF-T binding to TLS
Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge
Dan Ding, Guizhen Zhu, Xiaoyun Wang
Dan Ding, Guizhen Zhu, Xiaoyun Wang
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
Adeline Langlois, Damien Stehle, Ron Steinfeld
Adeline Langlois, Damien Stehle, Ron Steinfeld
Binary Elligator Squared
Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
An Improved Truncated Differential Cryptanalysis of KLEIN
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, Mohammad Reza Aref
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, Mohammad Reza Aref
Sealing the Leak on Classical NTRU Signatures
Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit
Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Differentially Private Data Aggregation with Optimal Utility
Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
Universally Composable Non-Interactive Key Exchange
Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz
Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
Giorgia Azzurra Marson, Bertram Poettering
Giorgia Azzurra Marson, Bertram Poettering
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum, Eyal Widder
Benny Applebaum, Eyal Widder
Relaxed Two-to-one Recoding Schemes
Omkant Pandey, Kim Ramchen, Brent Waters
Omkant Pandey, Kim Ramchen, Brent Waters
Simon's Circuit
Paul Baecher
Paul Baecher
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Imran Erguler
Imran Erguler
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich
Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
How to Watermark Cryptographic Functions
Ryo Nishimaki
Ryo Nishimaki
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au
Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au
Homomorphic Signatures with Efficient Verification for Polynomial Functions
Dario Catalano, Dario Fiore, Bogdan Warinschi
Dario Catalano, Dario Fiore, Bogdan Warinschi
Privacy-Preserving Auditing for Attribute-Based Credentials
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler, Thomas Schneider, Michael Zohner
Daniel Demmler, Thomas Schneider, Michael Zohner
On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
Samir Bouftass, Abdelhak Azhari
Samir Bouftass, Abdelhak Azhari
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Jie Chen, Hoeteck Wee
Jie Chen, Hoeteck Wee
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
(Leveled) Fully Homomorphic Signatures from Lattices
Sergey Gorbunov, Vinod Vaikuntanathan
Sergey Gorbunov, Vinod Vaikuntanathan
Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps
Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
Provably secure and efficient certificateless signature in the standard model
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
FleXOR: Flexible garbling for XOR gates that beats free-XOR
Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek
Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek
Template Attacks on Different Devices
Omar Choudary, Markus G. Kuhn
Omar Choudary, Markus G. Kuhn
Automated Analysis of Cryptographic Assumptions in Generic Group Models
Gilles Barthe, Edvard Fagerholm, Dario Fiore, John Mitchell, Andre Scedrov, Benedikt Schmidt
Gilles Barthe, Edvard Fagerholm, Dario Fiore, John Mitchell, Andre Scedrov, Benedikt Schmidt
Transcript secure signatures based on modular lattices
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
Verified Implementations for Secure and Verifiable Computation
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire, Pierre-Yves Strub
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire, Pierre-Yves Strub
Single-shot security for one-time memories in the isolated qubits model
Yi-Kai Liu
Yi-Kai Liu
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
Amir Moradi, Vincent Immler
Amir Moradi, Vincent Immler
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version
Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld
Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld
Leveled Fully Homomorphic Signatures from Standard Lattices
Daniel Wichs
Daniel Wichs
Optimized Implementation of General Secret Sharing Scheme
Lein Harn, Ching-Fang Hsu
Lein Harn, Ching-Fang Hsu
Related Key Secure PKE from Hash Proof Systems
Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao
Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao
Faster Private Set Intersection based on OT Extension
Benny Pinkas, Thomas Schneider, Michael Zohner
Benny Pinkas, Thomas Schneider, Michael Zohner
4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
Valerie Nachef, Jacques Patarin, Emmanuel Volte
Valerie Nachef, Jacques Patarin, Emmanuel Volte
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp
Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
Aanchal Malhotra, Sharon Goldberg
Aanchal Malhotra, Sharon Goldberg
Minimizing the Two-Round Even-Mansour Cipher
Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger
Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger
Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
Xing Hu, Chunming Tang
Xing Hu, Chunming Tang
Improved Generic Attacks Against Hash-based MACs and HAIFA
Itai Dinur, Gaëtan Leurent
Itai Dinur, Gaëtan Leurent
Double Level Montgomery Cox-Rower Architecture, New Bounds
Jean-Claude Bajard, Nabil Merkiche
Jean-Claude Bajard, Nabil Merkiche
Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
Chunming Tang, Yuenai Chen
Chunming Tang, Yuenai Chen
Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare, Kenneth Paterson, Phillip Rogaway
Mihir Bellare, Kenneth Paterson, Phillip Rogaway
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
Synthesis of Fault Attacks on Cryptographic Implementations
Gilles Barthe, Francois Dupressoir, Pierre-Alain Fouque, Benjamin Gregoire, Jean-Christophe Zapalowicz
Gilles Barthe, Francois Dupressoir, Pierre-Alain Fouque, Benjamin Gregoire, Jean-Christophe Zapalowicz
Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
Just a Little Bit More
Joop van de Pol, Nigel P. Smart, Yuval Yarom
Joop van de Pol, Nigel P. Smart, Yuval Yarom
A Statistical Model for Higher Order DPA on Masked Devices
A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
Universally Composable Authentication and Key-exchange with Global PKI
Ran Canetti, Daniel Shahaf, Margarita Vald
Ran Canetti, Daniel Shahaf, Margarita Vald
A Low-Latency, Low-Area Hardware Oblivious RAM Controller
Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios Serpanos, Srinivas Devadas
Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios Serpanos, Srinivas Devadas
Revisiting the Gentry-Szydlo Algorithm
H. W. Lenstra, A. Silverberg
H. W. Lenstra, A. Silverberg
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Nuttapong Attrapadung
Nuttapong Attrapadung
Fast point multiplication algorithms for binary elliptic curves with and without precomputation
Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård, Sunoo Park
Ivan Damgård, Sunoo Park
Note of Multidimensional MITM Attack on 25-Round TWINE-128
Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen
Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen
Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants
Craig Costello, Alyson Deines-Schartz, Kristin Lauter, Tonghai Yang
Craig Costello, Alyson Deines-Schartz, Kristin Lauter, Tonghai Yang
The Hash Function "Fugue"
Shai Halevi, William E. Hall, Charanjit S. Jutla
Shai Halevi, William E. Hall, Charanjit S. Jutla
System-level non-interference for constant-time cryptography
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
FNR : Arbitrary length small domain block cipher proposal
Sashank Dara, Scott Fluhrer
Sashank Dara, Scott Fluhrer
Bounded Fully Homomorphic Signature Schemes
Xiang Xie, Rui Xue
Xiang Xie, Rui Xue
FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve
Jérémie Detrey
Jérémie Detrey
A Simple Recursive Tree Oblivious RAM
Benny Pinkas, Tzachy Reinman
Benny Pinkas, Tzachy Reinman
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions
Inna Polak, Adi Shamir
Inna Polak, Adi Shamir
Adaptive Security of Constrained PRFs
Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
Virtual Proofs of Reality
Ulrich Rührmair
Ulrich Rührmair
A Security Proof of KCDSA using an extended Random Oracle Model
Vikram Singh
Vikram Singh
On the Cost of Lazy Engineering for Masked Software Implementations
Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville
François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar
Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar
Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
Moments-Correlating DPA
Amir Moradi, François-Xavier Standaert
Amir Moradi, François-Xavier Standaert
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
Emmanuela Orsini, Joop van de Pol, Nigel P. Smart
Emmanuela Orsini, Joop van de Pol, Nigel P. Smart
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
New Generic Attacks Against Hash-based MACs
Gaëtan Leurent, Thomas Peyrin, Lei Wang
Gaëtan Leurent, Thomas Peyrin, Lei Wang
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Chris Brzuska, Arno Mittelbach
Chris Brzuska, Arno Mittelbach
Large-Scale Secure Computation
Elette Boyle, Kai-Min Chung, Rafael Pass
Elette Boyle, Kai-Min Chung, Rafael Pass
Generic Universal Forgery Attack on Iterative Hash-based MACs
Thomas Peyrin, Lei Wang
Thomas Peyrin, Lei Wang
On the Existence of Extractable One-Way Functions
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
Software implementation of an Attribute-Based Encryption scheme
Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez
Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez
Composable Oblivious Extended Permutations
Peeter Laud, Jan Willemson
Peeter Laud, Jan Willemson
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Dustin Moody, Ray Perlner, Daniel Smith-Tone
Dustin Moody, Ray Perlner, Daniel Smith-Tone
Differential Properties of the HFE Cryptosystem
Taylor Daniels, Daniel Smith-Tone
Taylor Daniels, Daniel Smith-Tone
Cofactorization on Graphics Processing Units
Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs
Helger Lipmaa
Helger Lipmaa
Lightweight and Privacy-Preserving Delegatable Proofs of Storage
Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong
Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong
Relational Hash
Avradip Mandal, Arnab Roy
Avradip Mandal, Arnab Roy
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
Black-Box Non-Black-Box Zero Knowledge
Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti
Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti
Accelerating NTRU based Homomorphic Encryption using GPUs
Wei Dai, Yarkın Doröz, Berk Sunar
Wei Dai, Yarkın Doröz, Berk Sunar
Finding collisions for MD4 hash algorithm using hybrid algorithm
Marko Carić
Marko Carić
New candidates for multivariate trapdoor functions
Jaiberth Porras, John B. Baena, Jintai Ding
Jaiberth Porras, John B. Baena, Jintai Ding
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
Jacobian Coordinates on Genus 2 Curves
Huseyin Hisil, Craig Costello
Huseyin Hisil, Craig Costello
Yao's millionaires' problem and decoy-based public key encryption by classical physics
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Younsung Choi, Dongho Won
Younsung Choi, Dongho Won
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
Felix Günther, Mark Manulis, Andreas Peter
Felix Günther, Mark Manulis, Andreas Peter
Using Indistinguishability Obfuscation via UCEs
Chris Brzuska, Arno Mittelbach
Chris Brzuska, Arno Mittelbach
Efficient Adaptively Secure IBBE from Standard Assumptions
Somindu C. Ramanna, Palash Sarkar
Somindu C. Ramanna, Palash Sarkar
Hyper-and-elliptic-curve cryptography
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
SK Hafizul Islam
SK Hafizul Islam
Logic Synthesis based Public Key Scheme
Boaz Shahar
Boaz Shahar
How Secure is Deterministic Encryption?
Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
Optimal Contracts for Outsourced Computation
Viet Pham, MHR. Khouzani, Carlos Cid
Viet Pham, MHR. Khouzani, Carlos Cid
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic, Atul Luykx, Bart Mennink
Philipp Jovanovic, Atul Luykx, Bart Mennink
Fully secure constrained pseudorandom functions using random oracles
Dennis Hofheinz
Dennis Hofheinz
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
Christophe Doche
Christophe Doche
Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
Michèle Feltz, Cas Cremers
Michèle Feltz, Cas Cremers
Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster
Erich Wenger, Paul Wolfger
Erich Wenger, Paul Wolfger
Redefining the Transparency Order
Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff
Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
Younsung Choi, Dongho Won
Younsung Choi, Dongho Won
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
Luke Mather, Elisabeth Oswald, Carolyn Whitnall
Luke Mather, Elisabeth Oswald, Carolyn Whitnall
Deleting Secret Data with Public Verifiability
Feng Hao, Dylan Clarke, Avelino Francisco Zorzo
Feng Hao, Dylan Clarke, Avelino Francisco Zorzo
Forging Attacks on two Authenticated Encryptions COBRA and POET
Mridul Nandi
Mridul Nandi
Nothing is for Free: Security in Searching Shared & Encrypted Data
Qiang Tang
Qiang Tang
New Results in the Linear Cryptanalysis of DES
Igor Semaev
Igor Semaev
McEliece in the world of Escher
Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev
Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev
Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
Eduardo Ruiz Duarte, Octavio Páez Osuna
Eduardo Ruiz Duarte, Octavio Páez Osuna
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won
Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won
Simulatable Leakage: Analysis, Pitfalls, and new Constructions
J. Longo Galea, D. Martin, E. Oswald, D. Page, M. Stam, M. Tunstall
J. Longo Galea, D. Martin, E. Oswald, D. Page, M. Stam, M. Tunstall
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
Graph-theoretic design and analysis of key predistribution schemes
Michelle Kendall, Keith M. Martin
Michelle Kendall, Keith M. Martin
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
Ray Perlner
Ray Perlner
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
Multi-Vendor PayWord with Payment Approval
Andrea Huszti
Andrea Huszti
Secret and Verifiable Delegated Voting for Wide Representation
Yefim Leifman
Yefim Leifman
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Franziskus Kiefer, Mark Manulis
Franziskus Kiefer, Mark Manulis
Zerocash: Decentralized Anonymous Payments from Bitcoin
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Helger Lipmaa
Helger Lipmaa
One-Way Functions and (Im)perfect Obfuscation
Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev
Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev
Time-Memory Trade-offs for Index Calculus in Genus 3
Kim Laine, Kristin Lauter
Kim Laine, Kristin Lauter
Private Database Access With HE-over-ORAM Architecture
Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
Toward Robust Hidden Volumes using Write-Only Oblivious RAM
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu
Solving Linear Equations Modulo Unknown Divisors: Revisited
Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin
Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
A Strong and Efficient Certificateless Digital Signature Scheme
Mohammed Alfateh Hassouna, Mohsin Hashim
Mohammed Alfateh Hassouna, Mohsin Hashim
Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
Yi Deng
Yi Deng
A Tamper and Leakage Resilient von Neumann Architecture
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
Related Randomness Attacks for Public Key Encryption
Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn
Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn
Private Predictive Analysis on Encrypted Medical Data
Joppe W. Bos, Kristin Lauter, Michael Naehrig
Joppe W. Bos, Kristin Lauter, Michael Naehrig
SHADOW NUMBERS PUBLIC KEY ENCRYPTION
John Almeida
John Almeida
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
Rachid El Bansarkhani, Johannes Buchmann
Rachid El Bansarkhani, Johannes Buchmann
An optimal representation for the trace zero subgroup
Elisa Gorla, Maike Massierer
Elisa Gorla, Maike Massierer
How to Choose Interesting Points for Template Attacks?
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
Machine Learning Classification over Encrypted Data
Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser
Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser
Noncentralized Cryptocurrency wtih No Blockchain
qianxiaochao
qianxiaochao
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Berry Schoenmakers
Berry Schoenmakers
Affine-evasive Sets Modulo a Prime
Divesh Aggarwal
Divesh Aggarwal
An Optimal Strong Password Authentication Protocol with USB Sticks
Vikram D
Vikram D
FeW: A Lightweight Block Cipher
Manoj Kumar, Saibal K Pal, Anupama Panigrahi
Manoj Kumar, Saibal K Pal, Anupama Panigrahi
A practical forgery and state recovery attack on the authenticated cipher PANDA-s
Xiutao FENG, Fan ZHANG, Hui WANG
Xiutao FENG, Fan ZHANG, Hui WANG
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi
Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi
Some Remarks on Honeyword Based Password-Cracking Detection
Imran Erguler
Imran Erguler
Coding Theoretic Construction of Quantum Ramp Secret Sharing
Ryutaroh Matsumoto
Ryutaroh Matsumoto
Efficient Quantum-Immune Keyless Signatures with Identity
Ahto Buldas, Risto Laanoja, Ahto Truu
Ahto Buldas, Risto Laanoja, Ahto Truu
Improved Differential Cryptanalysis of Round-Reduced Speck
Itai Dinur
Itai Dinur
Preimage attacks on Reduced-round Stribog
Riham AlTawy, Amr M. Youssef
Riham AlTawy, Amr M. Youssef
Index calculus in the trace zero variety
Elisa Gorla, Maike Massierer
Elisa Gorla, Maike Massierer
Analysis of NORX: Investigating Differential and Rotational Properties
Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
Explicit Non-Malleable Codes Resistant to Permutations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
Bartosz Zoltak
Bartosz Zoltak
Improved Leakage Model Based on Genetic Algorithm
Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu
Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu
On the Complexity of Finding Low-Level Solutions
Bjoern Grohmann
Bjoern Grohmann
Structure-Preserving Signatures from Type II Pairings
Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
Exponent-inversion Signatures and IBE under Static Assumptions
Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu Ming Yiu
Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu Ming Yiu
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
Yu Chen, Qiong Huang, Zongyang Zhang
Yu Chen, Qiong Huang, Zongyang Zhang
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry, Allison Lewko, Amit Sahai, Brent Waters
Craig Gentry, Allison Lewko, Amit Sahai, Brent Waters
The Locality of Searchable Symmetric Encryption
David Cash, Stefano Tessaro
David Cash, Stefano Tessaro
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni
Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen, Zongyang Zhang
Yu Chen, Zongyang Zhang
Collision Attack on 5 Rounds of Grøstl
Florian Mendel, Vincent Rijmen, Martin Schläffer
Florian Mendel, Vincent Rijmen, Martin Schläffer
Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead
Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems
SK Hafizul Islam
SK Hafizul Islam
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Maria Eichlseder, Florian Mendel, and Martin Schläffer
Maria Eichlseder, Florian Mendel, and Martin Schläffer
How to Avoid Obfuscation Using Witness PRFs
Mark Zhandry
Mark Zhandry
On the Powers of 2
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
Pipelineable On-Line Encryption
Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
Andris Ambainis, Ansis Rosmanis, Dominique Unruh
Andris Ambainis, Ansis Rosmanis, Dominique Unruh
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
Nir Bitansky, Omer Paneth
Nir Bitansky, Omer Paneth
The M3lcrypt Password Based Key Derivation Function
Isaiah Makwakwa
Isaiah Makwakwa
An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol
Xi-Jun Lin, Lin Sun
Xi-Jun Lin, Lin Sun
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
Leibo Li, Keting Jia
Leibo Li, Keting Jia
Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
Antonio Sanso
Antonio Sanso
Reliable Broadcast with Respect to Topology Knowledge
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Ivan Damgaard, Rasmus Lauritsen, Tomas Toft
Ivan Damgaard, Rasmus Lauritsen, Tomas Toft
Resilient Aggregation in Simple Linear Sensor Networks
Kevin J. Henry, Douglas R. Stinson
Kevin J. Henry, Douglas R. Stinson
Active and Passive Side-Channel Attacks on Delay Based PUF Designs
Georg T. Becker, Raghavan Kumar
Georg T. Becker, Raghavan Kumar
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
Martin Stanek
Martin Stanek
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
David Derler, Christian Hanser, Daniel Slamanig
David Derler, Christian Hanser, Daniel Slamanig
Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way
Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramaniam
Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramaniam
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
Nicolas Gama, Malika Izabachene, Phong Q. Nguyen, Xiang Xie
Nicolas Gama, Malika Izabachene, Phong Q. Nguyen, Xiang Xie
On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation
Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen
Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen
WCFB: a tweakable wide block cipher
Andrey Jivsov
Andrey Jivsov
MSEA: Modified Symmetric Encryption Algorithm
Rajul Kumar, K. K. Mishra, Ashish Tripathi, Abhinav Tomar, Surendra Singh
Rajul Kumar, K. K. Mishra, Ashish Tripathi, Abhinav Tomar, Surendra Singh
Improved Impossible Differential Attacks against Round-Reduced LBlock
Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder
Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Essam Ghadafi
Essam Ghadafi
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
Design of identity-based digital signature schemes using extended chaotic maps
SK Hafizul Islam
SK Hafizul Islam
Identity-based encryption and digital signature schemes using extended chaotic maps
SK Hafizul Islam
SK Hafizul Islam
A note on the construction of pairing-friendly elliptic curves for composite order protocols
Sorina Ionica, Malika Izabachène
Sorina Ionica, Malika Izabachène
Witness Encryption from Instance Independent Assumptions
Craig Gentry, Allison Bishop Lewko, Brent Waters
Craig Gentry, Allison Bishop Lewko, Brent Waters
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen
Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen
Chosen Ciphertext Security via Point Obfuscation
Takahiro Matsuda, Goichiro Hanaoka
Takahiro Matsuda, Goichiro Hanaoka
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Yin Li, Yiyang Chen
Yin Li, Yiyang Chen
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wojcik
Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wojcik
Dual System Groups and its Applications --- Compact HIBE and More
Jie Chen, Hoeteck Wee
Jie Chen, Hoeteck Wee
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
Janaka Alawatugoda, Colin Boyd, Douglas Stebila
Janaka Alawatugoda, Colin Boyd, Douglas Stebila
A Generic Scan Attack on Hardware based eStream Winners
Sandip Karmakar, Dipanwita Roy Chowdhury
Sandip Karmakar, Dipanwita Roy Chowdhury
Differential Fault Analysis of MICKEY Family of Stream Ciphers
Sandip Karmakar, Dipanwita Roy Chowdhury
Sandip Karmakar, Dipanwita Roy Chowdhury
Fault Analysis of Grain Family of Stream Ciphers
Sandip Karmakar, Dipanwita Roy Chowdhury
Sandip Karmakar, Dipanwita Roy Chowdhury
Locally Decodable Codes for edit distance
Rafail Ostrovsky, Anat Paskin-Cherniavsky
Rafail Ostrovsky, Anat Paskin-Cherniavsky
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
A realtime key recovery attack on the authenticated cipher FASER128
Xiutao FENG, Fan ZHANG
Xiutao FENG, Fan ZHANG
Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
Bruce Kallick
Bruce Kallick
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
Certification and Efficient Proofs of Committed Topology Graphs
Thomas Gross
Thomas Gross
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Thomas Pöppelmann, Lëo Ducas, Tim Güneysu
Thomas Pöppelmann, Lëo Ducas, Tim Güneysu
Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems
Fangquan Cheng, Qian Wang, Kui Ren, Zhiyong Peng
Fangquan Cheng, Qian Wang, Kui Ren, Zhiyong Peng
Making RSA-PSS Provably Secure Against Non-Random Faults
Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
Forgery on Stateless CMCC
Guy Barwell
Guy Barwell
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Boaz Tsaban, Noam Lifshitz
Boaz Tsaban, Noam Lifshitz
Linear Extension Cube Attack on Stream Ciphers
Liren Ding, Yongjuan Wang, Zhufeng Li
Liren Ding, Yongjuan Wang, Zhufeng Li
Fine grain Cross-VM Attacks on Xen and VMware are possible!
Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
Ivan Pryvalov, Aniket Kate
Ivan Pryvalov, Aniket Kate
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Kwangsu Lee, Dong Hoon Lee
Kwangsu Lee, Dong Hoon Lee
A practical state recovery attack on the stream cipher Sablier v1
Xiutao FENG, Fan ZHANG
Xiutao FENG, Fan ZHANG
bitcoin.BitMint: Reconciling Bitcoin with Central Banks
Gideon Samid
Gideon Samid
Reusable Fuzzy Extractors for Low-Entropy Distributions
Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith
Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Franziskus Kiefer, Mark Manulis
Franziskus Kiefer, Mark Manulis
A New Way to Prevent UKS Attacks Using Trusted Computing
Qianying Zhang, Shijun Zhao, Dengguo Feng
Qianying Zhang, Shijun Zhao, Dengguo Feng
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
Martin Pettai, Peeter Laud
Martin Pettai, Peeter Laud
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Florian Legendre, Gilles Dequen, Michaël Krajecki
Florian Legendre, Gilles Dequen, Michaël Krajecki
High Parallel Complexity Graphs and Memory-Hard Functions
Joël Alwen, Vladimir Serbinenko
Joël Alwen, Vladimir Serbinenko
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
Aydin Aysu, Ege Gulcan, Patrick Schaumont
Aydin Aysu, Ege Gulcan, Patrick Schaumont
Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
Shazia Afreen
Shazia Afreen
Efficient Fuzzy Search on Encrypted Data
Alexandra Boldyreva, Nathan Chenette
Alexandra Boldyreva, Nathan Chenette
Enhancing Oblivious RAM Performance Using Dynamic Prefetching
Xiangyao Yu, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas
Xiangyao Yu, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar
Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar
Bandwidth Efficient PIR from NTRU
Yarkın Doröz, Berk Sunar, Ghaith Hammouri
Yarkın Doröz, Berk Sunar, Ghaith Hammouri
Self-Updatable Encryption with Short Public Parameters and Its Extensions
Kwangsu Lee
Kwangsu Lee
Isogeny graphs with maximal real multiplication
Sorina Ionica, Emmanuel Thomé
Sorina Ionica, Emmanuel Thomé
Investigating the Feasibility of LEAP+ in ZigBee Specification
Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks
Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
Weak-Key Analysis of POET
Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser
Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser
Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
Tapas Pandit and Rana Barua
Tapas Pandit and Rana Barua
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
Henry Carter, Charles Lever, Patrick Traynor
Henry Carter, Charles Lever, Patrick Traynor
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
Léo Perrin, Dmitry Khovratovich
Léo Perrin, Dmitry Khovratovich
Optimizing Obfuscation: Avoiding Barrington's Theorem
Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
Toomas Krips, Jan Willemson
Toomas Krips, Jan Willemson
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
Dynamic Searchable Encryption via Blind Storage
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter
A Practical Universal Forgery Attack against PAES-8
Yu Sasaki, Lei Wang
Yu Sasaki, Lei Wang
A Forgery Attack against PANDA-s
Yu Sasaki, Lei Wang
Yu Sasaki, Lei Wang
Implementation and Improvement of the Partial Sum Attack on 6-round AES
Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
Attack On the Markov Problem
James L. Adams
James L. Adams
Squaring Algorithms with Delayed Carry Method and Efficient Parallelization
Vladislav Kovtun, Andrew Okhrimenko
Vladislav Kovtun, Andrew Okhrimenko
Secret-Sharing for NP
Ilan Komargodski, Moni Naor, Eylon Yogev
Ilan Komargodski, Moni Naor, Eylon Yogev
Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$
Geon Heo, Seokhwan Choi, Kwang Ho Lee, Namhun Koo, Soonhak Kwon
Geon Heo, Seokhwan Choi, Kwang Ho Lee, Namhun Koo, Soonhak Kwon
Some Randomness Experiments on TRIVIUM
Subhabrata Samajder, Palash Sarkar
Subhabrata Samajder, Palash Sarkar
Structural Cryptanalysis of McEliece Schemes with Compact Keys
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation
Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
Ding Wang, Ping Wang
Ding Wang, Ping Wang
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki Takashima
Katsuyuki Takashima
Reconsidering Generic Composition
Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas
Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
Colin O'Flynn, Zhizhang (David) Chen
Colin O'Flynn, Zhizhang (David) Chen
Privacy-Preserving Implicit Authentication
Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak F. Shahandashti
Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak F. Shahandashti
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore, Rosario Gennaro, Valerio Pastro
Dario Fiore, Rosario Gennaro, Valerio Pastro
From Input Private to Universally Composable Secure Multiparty Computation Primitives
Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen
Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen
Automatic Protocol Selection in Secure Two-Party Computations
Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
Doubly Spatial Encryption from DBDH
Jie Chen, Hoeteck Wee
Jie Chen, Hoeteck Wee
Fast GPGPU-Based Elliptic Curve Scalar Multiplication
Eric M. Mahé, Jean-Marie Chauvet
Eric M. Mahé, Jean-Marie Chauvet
Breaking POET Authentication with a Single Query
Jian Guo, Jérémy Jean, Thomas Peyrin, Wang Lei
Jian Guo, Jérémy Jean, Thomas Peyrin, Wang Lei
Crypto-Multimedia
Benlcouiri Younes, Azizi Abdelmalek, Moulay Chrif Ismaili
Benlcouiri Younes, Azizi Abdelmalek, Moulay Chrif Ismaili
Low Overhead Broadcast Encryption from Multilinear Maps
Dan Boneh, Brent Waters, Mark Zhandry
Dan Boneh, Brent Waters, Mark Zhandry
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
Sai Raghu Talluri, Swapnoneel Roy
Sai Raghu Talluri, Swapnoneel Roy
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri
Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri
Two-sources Randomness Extractors for Elliptic Curves
Abdoul Aziz Ciss
Abdoul Aziz Ciss
Side-Channel Analysis on Blinded Regular Scalar Multiplications
Benoit Feix, Mylène Roussellet, Alexandre Venelli
Benoit Feix, Mylène Roussellet, Alexandre Venelli
The Temperature Side Channel and Heating Fault Attacks
Michael Hutter, Jörn-Marc Schmidt
Michael Hutter, Jörn-Marc Schmidt
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
A Second Look at Fischlin's Transformation
Özgür Dagdelen, Daniele Venturi
Özgür Dagdelen, Daniele Venturi
FFT-Based Key Recovery for the Integral Attack
Yosuke Todo
Yosuke Todo
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
Oblivious Data Structures
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
SETUP in Secret Sharing Schemes using Random Values
Ruxandra F. Olimid
Ruxandra F. Olimid
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
Tetsu Iwata, Lei Wang
Tetsu Iwata, Lei Wang
Proving the TLS Handshake Secure (as it is)
Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
T. D. B Weerasinghe
T. D. B Weerasinghe
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Maura B. Paterson, Douglas R. Stinson
Maura B. Paterson, Douglas R. Stinson
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
Qingji Zheng, Shouhuai Xu
Qingji Zheng, Shouhuai Xu
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
Valentina Banciu, Elisabeth Oswald
Valentina Banciu, Elisabeth Oswald
One-Round Witness Indistinguishability from Indistinguishability Obfuscation
Qihua Niu, Hongda Li, Bei Liang, Fei Tang
Qihua Niu, Hongda Li, Bei Liang, Fei Tang
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
T. D. B Weerasinghe
T. D. B Weerasinghe
Analysis of a Modified RC4 Algorithm
T. D. B Weerasinghe
T. D. B Weerasinghe
Continuous Non-malleable Codes
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
A novel PUF Scheme
Jeroen Delvaux
Jeroen Delvaux
An Effective RC4 Stream Cipher
T. D. B Weerasinghe
T. D. B Weerasinghe
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Shay Gueron
Shay Gueron
Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms
Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
Scott Coull, Kevin Dyer
Scott Coull, Kevin Dyer
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
Tuple decoders for traitor tracing schemes
Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT
Kirti Chawla, Om Pal Yadav
Kirti Chawla, Om Pal Yadav
Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
Yuriy Tarannikov
Yuriy Tarannikov
Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
Arnaud Dambra, Philippe Gaborit, Mylène Roussellet, Julien Schrek, Nicolas Tafforeau
Arnaud Dambra, Philippe Gaborit, Mylène Roussellet, Julien Schrek, Nicolas Tafforeau
TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
Hu Xiong
Hu Xiong
``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way
Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
TrueSet: Faster Verifiable Set Computations
Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos
Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos
Weak-Key Leakage Resilient Cryptography
Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan
Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan
Point compression for the trace zero subgroup over a small degree extension field
Elisa Gorla, Maike Massierer
Elisa Gorla, Maike Massierer
CLOC: Authenticated Encryption for Short Input
Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
Non-Malleable Extractors with Shorter Seeds and Their Applications
Yanqing Yao, Zhoujun Li
Yanqing Yao, Zhoujun Li
Honey Encryption: Security Beyond the Brute-Force Bound
Ari Juels, Thomas Ristenpart
Ari Juels, Thomas Ristenpart
Non-Interactive Cryptography in the RAM Model of Computation
Daniel Apon, Xiong Fan, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
Daniel Apon, Xiong Fan, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
Verifiable Oblivious Storage
Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang
Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang
Security Analysis of Key-Alternating Feistel Ciphers
Rodolphe Lampe, Yannick Seurin
Rodolphe Lampe, Yannick Seurin
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
Nikolaos Karapanos, Srdjan Capkun
Nikolaos Karapanos, Srdjan Capkun
Millions of Millionaires: Multiparty Computation in Large Networks
Mahdi Zamani, Mahnush Movahedi, Jared Saia
Mahdi Zamani, Mahnush Movahedi, Jared Saia
Outsourcing Private RAM Computation
Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu, Cécile Pierrot
Razvan Barbulescu, Cécile Pierrot
Untappable communication channels over optical fibers from quantum-optical noise
Geraldo A. Barbosa, Jeroen van de Graaf
Geraldo A. Barbosa, Jeroen van de Graaf
Calculating Cryptographic Degree of an S-Box
Prasanna Raghaw Mishra
Prasanna Raghaw Mishra
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
Statistical Concurrent Non-Malleable Zero Knowledge
Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm
Karim M. Abdellatif, R. Chotin-Avot, H. Mehrez
Karim M. Abdellatif, R. Chotin-Avot, H. Mehrez
Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
Hao Wang
Hao Wang
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
Yuval Yarom, Naomi Benger
Yuval Yarom, Naomi Benger
On the Phase Space of Block-Hiding Strategies
Assaf Shomer
Assaf Shomer
Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction
Jae Hong Seo
Jae Hong Seo
Efficient, Oblivious Data Structures for MPC
Marcel Keller, Peter Scholl
Marcel Keller, Peter Scholl
Isolated Execution on Many-core Architectures
Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun
Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
Kummer strikes back: new DH speed records
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
Yihua Zhang, Marina Blanton
Yihua Zhang, Marina Blanton
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park
Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig
Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov, Ranjit Kumaresan
Iddo Bentov, Ranjit Kumaresan
Efficient Three-Party Computation from Cut-and-Choose
Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas
Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas
Algebraic Properties of Modular Addition Modulo a Power of Two
S. M. Dehnavi, Alireza Rahimipour
S. M. Dehnavi, Alireza Rahimipour
Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
Hui Cui, Yi Mu, Man Ho Au
Hui Cui, Yi Mu, Man Ho Au
Removing Erasures with Explainable Hash Proof Systems
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró
Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
Mohammad Sadeq Dousti, Rasool Jalili
Mohammad Sadeq Dousti, Rasool Jalili
New Way to Construct Cryptographic Hash Function
WANG Yong
WANG Yong
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi
Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
Quantum position verification in the random oracle model
Dominique Unruh
Dominique Unruh
An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems
Bjoern Grohmann
Bjoern Grohmann
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
Ronald Cramer, Carles Padrö, Chaoping Xing
Ronald Cramer, Carles Padrö, Chaoping Xing
Comments on a novel user authentication and key agreement scheme
Jia-Lun Tsai
Jia-Lun Tsai
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs, Cristina Onete, Jean-Marc Robert
Sebastien Gambs, Cristina Onete, Jean-Marc Robert
Secure Compression: Theory \& Practice
James Kelley, Roberto Tamassia
James Kelley, Roberto Tamassia
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
A Note on the CLRW2 Tweakable Block Cipher Construction
Gordon Procter
Gordon Procter
Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box
Sourav Das
Sourav Das
Diffusion Programmable Device : The device to prevent reverse engineering
Mitsuru Shiozaki, Ryohei Hori, Takeshi Fujino
Mitsuru Shiozaki, Ryohei Hori, Takeshi Fujino
MJH: A Faster Alternative to MDC-2
Jooyoung Lee, Martijn Stam
Jooyoung Lee, Martijn Stam
Key-Indistinguishable Message Authentication Codes
Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
Algorithms in HElib
Shai Halevi, Victor Shoup
Shai Halevi, Victor Shoup
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury, Arpita Patra, Nigel P. Smart
Ashish Choudhury, Arpita Patra, Nigel P. Smart
Space-efficient, byte-wise incremental and perfectly private encryption schemes
Kévin Atighehchi
Kévin Atighehchi
SHipher: Families of Block Ciphers based on SubSet-Sum Problem
Xiali Hei, Binheng Song
Xiali Hei, Binheng Song
Actively Secure Private Function Evaluation
Payman Mohassel, Saeed Sadeghian, Nigel P. Smart
Payman Mohassel, Saeed Sadeghian, Nigel P. Smart
Dishonest Majority Multi-Party Computation for Binary Circuits
Enrique Larraia, Emmanuela Orsini, Nigel P. Smart
Enrique Larraia, Emmanuela Orsini, Nigel P. Smart
Improved Slender-set Linear Cryptanalysis
Guo-Qiang Liu, Chen-Hui Jin, Chuan-Da Qi
Guo-Qiang Liu, Chen-Hui Jin, Chuan-Da Qi
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Chris Brzuska, Pooya Farshim, Arno Mittelbach
Chris Brzuska, Pooya Farshim, Arno Mittelbach
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Gilad Asharov
Gilad Asharov
Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory
Koji Nuida
Koji Nuida
Tight security bounds for multiple encryption
Yuanxi Dai, John Steinberger
Yuanxi Dai, John Steinberger
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
Faster Bootstrapping with Polynomial Error
Jacob Alperin-Sheriff, Chris Peikert
Jacob Alperin-Sheriff, Chris Peikert
The Related-Key Analysis of Feistel Constructions
Manuel Barbosa, Pooya Farshim
Manuel Barbosa, Pooya Farshim
A new class of system oriented PKC, K(I)SOPKC.
Masao KASAHARA
Masao KASAHARA
On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
Cryptanalysis of KLEIN (Full version)
Virginie Lallemand, María Naya-Plasencia
Virginie Lallemand, María Naya-Plasencia
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard
Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
Himanshu Tyagi, Shun Watanabe
Himanshu Tyagi, Shun Watanabe
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi
Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi
Randomized and Efficient Authentication in Mobile Environments
Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
Aleksandra Mileva
Aleksandra Mileva
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
Garbled RAM Revisited, Part II
Steve Lu, Rafail Ostrovsky
Steve Lu, Rafail Ostrovsky
Garbled RAM Revisited, Part I
Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
Efficient Round Optimal Blind Signatures
Sanjam Garg, Divya Gupta
Sanjam Garg, Divya Gupta
A Full Characterization of Completeness for Two-party Randomized Function Evaluation
Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
Unifying Leakage Models: from Probing Attacks to Noisy Leakage
Alexandre Duc, Stefan Dziembowski, Sebastian Faust
Alexandre Duc, Stefan Dziembowski, Sebastian Faust
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Ahmad Boorghany, Rasool Jalili
Ahmad Boorghany, Rasool Jalili
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
Certified Bitcoins
Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
Publicly Auditable Secure Multi-Party Computation
Carsten Baum, Ivan Damgård, Claudio Orlandi
Carsten Baum, Ivan Damgård, Claudio Orlandi
New and Improved Key-Homomorphic Pseudorandom Functions
Abhishek Banerjee, Chris Peikert
Abhishek Banerjee, Chris Peikert
Anonymous Authentication with Shared Secrets
Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann
Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann
Implementing Pairing-Based Cryptosystems in USB Tokens
Zhaohui Cheng
Zhaohui Cheng
Lattice Cryptography for the Internet
Chris Peikert
Chris Peikert
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Manoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi
Manoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi
Some security bounds for the DGHV scheme
Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala
Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey
Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey
A Subexponential Construction of Graph Coloring for Multiparty Computation
Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld
Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld
Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
Palash Sarkar, Shashank Singh
Palash Sarkar, Shashank Singh
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan
Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan
Cryptanalysis on “Secure untraceable off-line electronic cash system”
Yalin Chen, Jue-Sam Chou
Yalin Chen, Jue-Sam Chou
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Tancrède Lepoint, Michael Naehrig
Tancrède Lepoint, Michael Naehrig
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Stefano Tessaro, David A. Wilson
Stefano Tessaro, David A. Wilson
Verifiable Computation in Multiparty Protocols with Honest Majority
Peeter Laud, Alisa Pankova
Peeter Laud, Alisa Pankova
Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
John Tromp
John Tromp
Cryptanalysis of FIDES
Itai Dinur, Jérémy Jean
Itai Dinur, Jérémy Jean
Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Younsung Choi
Younsung Choi
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Sugata Gangopadhyay, Pantelimon Stanica
Sugata Gangopadhyay, Pantelimon Stanica
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Sonia Belaïd, Vincent Grosso, François-Xavier Standaert
Sonia Belaïd, Vincent Grosso, François-Xavier Standaert
DAA-related APIs in TPM2.0 Revisited
Li Xi
Li Xi
An Equivalence-Preserving Transformation of Shift Registers
Elena Dubrova
Elena Dubrova
Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
Daniel R. L. Brown
Daniel R. L. Brown
Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
Neha tirthani, Ganesan R
Neha tirthani, Ganesan R
When a Boolean Function can be Expressed as the Sum of two Bent Functions
Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li
Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li
Down the Rabbit Hole: Revisiting the Shrinking Method
Vivien Dubois
Vivien Dubois
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
Yalin Chen, Jue-Sam Chou
Yalin Chen, Jue-Sam Chou
Human Assisted Randomness Generation Using Video Games
Mohsen Alimomeni, Reihaneh Safavi-Naini
Mohsen Alimomeni, Reihaneh Safavi-Naini
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
Lichun Li, Michael Militzer, Anwitaman Datta
Lichun Li, Michael Militzer, Anwitaman Datta
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Mehdi Tibouchi
Mehdi Tibouchi
A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
Jintai Ding, Chengdong Tao
Jintai Ding, Chengdong Tao
Cryptanalysis via algebraic spans
Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban
Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban
A Fast Modular Reduction Method
Zhengjun Cao, Ruizhong Wei, Xiaodong Lin
Zhengjun Cao, Ruizhong Wei, Xiaodong Lin
Homomorphic AES Evaluation using NTRU
Yarkin Doroz, Yin Hu, Berk Sunar
Yarkin Doroz, Yin Hu, Berk Sunar
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Ralf Kuesters, Enrico Scapin, Tomasz Truderung, Juergen Graf
Ralf Kuesters, Enrico Scapin, Tomasz Truderung, Juergen Graf
On the Security of the Pre-Shared Key Ciphersuites of TLS
Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk
Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk
A Secure Text Messaging Protocol
Gary Belvin
Gary Belvin
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj, Mohamed Ould Douh
Abderrahmane Nitaj, Mohamed Ould Douh
Authenticated Encryption with SPECK
Chase Manny
Chase Manny
Lattice-based Group Signature Scheme with Verier-local Revocation
Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
Scale-Invariant Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
Yongge Wang
Yongge Wang
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio Jr.
Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio Jr.
General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
Channel Equalization for Side Channel Attacks
Colin O'Flynn, Zhizhang (David) Chen
Colin O'Flynn, Zhizhang (David) Chen
Twisting Edwards curves with isogenies
Mike Hamburg
Mike Hamburg
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba
Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba
Side-Channel Leakage through Static Power – Should We Care about in Practice? –
Amir Moradi
Amir Moradi
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
Ivan Damgård, Jesper Buus Nielsen
Ivan Damgård, Jesper Buus Nielsen
Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
Gengran Hu, Yanbin Pan, Feng Zhang
Gengran Hu, Yanbin Pan, Feng Zhang
Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR
Sourav Das
Sourav Das
Online/Offline Attribute-Based Encryption
Susan Hohenberger, Brent Waters
Susan Hohenberger, Brent Waters
(De-)Constructing TLS
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
Lazy Modulus Switching for the BKW Algorithm on LWE
Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
Completeness for Symmetric Two-Party Functionalities - Revisited
Yehuda Lindell, Eran Omri, Hila Zarosim
Yehuda Lindell, Eran Omri, Hila Zarosim
Two-round password-only authenticated key exchange in the three-party setting
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
Triple and Quadruple Encryption: Bridging the Gaps
Bart Mennink, Bart Preneel
Bart Mennink, Bart Preneel
Tight Security Bounds for Triple Encryption
Jooyoung Lee
Jooyoung Lee
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther, Bertram Poettering
Felix Günther, Bertram Poettering
A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs
Marcin Rogawski, Kris Gaj, Ekawat Homsirikamol
Marcin Rogawski, Kris Gaj, Ekawat Homsirikamol
Maximal Information Coefficient Analysis
Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
Construction of New Families of MDS Diffusion Layers
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
Characterization of EME with Linear Mixing
Nilanjan Datta, Mridul Nandi
Nilanjan Datta, Mridul Nandi
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Annelie Heuser, Olivier Rioul, Sylvain Guilley
Annelie Heuser, Olivier Rioul, Sylvain Guilley
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
Ethan Heilman
Ethan Heilman
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
The analysis of the Keccak with the new method called parity
Ghanei yakhdan. mostafa
Ghanei yakhdan. mostafa
MaxMinMax problem and sparse equations over finite fields
Igor Semaev
Igor Semaev
$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
Xi Xiong, Haining Fan
Xi Xiong, Haining Fan
Pseudorandom Generator Based on Hard Lattice Problem
Kuan Cheng
Kuan Cheng
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
Yalin Chen, Jue-Sam Chou
Yalin Chen, Jue-Sam Chou
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers
Zhe Liu, Johann Großschädl
Zhe Liu, Johann Großschädl
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains
Yonatan Sompolinsky, Aviv Zohar
Yonatan Sompolinsky, Aviv Zohar
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
Seunghwan Park, Kwangsu Lee, Dong Hoon Lee
Seunghwan Park, Kwangsu Lee, Dong Hoon Lee
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
Public-Key Encryption with Lazy Parties
Kenji Yasunaga
Kenji Yasunaga
Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
Michael Clear, Ciaran McGoldrick
Michael Clear, Ciaran McGoldrick
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga
Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
--Withdrawn--
Xu An Wang, Yunlong Ge, Xiaoyuan Yang
Xu An Wang, Yunlong Ge, Xiaoyuan Yang
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
Weiqiang Wen, Libin Wang, Jiaxin Pan
Weiqiang Wen, Libin Wang, Jiaxin Pan
A new class of hyper-bent functions and Kloosterman sums
Chunming Tang, Yanfeng Qi
Chunming Tang, Yanfeng Qi
How to Fake Auxiliary Input
Dimitar Jetchev, Krzysztof Pietrzak
Dimitar Jetchev, Krzysztof Pietrzak
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
Lear Bahack
Lear Bahack
LHash: A Lightweight Hash Function (Full Version)
Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong
Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong
Compact Ring-LWE based Cryptoprocessor
Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
Suvadeep Hajra, Debdeep Mukhopadhyay
Suvadeep Hajra, Debdeep Mukhopadhyay
Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs
Adam Smith, Ye Zhang
Adam Smith, Ye Zhang
Formal Treatment of Distributed Trust in Electronic Voting
Stephan Neumann, Melanie Volkamer
Stephan Neumann, Melanie Volkamer
How to Delegate Computations: The Power of No-Signaling Proofs
Yael Tauman Kalai, Ran Raz, Ron D. Rothblum
Yael Tauman Kalai, Ran Raz, Ron D. Rothblum
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
Muhammad Rizwan Asghar
Muhammad Rizwan Asghar
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs
Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications
Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Daniel Genkin, Adi Shamir, Eran Tromer
Daniel Genkin, Adi Shamir, Eran Tromer
Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
Weaknesses in a Recently Proposed RFID Authentication Protocol
Mete Akgün, M. Ufuk Çaǧlayan
Mete Akgün, M. Ufuk Çaǧlayan
Multiple-Use Transferable E-Cash
Pratik Sarkar
Pratik Sarkar
Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
Alex Biryukov, Vesselin Velichkov
Alex Biryukov, Vesselin Velichkov
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
Power and Timing Side Channels for PUFs and their Efficient Exploitation
Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson
Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson
Secure Floating-Point Arithmetic and Private Satellite Collision Analysis
Liina Kamm, Jan Willemson
Liina Kamm, Jan Willemson
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model
Suvadeep Hajra, Debdeep Mukhopadhyay
Suvadeep Hajra, Debdeep Mukhopadhyay
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Xi-Jun Lin, Lin Sun
Xi-Jun Lin, Lin Sun
Ultralightweight cryptography for passive RFID system
Umar Mujahid, M. Najam-ul-islam, Jameel Ahmed
Umar Mujahid, M. Najam-ul-islam, Jameel Ahmed
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj, Mohamed Ould Douh
Abderrahmane Nitaj, Mohamed Ould Douh
How to Keep a Secret: Leakage Deterring Public-key Cryptography
Aggelos Kiayias, Qiang Tang
Aggelos Kiayias, Qiang Tang
A generic view on trace-and-revoke broadcast encryption schemes
Dennis Hofheinz, Christoph Striecks
Dennis Hofheinz, Christoph Striecks
A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues
Jian Ye, Chenglian Liu
Jian Ye, Chenglian Liu
Detecting Hidden Leakages
Amir Moradi, Sylvain Guilley, Annelie Heuser
Amir Moradi, Sylvain Guilley, Annelie Heuser
Trust Views for the Web PKI
Johannes Braun, Florian Volk, Johannes Buchmann, Max Mühlhäuser
Johannes Braun, Florian Volk, Johannes Buchmann, Max Mühlhäuser
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong Sheng Zhou
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong Sheng Zhou
Lattice Decoding Attacks on Binary LWE
Shi Bai, Steven D. Galbraith
Shi Bai, Steven D. Galbraith
An improved compression technique for signatures based on learning with errors
Shi Bai, Steven D. Galbraith
Shi Bai, Steven D. Galbraith
Fair Two-Party Computations via Bitcoin Deposits
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps
Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang
Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang
A Modular Framework for Building Variable-Input Length Tweakable Ciphers
Thomas Shrimpton, R. Seth Terashima
Thomas Shrimpton, R. Seth Terashima
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
Ahto Buldas, Andres Kroonmaa, Risto Laanoja
Ahto Buldas, Andres Kroonmaa, Risto Laanoja
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
Fabrice Benhamouda, David Pointcheval
Fabrice Benhamouda, David Pointcheval
Practical Dynamic Searchable Encryption with Small Leakage
Emil Stefanov, Charalampos Papamanthou, Elaine Shi
Emil Stefanov, Charalampos Papamanthou, Elaine Shi
Provable Security Proofs and their Interpretation in the Real World
Vikram Singh
Vikram Singh
Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee, M. Prem Laxman Das
Sanjit Chatterjee, M. Prem Laxman Das
Is Bitcoin a Decentralized Currency?
Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun
Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun
Decentralized Traceable Attribute-Based Signatures
Ali El Kaafarani, Essam Ghadafi, Dalia Khader
Ali El Kaafarani, Essam Ghadafi, Dalia Khader
Lower Bounds in the Hardware Token Model
Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
Secure multi-party data analysis: end user validation and practical experiments
Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt
Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
Alberto Peinado, Jorge Munilla, Amparo Fúster
Alberto Peinado, Jorge Munilla, Amparo Fúster
Fair and Efficient Secure Multiparty Computation with Reputation Systems
Gilad Asharov, Yehuda Lindell, Hila Zarosim
Gilad Asharov, Yehuda Lindell, Hila Zarosim
Another Look at XCB
Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar
Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar
Leakage Resilient Fully Homomorphic Encryption
Alexandra Berkoff, Feng-Hao Liu
Alexandra Berkoff, Feng-Hao Liu
Exact Smooth Projective Hash Function based on LWE
Olivier Blazy, Céline Chevalier, Léo Ducas, Jiaxin Pan
Olivier Blazy, Céline Chevalier, Léo Ducas, Jiaxin Pan
On the Security of Recently Proposed RFID Protocols
Mete Akgün, M. Ufuk Çaǧlayan
Mete Akgün, M. Ufuk Çaǧlayan
Safe enclosures: towards cryptographic techniques for server protection
Sergiu Bursuc, Julian P. Murphy
Sergiu Bursuc, Julian P. Murphy
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
Roberto De Prisco, Alfredo De Santis
Roberto De Prisco, Alfredo De Santis
Interactive Encryption and Message Authentication
Yevgeniy Dodis, Dario Fiore
Yevgeniy Dodis, Dario Fiore
Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes
Shay Gueron, Vlad Krasnov
Shay Gueron, Vlad Krasnov
Iterated group products and leakage resilience against NC^1
Eric Miles
Eric Miles
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
Multi-ciphersuite security of the Secure Shell (SSH) protocol
Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila
Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila
A Note on Bilinear Groups of a Large Composite Order
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
Pablo Rauzy, Sylvain Guilley
Pablo Rauzy, Sylvain Guilley
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk
Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
Distributed Key Generation for Secure Encrypted Deduplication
Yitao Duan
Yitao Duan
Efficient (Anonymous) Compact HIBE From Standard Assumptions
Somindu C. Ramanna, Palash Sarkar
Somindu C. Ramanna, Palash Sarkar
Proofs of Space: When Space is of the Essence
Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
Group Signature with relaxed-privacy and revocability for VANET
Mohammad Saiful Islam Mamun, Atsuko Miyaji
Mohammad Saiful Islam Mamun, Atsuko Miyaji
Fully, (Almost) Tightly Secure IBE from Standard Assumptions
Jie Chen, Hoeteck Wee
Jie Chen, Hoeteck Wee
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng
Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
Dario Catalano, Antonio Marcedone, Orazio Puglisi
Dario Catalano, Antonio Marcedone, Orazio Puglisi
Algebraic Properties of the Cube Attack
Frank-M. Quedenfeld, Christopher Wolf
Frank-M. Quedenfeld, Christopher Wolf
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography
Gilles Macario-Rat, Jérôme Plût, Henri Gilbert
Gilles Macario-Rat, Jérôme Plût, Henri Gilbert
A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Zuoxia Yu
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Zuoxia Yu
Tamper Resilient Circuits: The Adversary at the Gates
Aggelos Kiayias, Yiannis Tselekounis
Aggelos Kiayias, Yiannis Tselekounis
Proofs of Space
Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
Xi-Jun Lin, Lin Sun
Xi-Jun Lin, Lin Sun
Behind the Scene of Side Channel Attacks
Victor Lomné, Emmanuel Prouff, Thomas Roche
Victor Lomné, Emmanuel Prouff, Thomas Roche
A fast integer-based batch full-homomorphic encryption scheme over finite field
Long Zhang, Qiuling Yue
Long Zhang, Qiuling Yue
Improved Authenticity Bound of EAX, and Refinements
Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
Parallelizable and Authenticated Online Ciphers
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda
Proofs of Data Possession and Retrievability Based on MRD Codes
Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol
Raghuvir Songhela, Manik Lal Das
Raghuvir Songhela, Manik Lal Das
Tree Based Symmetric Key Broadcast Encryption
Sanjay Bhattacherjee, Palash Sarkar
Sanjay Bhattacherjee, Palash Sarkar
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model
Fei Tang, Hongda Li, Qihua Niu, Bei Liang
Fei Tang, Hongda Li, Qihua Niu, Bei Liang
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
Yalin Chen, Jue-Sam Chou
Yalin Chen, Jue-Sam Chou
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
Dorit Ron, Adi Shamir
Dorit Ron, Adi Shamir
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
Rafael Pass, Karn Seth, Sidharth Telang
Rafael Pass, Karn Seth, Sidharth Telang
A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester
Nasser Ramazani Darmian
Nasser Ramazani Darmian
Distributed Group Authentication for RFID Supply Management
Mike Burmester, Jorge Munilla
Mike Burmester, Jorge Munilla
Multi-Stage Fault Attacks on Block Ciphers
Philipp Jovanovic, Martin Kreuzer, Ilia Polian
Philipp Jovanovic, Martin Kreuzer, Ilia Polian
Construction of Multiplicative Monotone Span Program
Yuenai Chen, Chunming Tang
Yuenai Chen, Chunming Tang
Location Leakage in Distance Bounding: Why Location Privacy does not Work
Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay
Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
Multi-Input Functional Encryption
S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
Wuqiang Shen, Shaohua Tang
Wuqiang Shen, Shaohua Tang
Efficient Template Attacks
Omar Choudary, Markus G. Kuhn
Omar Choudary, Markus G. Kuhn
Broadcast Amplification
Martin Hirt, Ueli Maurer, Pavel Raykov
Martin Hirt, Ueli Maurer, Pavel Raykov
VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
Bartosz Zoltak
Bartosz Zoltak
Misuse Resistant Parallel Authenticated Encryptions
Nilanjan Datta, Mridul Nandi
Nilanjan Datta, Mridul Nandi
RankSign : an efficient signature algorithm based on the rank metric
P. Gaborit, O. Ruatta, J. Schrek, G. Zémor
P. Gaborit, O. Ruatta, J. Schrek, G. Zémor
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More
Kaoru Kurosawa, Le Trieu Phong
Kaoru Kurosawa, Le Trieu Phong
Dynamic Countermeasure Against the Zero Power Analysis
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
Yutaka Kawai, Katsuyuki Takashima
Yutaka Kawai, Katsuyuki Takashima
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung
Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati
Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati
On cross joining de Bruijn sequences
Johannes Mykkeltveit, Janusz Szmidt
Johannes Mykkeltveit, Janusz Szmidt
Vectorization of ChaCha Stream Cipher
Martin Goll, Shay Gueron
Martin Goll, Shay Gueron
A Revocable Online-Offline Certificateless Signature Scheme without Pairing
Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan
Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan
Practical Signatures from the Partial Fourier Recovery Problem
Jeff Hoffstein, Jill Pipher, John Schanck, Joseph H. Silverman, William Whyte
Jeff Hoffstein, Jill Pipher, John Schanck, Joseph H. Silverman, William Whyte
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
Yonglin Hao, Dongxia Bai, Leibo Li
Yonglin Hao, Dongxia Bai, Leibo Li
Improving security and efficiency for multi-authority access control system in cloud storage
Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong
Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong
Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
Omkant Pandey, Manoj Prabhakaran, Amit Sahai
Omkant Pandey, Manoj Prabhakaran, Amit Sahai
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalcin
Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalcin
On the Power of Rewinding Simulators in Functional Encryption
Angelo De Caro, Vincenzo Iovino
Angelo De Caro, Vincenzo Iovino
Using Hamiltonian Totems as Passwords
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
Fully Deniable Mutual Authentication Protocol Based on RSA Signature
Xi-Jun Lin, Lin Sun
Xi-Jun Lin, Lin Sun
Efficient CCA-secure Threshold Public-Key Encryption Scheme
Xi-Jun Lin, Lin Sun
Xi-Jun Lin, Lin Sun
Plaintext Recovery Attacks Against WPA/TKIP
Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Jayaprakash Kar
Jayaprakash Kar
Asymptotically Efficient Lattice-Based Digital Signatures
Vadim Lyubashevsky, Daniele Micciancio
Vadim Lyubashevsky, Daniele Micciancio
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate
Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate
Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
Privacy Preserving Unique Statistics in a Smart Grid
Iraklis Leontiadis, Melek Önen, Refik Molva
Iraklis Leontiadis, Melek Önen, Refik Molva
CODING - Stream Cipher Methods by Varying Components during Ciphering Data
Jürgen Müller
Jürgen Müller
Fast Software Implementation of Binary Elliptic Curve Cryptography
Manuel Bluhm, Shay Gueron
Manuel Bluhm, Shay Gueron
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
Gérald Gavin
Gérald Gavin
NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS
Dr. G. S. G. N. Anjaneyulu, A. Vijayabarathi
Dr. G. S. G. N. Anjaneyulu, A. Vijayabarathi
On the Resilience and Uniqueness of CPA for Secure Broadcast
Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodriguez-Henriquez
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodriguez-Henriquez
TRS-80 With A Keccak Sponge Cake
Jean-Marie Chauvet
Jean-Marie Chauvet
Masking Tables---An Underestimated Security Risk
Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
Elliptic Curve Cryptography in Practice
Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow
Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow
A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol
Maurizio Adriano Strangio
Maurizio Adriano Strangio
SSS-V2: Secure Similarity Search
Hyun-A Park
Hyun-A Park
Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited
Yongqiang Li, Mingsheng Wang, Yuyin Yu
Yongqiang Li, Mingsheng Wang, Yuyin Yu
Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees
Łukasz Krzywiecki, Przemys{\l}aw Kubiak, Miros{\l}aw Kuty{\l}owski
Łukasz Krzywiecki, Przemys{\l}aw Kubiak, Miros{\l}aw Kuty{\l}owski
Functional Encryption for Randomized Functionalities
Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
Modified Alternating Step Generators
Robert Wicik, Tomasz Rachwalik
Robert Wicik, Tomasz Rachwalik
Multi-Input Functional Encryption
Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai
Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
Chihong Joo, Aaram Yun
Chihong Joo, Aaram Yun
Mobile Transaction over NFC and GSM
Muhammad Qasim Saeed, Pardis Pourghomi
Muhammad Qasim Saeed, Pardis Pourghomi
Verifiable Set Operations over Outsourced Databases
Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
Amplifying Privacy in Privacy Amplification
Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
The Realm of the Pairings
Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
Deep Attacks of a Certificateless Signature Scheme
Bo Yang, Zhao Yang, Zibi Xiao, Shougui Li
Bo Yang, Zhao Yang, Zibi Xiao, Shougui Li
Outsourced Symmetric Private Information Retrieval
Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
Sandro Coretti, Ueli Maurer, Björn Tackmann
Sandro Coretti, Ueli Maurer, Björn Tackmann
NTRU-KE: A Lattice-based Public Key Exchange Protocol
Xinyu Lei, Xiaofeng Liao
Xinyu Lei, Xiaofeng Liao
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
A Secure Obfuscator for Encrypted Blind Signature Functionality
Xiao Feng, Zheng Yuan
Xiao Feng, Zheng Yuan
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
Method to secure data in the cloud while preserving summary statistics
Sanchita Barman, Bimal Roy
Sanchita Barman, Bimal Roy
Cryptanalysis of Zorro
Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang
Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang
PUF-Based RFID Authentication Secure and Private under Memory Leakage
Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung
Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung
Ambiguous One-Move Nominative Signature Without Random Oracles
Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang
Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang
An Approach to Reduce Storage for Homomorphic Computations
Jung Hee Cheon, Jinsu Kim
Jung Hee Cheon, Jinsu Kim
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks
Mohammad Sadeq Dousti, Rasool Jalili
Mohammad Sadeq Dousti, Rasool Jalili
Key Derivation Without Entropy Waste
Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
A reduction of Semigroup DLP to classic DLP
Matan Banin, Boaz Tsaban
Matan Banin, Boaz Tsaban
How to Certify the Leakage of a Chip?
François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation
Clemens Heuberger, Michela Mazzoli
Clemens Heuberger, Michela Mazzoli
Adaptive Witness Encryption and Asymmetric Password-based Cryptography
Mihir Bellare, Viet Tung Hoang
Mihir Bellare, Viet Tung Hoang
Limits of Extractability Assumptions with Distributional Auxiliary Input
Elette Boyle, Rafael Pass
Elette Boyle, Rafael Pass
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
Higher Order Masking of Look-up Tables
Jean-Sebastien Coron
Jean-Sebastien Coron
Bootstrapping Obfuscators via Fast Pseudorandom Functions
Benny Applebaum
Benny Applebaum
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Xi-Jun Lin, Lin Sun
Xi-Jun Lin, Lin Sun
A More Efficient AES Threshold Implementation
Begul Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Begul Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Examination of a New Defense Mechanism: Honeywords
Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
AEGIS: A Fast Authenticated Encryption Algorithm
Hongjun Wu, Bart Preneel
Hongjun Wu, Bart Preneel
Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data
Lichun Li, Anwitaman Datta
Lichun Li, Anwitaman Datta
Secure Key Exchange and Sessions Without Credentials
Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis
Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis
Faster Compact Diffie-Hellman: Endomorphisms on the x-line
Craig Costello, Huseyin Hisil, Benjamin Smith
Craig Costello, Huseyin Hisil, Benjamin Smith
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Antonio Marcedone, Claudio Orlandi
Antonio Marcedone, Claudio Orlandi
Differing-Inputs Obfuscation and Applications
Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry
Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry
Unbalancing Pairing-Based Key Exchange Protocols
Michael Scott
Michael Scott
How to Compress (Reusable) Garbled Circuits
Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
New abstractions in applied pi-calculus and automated verification of protected executions
Shiwei Xu, Sergiu Bursuc, Julian P. Murphy
Shiwei Xu, Sergiu Bursuc, Julian P. Murphy
Solving shortest and closest vector problems: The decomposition approach
Anja Becker, Nicolas Gama, Antoine Joux
Anja Becker, Nicolas Gama, Antoine Joux
Fully Bideniable Public-Key Encryption
Marcel Šebek
Marcel Šebek
Separations in Circular Security for Arbitrary Length Key Cycles
Venkata Koppula, Kim Ramchen, Brent Waters
Venkata Koppula, Kim Ramchen, Brent Waters
Secret Key Cryptosystem based on Non-Systematic Polar Codes
Reza Hooshmand, Mohammad Reza Aref, Taraneh Eghlidos
Reza Hooshmand, Mohammad Reza Aref, Taraneh Eghlidos
Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks
Damien Vergnaud, David Xiao
Damien Vergnaud, David Xiao
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
Dana Dachman-Soled
Dana Dachman-Soled
Formal verification of a software countermeasure against instruction skip attacks
Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson
Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson
Universally composable privacy preserving finite automata execution with low online and offline complexity
Peeter Laud, Jan Willemson
Peeter Laud, Jan Willemson
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
Tomer Ashur, Orr Dunkelman
Tomer Ashur, Orr Dunkelman
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Traps to the BGJT-Algorithm for Discrete Logarithms
Qi Cheng, Daqing Wan, Jincheng Zhuang
Qi Cheng, Daqing Wan, Jincheng Zhuang
Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians
Benjamin Smith
Benjamin Smith
Robust Pseudorandom Generators
Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman
Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces
Charanjit Jutla, Arnab Roy
Charanjit Jutla, Arnab Roy
Attribute-Based Encryption for Arithmetic Circuits
Dan Boneh, Valeria Nikolaenko, Gil Segev
Dan Boneh, Valeria Nikolaenko, Gil Segev
Obfuscation for Evasive Functions
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
A TPM Diffie-Hellman Oracle
Tolga Acar, Lan Nguyen, Greg Zaverucha
Tolga Acar, Lan Nguyen, Greg Zaverucha
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
The Impossibility of Obfuscation with a Universal Simulator
Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai
Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
Michael Backes, Praveen Manoharan, Esfandiar Mohammadi
Michael Backes, Praveen Manoharan, Esfandiar Mohammadi
Linear Cryptanalysis of Round Reduced SIMON
Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya
Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya
Fine-Tuning Groth-Sahai Proofs
Alex Escala, Jens Groth
Alex Escala, Jens Groth
Private aggregation on untrusted servers with customizable thresholds
Constantinos Patsakis, Michael Clear, Paul Laird
Constantinos Patsakis, Michael Clear, Paul Laird
Discrete Logarithms and Mordell-Weil Groups
Mohammad Sadek
Mohammad Sadek
A provable secure anonymous proxy signature scheme without random oracles
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Parallel authenticated encryption with the duplex construction
Pawel Morawiecki, Josef Pieprzyk
Pawel Morawiecki, Josef Pieprzyk
New Trapdoor Projection Maps for Composite-Order Bilinear Groups
Sarah Meiklejohn, Hovav Shacham
Sarah Meiklejohn, Hovav Shacham
Bias-based modeling and entropy analysis of PUFs
Robbert van den Berg, Boris Skoric, Vincent van der Leest
Robbert van den Berg, Boris Skoric, Vincent van der Leest
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel
Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Baodong Qin, Shengli Liu
Baodong Qin, Shengli Liu
RKA-KDM secure encryption from public-key encryption
Florian Böhl, Gareth T. Davies, Dennis Hofheinz
Florian Böhl, Gareth T. Davies, Dennis Hofheinz
Efficient Modular Arithmetic for SIMD Devices
Wilke Trei
Wilke Trei
A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound
Sanjit Chatterjee, Chethan Kamath
Sanjit Chatterjee, Chethan Kamath
On Extractability (a.k.a. Differing-Inputs) Obfuscation
Elette Boyle, Kai-Min Chung, Rafael Pass
Elette Boyle, Kai-Min Chung, Rafael Pass
Security Analysis of Password-Authenticated Key Retrieval
SeongHan Shin, Kazukuni Kobara
SeongHan Shin, Kazukuni Kobara
Integral Distinguishers for Reduced-round Stribog
Riham AlTawy, Amr M. Youssef
Riham AlTawy, Amr M. Youssef
A note on high-security general-purpose elliptic curves
Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, Jefferson E. Ricardini
Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, Jefferson E. Ricardini
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
Johannes Blömer, Gennadij Liske
Johannes Blömer, Gennadij Liske
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap
Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap
Elliptic and Hyperelliptic Curves: a Practical Security Analysis
Joppe W. Bos, Craig Costello, Andrea Miele
Joppe W. Bos, Craig Costello, Andrea Miele
There is no Indistinguishability Obfuscation in Pessiland
Tal Moran, Alon Rosen
Tal Moran, Alon Rosen
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh, Mark Zhandry
Dan Boneh, Mark Zhandry
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
Communication-Efficient MPC for General Adversary Structures
Joshua Lampkins, Rafail Ostrovsky
Joshua Lampkins, Rafail Ostrovsky
Differentially 4-Uniform Bijections by Permuting the Inverse Function
Deng Tang, Claude Carlet, Xiaohu Tang
Deng Tang, Claude Carlet, Xiaohu Tang
DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
Somindu C. Ramanna
Somindu C. Ramanna
Detection of Algebraic Manipulation in the Presence of Leakage
Hadi Ahmadi, Reihaneh Safavi-Naini
Hadi Ahmadi, Reihaneh Safavi-Naini
SCARE of Secret Ciphers with SPN Structures
Matthieu Rivain, Thomas Roche
Matthieu Rivain, Thomas Roche
Universal security; from bits and mips to pools, lakes -- and beyond
Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Four Measures of Nonlinearity
J. Boyar, M. G. Find, R. Peralta
J. Boyar, M. G. Find, R. Peralta
Combined Modeling and Side Channel Attacks on Strong PUFs
Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar
Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar
Protecting Obfuscation Against Algebraic Attacks
Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
Estimating Key Sizes For High Dimensional Lattice-Based Systems
Joop van de Pol, Nigel P. Smart
Joop van de Pol, Nigel P. Smart
Secure Key Management in the Cloud
Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Kazuhiko Minematsu
Kazuhiko Minematsu
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
Jiawei Yuan, Shucheng Yu
Jiawei Yuan, Shucheng Yu
Improved Linear Attacks on the Chinese Block Cipher Standard
Mingjie Liu, Jiazhe Chen
Mingjie Liu, Jiazhe Chen
PillarBox: Combating next-generation malware with fast forward-secure logging
Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption
Xiaolin Cao, Ciara Moore
Xiaolin Cao, Ciara Moore
Off-Path Hacking: The Illusion of Challenge-Response Authentication
Yossi Gilad, Amir Herzberg, Haya Shulman
Yossi Gilad, Amir Herzberg, Haya Shulman
Decentralized Anonymous Credentials
Christina Garman, Matthew Green, Ian Miers
Christina Garman, Matthew Green, Ian Miers
Multi-LHL protocol
Marika Mitrengová
Marika Mitrengová
Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
Jeroen Delvaux, Ingrid Verbauwhede
Jeroen Delvaux, Ingrid Verbauwhede
Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Pierre-Alain Fouque, Pierre Karpman
Pierre-Alain Fouque, Pierre Karpman
Some results concerning global avalanche characteristics of two $q$-ary functions
Brajesh Kumar Singh
Brajesh Kumar Singh
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan, Neil Hanley
Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan, Neil Hanley
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends
Hugo Jonker, Sjouke Mauw, Jun Pang
Hugo Jonker, Sjouke Mauw, Jun Pang
Is extracting data the same as possessing data?
Douglas R. Stinson, Jalaj Upadhyay
Douglas R. Stinson, Jalaj Upadhyay
Recomputing with Permuted Operands: A Concurrent Error Detection Approach
Xiaofei Guo, Ramesh Karri
Xiaofei Guo, Ramesh Karri
Sub-linear Blind Ring Signatures without Random Oracles
Essam Ghadafi
Essam Ghadafi
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki
Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki
Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
Jeroen Delvaux, Ingrid Verbauwhede
Jeroen Delvaux, Ingrid Verbauwhede
Ultra Low-Power implementation of ECC on the ARM Cortex-M0+
Ruan de Clercq, Leif Uhsadel, Anthony Van Herrewege, Ingrid Verbauwhede
Ruan de Clercq, Leif Uhsadel, Anthony Van Herrewege, Ingrid Verbauwhede
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
Cryptanalysis of Full RIPEMD-128
Franck Landelle, Thomas Peyrin
Franck Landelle, Thomas Peyrin
Revocable quantum timed-release encryption
Dominique Unruh
Dominique Unruh
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
Masao KASAHARA
Masao KASAHARA
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
Jörg Schwenk
Jörg Schwenk
Invariance-Based Concurrent Error Detection for Advanced Encryption Standard
Xiaofei Guo, Ramesh Karri
Xiaofei Guo, Ramesh Karri
On the Efficacy of Solving LWE by Reduction to Unique-SVP
Martin R. Albrecht, Robert Fitzpatrick, Florian G ̈opfert
Martin R. Albrecht, Robert Fitzpatrick, Florian G ̈opfert
Two-round secure MPC from Indistinguishability Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
Improved Cryptanalysis of Reduced RIPEMD-160
Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu
Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu
Factoring RSA keys from certified smart cards: Coppersmith in the wild
Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren
Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version
Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar
Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar
Efficient Pairings Computation on Jacobi Quartic Elliptic Curves
Sylvain Duquesne, Nadia El Mrabet, Emmanuel Fouotsa
Sylvain Duquesne, Nadia El Mrabet, Emmanuel Fouotsa
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study
Michael Shantz, Edlyn Teske
Michael Shantz, Edlyn Teske
Enhanced certificate transparency and end-to-end encrypted mail
Mark D. Ryan
Mark D. Ryan
A Local-Global Approach to Solving Ideal Lattice Problems
Yuan Tian, Rongxin Sun, Xueyong Zhu
Yuan Tian, Rongxin Sun, Xueyong Zhu
Efficient One-Sided Adaptively Secure Computation
Carmit Hazay, Arpita Patra
Carmit Hazay, Arpita Patra
Cryptanalysis of the Toorani-Falahati Hill Ciphers
Liam Keliher, Anthony Z. Delaney
Liam Keliher, Anthony Z. Delaney
Analysis of the Rainbow Tradeoff Algorithm Used in Practice
Jung Woo Kim, Jin Hong, Kunsoo Park
Jung Woo Kim, Jin Hong, Kunsoo Park
EyeDecrypt -- Private Interactions in Plain Sight
Andrea Forte, Juan Garay, Trevor Jim, Yevgeniy Vahlis
Andrea Forte, Juan Garay, Trevor Jim, Yevgeniy Vahlis
Smashing MASH-1
Vladimir Antipkin
Vladimir Antipkin
SPHF-Friendly Non-Interactive Commitments
Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
Generic related-key and induced chosen IV attacks using the method of key differentiation
Enes Pasalic, Yongzhuang Wei
Enes Pasalic, Yongzhuang Wei
On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two
Xiutao Feng, Guang Gong
Xiutao Feng, Guang Gong
Cryptanalysis of GOST R Hash Function
Zongyue Wang, Hongbo Yu, Xiaoyun Wang
Zongyue Wang, Hongbo Yu, Xiaoyun Wang
Polynomial Selection for the Number Field Sieve in an Elementary Geometric View
Min Yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
Min Yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions
Antoine Joux, Cécile Pierrot
Antoine Joux, Cécile Pierrot
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones
Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
Random Projections, Graph Sparsification, and Differential Privacy
Jalaj Upadhyay
Jalaj Upadhyay
On Measurable Side-Channel Leaks inside ASIC Design Primitives
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov
Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
Luís T. A. N. Brandão
Luís T. A. N. Brandão
Extended Criterion for Absence of Fixed Points
Oleksandr Kazymyrov, Valentyna Kazymyrova
Oleksandr Kazymyrov, Valentyna Kazymyrova
Equivalence between MAC and PRF for Blockcipher based Constructions
Nilanjan Datta, Mridul Nandi
Nilanjan Datta, Mridul Nandi
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
Mridul Nandi
Mridul Nandi
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE
Leibo Li, Keting Jia, Xiaoyun Wang
Leibo Li, Keting Jia, Xiaoyun Wang
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay
Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay
Efficient General-Adversary Multi-Party Computation
Martin Hirt, Daniel Tschudi
Martin Hirt, Daniel Tschudi
New Efficient Identity-Based Encryption From Factorization
Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao
Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao
More Efficient Cryptosystems From $k^{th}$-Power Residues
Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
Cryptanalysis of the Speck Family of Block Ciphers
Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
KDM Security in the Hybrid Framework
Gareth T. Davies, Martijn Stam
Gareth T. Davies, Martijn Stam
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
Jeroen Delvaux, Ingrid Verbauwhede
Jeroen Delvaux, Ingrid Verbauwhede
Non-Malleable Coding Against Bit-wise and Split-State Tampering
Mahdi Cheraghchi, Venkatesan Guruswami
Mahdi Cheraghchi, Venkatesan Guruswami
Capacity of Non-Malleable Codes
Mahdi Cheraghchi, Venkatesan Guruswami
Mahdi Cheraghchi, Venkatesan Guruswami
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
Zvika Brakerski, Guy N. Rothblum
Zvika Brakerski, Guy N. Rothblum
Self-pairings on supersingular elliptic curves with embedding degree $three$
Binglong Chen, Chang-An Zhao
Binglong Chen, Chang-An Zhao
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time
Ben Morris, Phillip Rogaway
Ben Morris, Phillip Rogaway
A Definitional Framework for Functional Encryption
Christian Matt, Ueli Maurer
Christian Matt, Ueli Maurer
Practical approaches to varying network size in combinatorial key predistribution schemes
Kevin Henry, Maura B. Paterson, Douglas R. Stinson
Kevin Henry, Maura B. Paterson, Douglas R. Stinson
Black-Box Obfuscation for d-CNFs
Zvika Brakerski, Guy N. Rothblum
Zvika Brakerski, Guy N. Rothblum
Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
Oleksandr Kazymyrov, Valentyna Kazymyrova
Oleksandr Kazymyrov, Valentyna Kazymyrova
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
Ueli Maurer, Björn Tackmann, Sandro Coretti
Ueli Maurer, Björn Tackmann, Sandro Coretti
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy, Sylvain Guilley, Zakaria Najm
Pablo Rauzy, Sylvain Guilley, Zakaria Najm
Multi-Valued Byzantine Broadcast: the $t < n$ Case
Martin Hirt, Pavel Raykov
Martin Hirt, Pavel Raykov
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
Puzzle Encryption Algorithm
Gregory Alvarez, Charles Berenguer
Gregory Alvarez, Charles Berenguer
More Efficient Cryptosystems From k-th Power Residues
Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem
Koh-ichi Nagao
Koh-ichi Nagao
Decomposition formula of the Jacobian group of plane curve
Koh-ichi Nagao
Koh-ichi Nagao
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks
Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang
Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang
TRS-80 with a grain of salt
Jean-Marie Chauvet
Jean-Marie Chauvet
Private Over-threshold Aggregation Protocols over Distributed Databases
Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
Christian Hanser, Daniel Slamanig
Christian Hanser, Daniel Slamanig
Cryptanalysis of the SIMON Family of Block Ciphers
Hoda A. Alkhzaimi, Martin M. Lauridsen
Hoda A. Alkhzaimi, Martin M. Lauridsen
Searching for Nonlinear Feedback Shift Registers with Parallel Computing
Przemysław Dąbrowski, Grzegorz Łabuzek, Tomasz Rachwalik, Janusz Szmidt
Przemysław Dąbrowski, Grzegorz Łabuzek, Tomasz Rachwalik, Janusz Szmidt
Lattice-Based FHE as Secure as PKE
Zvika Brakerski, Vinod Vaikuntanathan
Zvika Brakerski, Vinod Vaikuntanathan
On the security of a password-only authenticated three-party key exchange protocol
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
Rebound attacks on Stribog
Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
Practical Issues with TLS Client Certificate Authentication
Arnis Parsovs
Arnis Parsovs
Inter-FSP Funds Transfer Protocol
Amir Herzberg, Shay Nachmani
Amir Herzberg, Shay Nachmani
A Three-Level Sieve Algorithm for the Shortest Vector Problem
Feng Zhang, Yanbin Pan, Gengran Hu
Feng Zhang, Yanbin Pan, Gengran Hu
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms
Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede
Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede
Efficient Unobservable Anonymous Reporting against Strong Adversaries
Nethanel Gelernter, Amir Herzberg
Nethanel Gelernter, Amir Herzberg
Gossip Latin Square and The Meet-All Gossipers Problem
Nethanel Gelernter, Amir Herzberg
Nethanel Gelernter, Amir Herzberg
On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves
Takakazu Satoh
Takakazu Satoh
On the Limits of Provable Anonymity
Nethanel Gelernter, Amir Herzberg
Nethanel Gelernter, Amir Herzberg
The Parallel-Cut Meet-In-The-Middle Attack
Ivica Nikolic, Lei Wang, Shuang Wu
Ivica Nikolic, Lei Wang, Shuang Wu
How to Withstand Mobile Virus Attacks, Revisited
Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
Somindu C. Ramanna, Palash Sarkar
Somindu C. Ramanna, Palash Sarkar
The Spammed Code Offset Method
Boris Skoric, Niels de Vreede
Boris Skoric, Niels de Vreede
Differential and Linear Cryptanalysis of Reduced-Round Simon
Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
Catena: A Memory-Consuming Password-Scrambling Framework
Christian Forler, Stefan Lucks, Jakob Wenzel
Christian Forler, Stefan Lucks, Jakob Wenzel
Threshold Secret Image Sharing
Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
White-Box Security Notions for Symmetric Encryption Schemes
Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
The Resistance of PRESENT-80 Against Related-Key Differential Attacks
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
Multiple Limited-Birthday Distinguishers and Applications
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
Locally Updatable and Locally Decodable Codes
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
Montgomery Multiplication Using Vector Instructions
Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
Universal Leaky Random Oracle Model
Guangjun Fan, Yongbin Zhou, Dengguo Feng
Guangjun Fan, Yongbin Zhou, Dengguo Feng
Improvement of One Adaptive Oblivious Transfer Scheme
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Algebraic MACs and Keyed-Verification Anonymous Credentials
Melissa Chase, Sarah Meiklejohn, Gregory M. Zaverucha
Melissa Chase, Sarah Meiklejohn, Gregory M. Zaverucha
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
Changyu Dong, Liqun Chen, Zikai Wen
Changyu Dong, Liqun Chen, Zikai Wen
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Jia Xu, Jianying Zhou
Jia Xu, Jianying Zhou
Enforcing Language Semantics Using Proof-Carrying Data
Stephen Chong, Eran Tromer, Jeffrey A. Vaughan
Stephen Chong, Eran Tromer, Jeffrey A. Vaughan
Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi, Phong Q. Nguyen
Jingguo Bi, Phong Q. Nguyen
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation
Susan Hohenberger, Amit Sahai, Brent Waters
Susan Hohenberger, Amit Sahai, Brent Waters
Multi-Key Searchable Encryption
Raluca Ada Popa, Nickolai Zeldovich
Raluca Ada Popa, Nickolai Zeldovich
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
Pablo Rauzy, Sylvain Guilley
Pablo Rauzy, Sylvain Guilley
Improvement of One Anonymous Identity-Based Encryption
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves
Reza Azarderakhsh, Koray Karabina
Reza Azarderakhsh, Koray Karabina
On secret sharing with nonlinear product reconstruction
Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Carles Padro, Chaoping Xing
Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Carles Padro, Chaoping Xing
Proving TLS-attack related open biases of RC4
Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
Type-Based Analysis of Protected Storage in the TPM (full version)
Jianxiong Shao, Dengguo Feng, Yu Qin
Jianxiong Shao, Dengguo Feng, Yu Qin
Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups
Ran Canetti, Vinod Vaikuntanathan
Ran Canetti, Vinod Vaikuntanathan
Limits on the Power of Cryptographic Cheap Talk
Pavel Hubacek, Jesper Buus Nielsen, Alon Rosen
Pavel Hubacek, Jesper Buus Nielsen, Alon Rosen
Non-Malleable Codes from Two-Source Extractors
Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Zhengjun Cao, Hanyue Cao
Zhengjun Cao, Hanyue Cao
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
Juan Garay, Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
Juan Garay, Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
Revocable IBE Systems with Almost Constant-size Key Update
Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang
Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang
Differential Fault Attack against Grain family with very few faults and minimal assumptions
Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra
Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra
A new class of semi-bent quadratic Boolean functions
Chunming Tang, Yanfeng Qi
Chunming Tang, Yanfeng Qi
Cryptographically Enforced RBAC
Anna Lisa Ferrara, George Fuchsbauer, Bogdan Warinschi
Anna Lisa Ferrara, George Fuchsbauer, Bogdan Warinschi
Improved OT Extension for Transferring Short Secrets
Vladimir Kolesnikov, Ranjit Kumaresan
Vladimir Kolesnikov, Ranjit Kumaresan
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
Masoumeh Safkhani, Nasour Bagheri
Masoumeh Safkhani, Nasour Bagheri
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
Constantinos Patsakis, Agusti Solanas
Constantinos Patsakis, Agusti Solanas
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
Kwangsu Lee, Dong Hoon Lee
Kwangsu Lee, Dong Hoon Lee
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
Handling Authentication and Detection Probability in Multi-tag RFID Environment
Subhasish Dhal, Indranil Sengupta
Subhasish Dhal, Indranil Sengupta
A New Object Searching Protocol for Multi-tag RFID
Subhasish Dhal, Indranil Sengupta
Subhasish Dhal, Indranil Sengupta
Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
Jiawei Yuan, Shucheng Yu
Jiawei Yuan, Shucheng Yu
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search
Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun
Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun
Bounds in Shallows and in Miseries
Céline Blondeau, Andrey Bogdanov, Gregor Leander
Céline Blondeau, Andrey Bogdanov, Gregor Leander
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012
Yosuke Todo, Keita Xagawa
Yosuke Todo, Keita Xagawa
Efficient Multiparty Protocols via Log-Depth Threshold Formulae
Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum
Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
B. Skoric
B. Skoric
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
Stefan G. Weber
Stefan G. Weber
Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing
Renaud Dubois, Margaux Dugardin, Aurore Guillevic
Renaud Dubois, Margaux Dugardin, Aurore Guillevic
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
A note on verifying the APN property
Pascale Charpin, Gohar M. Kyureghyan
Pascale Charpin, Gohar M. Kyureghyan
Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
Zhengjun Cao
Zhengjun Cao
The Norwegian Internet Voting Protocol
Kristian Gjøsteen
Kristian Gjøsteen
Partially blind password-based signatures using elliptic curves
Kristian Gjøsteen
Kristian Gjøsteen
Obfuscating Conjunctions
Zvika Brakerski, Guy N. Rothblum
Zvika Brakerski, Guy N. Rothblum
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
Verifiable Delegation of Computation on Outsourced Data
Michael Backes, Dario Fiore, Raphael M. Reischuk
Michael Backes, Dario Fiore, Raphael M. Reischuk
How To Construct Extractable One-Way Functions Against Uniform Adversaries
Nir Bitansky, Ran Canetti, Omer Paneth
Nir Bitansky, Ran Canetti, Omer Paneth
Analysis of BLAKE2
Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu
Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu
Efficient computation of addition-subtraction chains using generalized continued Fractions
Amadou Tall, Ali Yassin Sanghare
Amadou Tall, Ali Yassin Sanghare
Practical & Provably Secure Distance-Bounding
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Towards A Practical JCJ / Civitas Implementation
Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware
Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu
Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu
Solving Terminal Revocation in EAC by Augmenting Terminal Authentication
Rafik Chaabouni
Rafik Chaabouni
Reset Indifferentiability and its Consequences
Paul Baecher, Chris Brzuska, Arno Mittelbach
Paul Baecher, Chris Brzuska, Arno Mittelbach
Exponentiating in Pairing Groups
Joppe W. Bos, Craig Costello, Michael Naehrig
Joppe W. Bos, Craig Costello, Michael Naehrig
Deduction Soundness: Prove One, Get Five for Free
Florian Böhl, Véronique Cortier, Bogdan Warinschi
Florian Böhl, Véronique Cortier, Bogdan Warinschi
On the Security of Group-based Proxy Re-encryption Scheme
Purushothama B R, B B Amberker
Purushothama B R, B B Amberker
Another Nail in the Coffin of White-Box AES Implementations
Tancrède Lepoint, Matthieu Rivain
Tancrède Lepoint, Matthieu Rivain
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Amit Sahai, Brent Waters
Amit Sahai, Brent Waters
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Nasour Bagheri, Masoumeh Safkhani
Nasour Bagheri, Masoumeh Safkhani
Secure Channel Coding Schemes based on Polar Codes
Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters
Revisiting the BGE Attack on a White-Box AES Implementation
Yoni De Mulder, Peter Roelse, Bart Preneel
Yoni De Mulder, Peter Roelse, Bart Preneel
A Note On the Storage Requirement for AKS Primality Testing Algorithm
Zhengjun Cao
Zhengjun Cao
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
Yuval Yarom, Katrina Falkner
Yuval Yarom, Katrina Falkner
Dynamic Runtime Methods to Enhance Private Key Blinding
Karine Gandolfi-Villegas, Nabil Hamzi
Karine Gandolfi-Villegas, Nabil Hamzi
Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
Implementing Lightweight Block Ciphers on x86 Architectures
Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
Sequential message authentication code without random oracles
Bin Wang, Xiaojing Hong
Bin Wang, Xiaojing Hong
Optimally Anonymous and Transferable Conditional E-cash
Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu
Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu
On Fair Exchange, Fair Coins and Fair Sampling
Shashank Agrawal, Manoj Prabhakaran
Shashank Agrawal, Manoj Prabhakaran
On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
Yongge Wang
Yongge Wang
Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption
Mitsugu Iwamoto, Junji Shikata
Mitsugu Iwamoto, Junji Shikata
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
Peter Pessl, Michael Hutter
Peter Pessl, Michael Hutter
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations
Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
A Uniform Min-Max Theorem with Applications in Cryptography
Salil Vadhan, Colin Jia Zheng
Salil Vadhan, Colin Jia Zheng
Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version
Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
Efficient Cryptosystems From $2^k$-th Power Residue Symbols
Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert
Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
Susan Hohenberger, Amit Sahai, Brent Waters
Susan Hohenberger, Amit Sahai, Brent Waters
On Symmetric Encryption with Distinguishable Decryption Failures
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
Eric Brier, David Naccache, Li-yao Xia
Eric Brier, David Naccache, Li-yao Xia
Practical-Time Attacks Against Reduced Variants of MISTY1
Orr Dunkelman, Nathan Keller
Orr Dunkelman, Nathan Keller
Security of the Misty Structure Beyond the Birthday Bound
Jooyoung Lee
Jooyoung Lee
DupLESS: Server-Aided Encryption for Deduplicated Storage
Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
Faster 128-EEA3 and 128-EIA3 Software
Roberto Avanzi, Billy Bob Brumley
Roberto Avanzi, Billy Bob Brumley
Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials
Jiangtao Han, Haining Fan
Jiangtao Han, Haining Fan
Efficient Garbling from a Fixed-Key Blockcipher
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway
Break WEP Faster with Statistical Analysis
Rafik Chaabouni
Rafik Chaabouni
Instantiating Random Oracles via UCEs
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
Locally Computable UOWHF with Linear Shrinkage
Benny Applebaum, Yoni Moses
Benny Applebaum, Yoni Moses
Private Database Queries Using Somewhat Homomorphic Encryption
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
Valentina Banciu, Simon Hoerder, Dan Page
Valentina Banciu, Simon Hoerder, Dan Page
The Holey Grail: A special score function for non-binary traitor tracing
B. Skoric, J. -J. Oosterwijk, J. Doumen
B. Skoric, J. -J. Oosterwijk, J. Doumen
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
Rikke Bendlin, Sara Krehbiel, Chris Peikert
Rikke Bendlin, Sara Krehbiel, Chris Peikert
On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker, Tibor Jager, Dominique Schröder
Nils Fleischhacker, Tibor Jager, Dominique Schröder
The Improved Cube Attack on Grain-v1
Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang
Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang
Computational Fuzzy Extractors
Benjamin Fuller, Xianrui Meng, Leonid Reyzin
Benjamin Fuller, Xianrui Meng, Leonid Reyzin
SL2 homomorphic hash functions: Worst case to average case reduction and short collision search
Ciaran Mullan, Boaz Tsaban
Ciaran Mullan, Boaz Tsaban
A novel certificateless deniable authentication protocol
Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
Policy-Based Signatures
Mihir Bellare, Georg Fuchsbauer
Mihir Bellare, Georg Fuchsbauer
Moduar Form Aprroach to Solving Lattice Problems
Yuan Tian, Xueyong Zhu, Rongxin Sun
Yuan Tian, Xueyong Zhu, Rongxin Sun
Security Analysis of Lightweight Authentication Protocol from WISTP 2013
Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
Yossi Gilad, Amir Herzberg
Yossi Gilad, Amir Herzberg
Order-Preserving Encryption Secure Beyond One-Wayness
Tal Malkin, Isamu Teranishi, Moti Yung
Tal Malkin, Isamu Teranishi, Moti Yung
Delegatable Functional Signatures
Michael Backes, Sebastian Meiser, Dominique Schröder
Michael Backes, Sebastian Meiser, Dominique Schröder
Automated Security Proofs for Almost-Universal Hash for MAC verification
Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
Attribute-Based Server-Aided Verification Signature
Zhiwei Wang, Ruirui Xie, Wei Zhang, Liwen He, Guozi Sun, Wei Chen
Zhiwei Wang, Ruirui Xie, Wei Zhang, Liwen He, Guozi Sun, Wei Chen
New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields
Chunming Tang, Yanfeng Qi, Maozhi Xu
Chunming Tang, Yanfeng Qi, Maozhi Xu
The SIMON and SPECK Families of Lightweight Block Ciphers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Function-Private Subspace-Membership Encryption and Its Applications
Dan Boneh, Ananth Raghunathan, Gil Segev
Dan Boneh, Ananth Raghunathan, Gil Segev
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen
Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen
Functional Signatures and Pseudorandom Functions
Elette Boyle, Shafi Goldwasser, Ioana Ivan
Elette Boyle, Shafi Goldwasser, Ioana Ivan
A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
Roel Peeters, Jens Hermans
Roel Peeters, Jens Hermans
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
Practical Secure Logging: Seekable Sequential Key Generators
Giorgia Azzurra Marson, Bertram Poettering
Giorgia Azzurra Marson, Bertram Poettering
On the Practical Security of a Leakage Resilient Masking Scheme
Emmanuel Prouff, Matthieu Rivain, Thomas Roche
Emmanuel Prouff, Matthieu Rivain, Thomas Roche
A Public Key Cryptoscheme Using Bit-pair Shadows
Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie
Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
Yong Li, Zheng Yang
Yong Li, Zheng Yang
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
Christian Hanser, Daniel Slamanig
Christian Hanser, Daniel Slamanig
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada
Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes
Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi
Cryptographically Protected Prefixes for Location Privacy in IPv6
Jonathan Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain
Jonathan Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain
Side Channel Attacks against Pairing over Theta Functions
Nadia El Mrabet
Nadia El Mrabet
Cryptanalysis of ultralightweight RFID authentication protocol
Umar Mujahid, M. Najam-ul-islam, Jameel Ahmed, Usman Mujahid
Umar Mujahid, M. Najam-ul-islam, Jameel Ahmed, Usman Mujahid
Sequential Aggregate Signatures Made Shorter
Kwangsu Lee, Dong Hoon Lee, Moti Yung
Kwangsu Lee, Dong Hoon Lee, Moti Yung
Lattice Signatures and Bimodal Gaussians
Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro
Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro
Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl
Bingke Ma, Bao Li, Ronglin Hao
Bingke Ma, Bao Li, Ronglin Hao
Comments on Three Multi-Server Authentication Protocols
Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai
Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai
Delegatable Pseudorandom Functions and Applications
Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias
Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias
A note on quantum related-key attacks
Martin Roetteler, Rainer Steinwandt
Martin Roetteler, Rainer Steinwandt
An Algebraic Framework for Diffie-Hellman Assumptions
Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
An Accurate Probabilistic Reliability Model for Silicon PUFs
Roel Maes
Roel Maes
NaCl on 8-Bit AVR Microcontrollers
Michael Hutter, Peter Schwabe
Michael Hutter, Peter Schwabe
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
Majid Bayat, Mohammad Reza Aref
Majid Bayat, Mohammad Reza Aref
Injective Encoding to Elliptic Curves
Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
Practical Bootstrapping in Quasilinear Time
Jacob Alperin-Sheriff, Chris Peikert
Jacob Alperin-Sheriff, Chris Peikert
Domain-Polymorphic Programming of Privacy-Preserving Applications
Dan Bogdanov, Peeter Laud, Jaak Randmets
Dan Bogdanov, Peeter Laud, Jaak Randmets
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
François-Xavier Standaert, Olivier Pereira, Yu Yu
François-Xavier Standaert, Olivier Pereira, Yu Yu
Block Ciphers that are Easier to Mask: How Far Can we Go?
Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert
Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert
Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--
Jacques Patarin
Jacques Patarin
On the Security of TLS-DH and TLS-RSA in the Standard Model
Florian Kohlar, Sven Schäge, Jörg Schwenk
Florian Kohlar, Sven Schäge, Jörg Schwenk
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
Zheng Yang
Zheng Yang
On the Achievability of Simulation-Based Security for Functional Encryption
Angelo De Caro, Vincenzo Iovino Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano
Angelo De Caro, Vincenzo Iovino Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
Masao KASAHARA
Masao KASAHARA
A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor
Shigeo MITSUNARI
Shigeo MITSUNARI
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
Achieving the limits of the noisy-storage model using entanglement sampling
Frédéric Dupuis, Omar Fawzi, Stephanie Wehner
Frédéric Dupuis, Omar Fawzi, Stephanie Wehner
A heuristic for finding compatible differential paths with application to HAS-160
Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef
Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef
Counter-cryptanalysis
Marc Stevens
Marc Stevens
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
Dmitry Khovratovich, Christian Rechberger
Dmitry Khovratovich, Christian Rechberger
Verifying Computations with State (Extended Version)
Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, Michael Walfish
Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, Michael Walfish
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
Peeter Laud, Alisa Pankova
Peeter Laud, Alisa Pankova
Programmable Hash Functions in the Multilinear Setting
Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
Profiling DPA: Efficacy and efficiency trade-offs
Carolyn Whitnall, Elisabeth Oswald
Carolyn Whitnall, Elisabeth Oswald
Constrained Pseudorandom Functions and Their Applications
Dan Boneh, Brent Waters
Dan Boneh, Brent Waters
Time-Optimal Interactive Proofs for Circuit Evaluation
Justin Thaler
Justin Thaler
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer
Martin Hirt, Christoph Lucas, Ueli Maurer
Multi-file proofs of retrievability for cloud storage auditing
Bin Wang, Xiaojing Hong
Bin Wang, Xiaojing Hong
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
Arnab Roy, Srinivas Vivek
Arnab Roy, Srinivas Vivek
Limits of provable security for homomorphic encryption
Andrej Bogdanov, Chin Ho Lee
Andrej Bogdanov, Chin Ho Lee
Quantum one-time programs
Anne Broadbent, Gus Gutoski, Douglas Stebila
Anne Broadbent, Gus Gutoski, Douglas Stebila
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices
Xiang Xie, Rui Xue
Xiang Xie, Rui Xue
Trapdoor Smooth Projective Hash Functions
Fabrice Benhamouda, David Pointcheval
Fabrice Benhamouda, David Pointcheval
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Craig Gentry, Amit Sahai, Brent Waters
Craig Gentry, Amit Sahai, Brent Waters
On the Security of the TLS Protocol: A Systematic Analysis
Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee
Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs
Attribute-Based Encryption for Circuits
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
A Novel Technique in Linear Cryptanalysis
Wen-Long Sun Jie Guan Lin Ding
Wen-Long Sun Jie Guan Lin Ding
Parallel and Dynamic Searchable Symmetric Encryption
Seny Kamara, Charalampos Papamanthou
Seny Kamara, Charalampos Papamanthou
Protecting PUF Error Correction by Codeword Masking
Dominik Merli, Frederic Stumpf, Georg Sigl
Dominik Merli, Frederic Stumpf, Georg Sigl
Double-authentication-preventing signatures
Bertram Poettering, Douglas Stebila
Bertram Poettering, Douglas Stebila
A method for obtaining lower bounds on the higher order nonlinearity of Boolean function
Mikhail S. Lobanov
Mikhail S. Lobanov
New Constructions and Applications of Trapdoor DDH Groups
Yannick Seurin
Yannick Seurin
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
Afonso Arriaga, Qiang Tang, Peter Ryan
Afonso Arriaga, Qiang Tang, Peter Ryan
Protocol Variants and Electronic Identification
Kristian Gjøsteen
Kristian Gjøsteen
Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
Nicky Mouha, Bart Preneel
Nicky Mouha, Bart Preneel
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
Shenghui Su, Tao Xie, Shuwang Lü
Shenghui Su, Tao Xie, Shuwang Lü
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Mihir Bellare, Sarah Meiklejohn, Susan Thomson
Mihir Bellare, Sarah Meiklejohn, Susan Thomson
Elligator: Elliptic-curve points indistinguishable from uniform random strings
Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange
Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange
Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
Anne Canteaut, María Naya-Plasencia, Bastien Vayssiere
Anne Canteaut, María Naya-Plasencia, Bastien Vayssiere
Encryption Schemes with Post-Challenge Auxiliary Inputs
Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu
Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu
BLAKE2: simpler, smaller, fast as MD5
Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
Instantaneous Frequency Analysis
Roman Korkikian, David Naccache, Guilherme Ozari de Almeida
Roman Korkikian, David Naccache, Guilherme Ozari de Almeida
On the use of continued fractions for stream ciphers
Amadou Moctar Kane
Amadou Moctar Kane
Fully-Anonymous Functional Proxy-Re-Encryption
Yutaka Kawai, Katsuyuki Takashima
Yutaka Kawai, Katsuyuki Takashima
Anon-Pass: Practical Anonymous Subscriptions
Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes
Albrecht Petzoldt
Albrecht Petzoldt
Keyed Side-Channel Based Hashing for IP Protection using Wavelets
Timo Bartkewitz
Timo Bartkewitz
Pairing Inversion via Non-degenerate Auxiliary Pairings
Seunghwan Chang, Hoon Hong, Eunjeong Lee, Hyang-Sook Lee
Seunghwan Chang, Hoon Hong, Eunjeong Lee, Hyang-Sook Lee
Families of fast elliptic curves from Q-curves
Benjamin Smith
Benjamin Smith
Four-dimensional GLV via the Weil restriction
Aurore Guillevic, Sorina Ionica
Aurore Guillevic, Sorina Ionica
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange
W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange
Bypassing Passkey Authentication in Bluetooth Low Energy
Tomas Rosa
Tomas Rosa
Lattice-Based Group Signatures with Logarithmic Signature Size
Fabien Laguillaumie, Adeline Langlois, Benoit Libert, Damien Stehle
Fabien Laguillaumie, Adeline Langlois, Benoit Libert, Damien Stehle
Maliciously Circuit-Private FHE
Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky
Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky
Solving a $6120$-bit DLP on a Desktop Computer
Faruk Golouglu, Robert Granger, Gary McGuire, Jens Zumbragel
Faruk Golouglu, Robert Granger, Gary McGuire, Jens Zumbragel
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
Sonia Belaid, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, Francois-Xavier Standaert, Stefan Tillich
Sonia Belaid, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, Francois-Xavier Standaert, Stefan Tillich
Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers
Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Shivam Bhasin, Claude Carlet, Sylvain Guilley
Shivam Bhasin, Claude Carlet, Sylvain Guilley
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
Nicolas T. Courtois
Nicolas T. Courtois
Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128
Zheng Yuan, Xian Li, Bart Preneel
Zheng Yuan, Xian Li, Bart Preneel
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Allison Lewko, Sarah Meiklejohn
Allison Lewko, Sarah Meiklejohn
Computing class polynomials for abelian surfaces
Andres Enge, Emmanuel Thomé
Andres Enge, Emmanuel Thomé
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wojcik
Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wojcik
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Rachid El Bansarkhani, Johannes Buchmann
Rachid El Bansarkhani, Johannes Buchmann
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Morten Dahl, Ivan Damgård
Morten Dahl, Ivan Damgård
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
Mickaël Cazorla, Kevin Marquet, Marine Minier
Mickaël Cazorla, Kevin Marquet, Marine Minier
Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
Colin O'Flynn, Zhizhang (David) Chen
Colin O'Flynn, Zhizhang (David) Chen
A Toolkit for Ring-LWE Cryptography
Vadim Lyubashevsky, Chris Peikert, Oded Regev
Vadim Lyubashevsky, Chris Peikert, Oded Regev
A Leakage Resilient MAC
Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wojcik
Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wojcik
Security ranking among assumptions within the Uber assumption framework
Antoine Joux, Antoine Rojat
Antoine Joux, Antoine Rojat
Massive Group Message Authentication with Revocable Anonymity
Boaz Catane, Amir Herzberg
Boaz Catane, Amir Herzberg
Secure Second Price Auctions with a Rational Auctioneer
Boaz Catane, Amir Herzberg
Boaz Catane, Amir Herzberg
Key Classification Attack on Block Ciphers
Maghsoud Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi
Maghsoud Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi
The failure of McEliece PKC based on Reed-Muller codes.
I. V. Chizhov, M. A. Borodin
I. V. Chizhov, M. A. Borodin
Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
Arno Mittelbach
A Novel Proof on Weil Pairing
Sutirtha Sanyal
Sutirtha Sanyal
A Secure Paper-Based Electronic Voting With No Encryption
Asghar Tavakkoli, Reza Ebrahimi Atani
Asghar Tavakkoli, Reza Ebrahimi Atani
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
Dan Boneh, Ananth Raghunathan, Gil Segev
Dan Boneh, Ananth Raghunathan, Gil Segev
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Goutam Paul, Anupam Chattopadhyay
Goutam Paul, Anupam Chattopadhyay
Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
Carlos Aguilar-Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
Carlos Aguilar-Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas
Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas
Pinocchio: Nearly Practical Verifiable Computation
Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova
Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova
A Frequency Leakage Model and its application to CPA and DPA
S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, P. Maurine
S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, P. Maurine
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
David Bernhard, Stephan Neumann, Melanie Volkamer
David Bernhard, Stephan Neumann, Melanie Volkamer
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Johannes Braun, Gregor Rynkowski
Johannes Braun, Gregor Rynkowski
A time series approach for profiling attack
Liran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, Olivier Markowitch
Liran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, Olivier Markowitch
Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions
Deepak Kumar Dalai
Deepak Kumar Dalai
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
Sashank Dara
The Legal Classification of Identity-Based Signatures
Christoph Sorge
Christoph Sorge
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
Yu Yu
Yu Yu
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
Jonathan Trostle
Dynamic Cube Attack on Grain-v1
Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee
S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee
L-P States of RC4 Stream Cipher
Jing Lv, Dongdai Lin
Jing Lv, Dongdai Lin
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger, Brent Waters
Susan Hohenberger, Brent Waters
Encrypted Secret Sharing and Analysis by Plaintext Randomization
Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
Speeding up QUAD
Albrecht Petzoldt
Albrecht Petzoldt
An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
Gérald Gavin
Gérald Gavin
Secure information transmission based on physical principles
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
From Weak to Strong Zero-Knowledge and Applications
Kai-Min Chung, Edward Lui, Rafael Pass
Kai-Min Chung, Edward Lui, Rafael Pass
Private Interactive Communication Across an Adversarial Channel
Ran Gelles, Amit Sahai, Akshay Wadia
Ran Gelles, Amit Sahai, Akshay Wadia
Witness Encryption and its Applications
Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters
Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters
Secure two-party computation: a visual way
Paolo D'Arco, Roberto De Prisco
Paolo D'Arco, Roberto De Prisco
On the Lossiness of the Rabin Trapdoor Function
Yannick Seurin
Yannick Seurin
How to Construct an Ideal Cipher from a Small Set of Public Permutations
Rodolphe Lampe, Yannick Seurin
Rodolphe Lampe, Yannick Seurin
Towards Adoption of DNSSEC: Availability and Security Challenges
Amir Herzberg, Haya Shulman
Amir Herzberg, Haya Shulman
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke
Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke
On the Primitivity of some Trinomials over Finite Fields
LI Yujuan, WANG Huaifu, ZHAO Jinhua
LI Yujuan, WANG Huaifu, ZHAO Jinhua
Permutation Polynomials and Their Differential Properties over Residue Class Rings
Yuyin Yu, Mingsheng Wang
Yuyin Yu, Mingsheng Wang
Fully Homomorphic Encryption for Mathematicians
Alice Silverberg
Alice Silverberg
How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
Kaoru Kurosawa, Takuma Ueda
Kaoru Kurosawa, Takuma Ueda
Another Look at Security Theorems for 1-Key Nested MACs
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
A New Lever Function with Adequate Indeterminacy
Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu
Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu
The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
Cryptographic schemes, key exchange, public key.
Ted Hurley
Ted Hurley
A Simple ORAM
Kai-Min Chung, Rafael Pass
Kai-Min Chung, Rafael Pass
AE5 Security Notions: Definitions Implicit in the CAESAR Call
Chanathip Namprempre, Phillip Rogaway, Tom Shrimpton
Chanathip Namprempre, Phillip Rogaway, Tom Shrimpton
The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
Joachim Strömbergson, Simon Josefsson
Joachim Strömbergson, Simon Josefsson
Algebraic analysis of Trivium-like ciphers
Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
Optimizing ORAM and Using it Efficiently for Secure Computation
Craig Gentry, Kenny Goldman, Shai Halevi, Charanjit Julta, Mariana Raykova, Daniel Wichs
Craig Gentry, Kenny Goldman, Shai Halevi, Charanjit Julta, Mariana Raykova, Daniel Wichs
Anonymity-preserving Public-Key Encryption: A Constructive Approach
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
Type-Based Analysis of Generic Key Management APIs (Long Version)
Pedro Adão, Riccardo Focardi, Flaminia L. Luccio
Pedro Adão, Riccardo Focardi, Flaminia L. Luccio
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo
Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo
Ballot secrecy and ballot independence: definitions and relations
Ben Smyth, David Bernhard
Ben Smyth, David Bernhard
A Cryptographic Analysis of OPACITY
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo, Xuejia Lai
Yiyuan Luo, Xuejia Lai
Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function
Kaushik Chakraborty, Anupam Chattopadhyay, Subhamoy Maitra
Kaushik Chakraborty, Anupam Chattopadhyay, Subhamoy Maitra
Sakura: a flexible coding for tree hashing
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
How to Run Turing Machines on Encrypted Data
Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park
Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park
Analysis of authentication and key establishment in inter-generational mobile telephony
Chunyu Tang, David A. Naumann, Susanne Wetzel
Chunyu Tang, David A. Naumann, Susanne Wetzel
Public key exchange using semidirect product of (semi)groups
Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Mohammad Etemad, Alptekin Küpçü
Mohammad Etemad, Alptekin Küpçü
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater
Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
Tight security bounds for key-alternating ciphers
Shan Chen, John Steinberger
Shan Chen, John Steinberger
Identity-based Aggregate Signatures with Verifiable Single Ones
Yang Zhang, Jun-liang Chen
Yang Zhang, Jun-liang Chen
Towards Efficient Private Distributed Computation on Unbounded Input Streams
Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
Stefan G. Weber
Stefan G. Weber
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
Aurore Guillevic
Aurore Guillevic
Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
Election Verifiability or Ballot Privacy: Do We Need to Choose?
Edouard Cuvelier, Olivier Pereira, Thomas Peters
Edouard Cuvelier, Olivier Pereira, Thomas Peters
Optical PUFs Reloaded
Ulrich Rührmair, Christian Hilgers, Sebastian Urban, Agnes Weiershäuser, Elias Dinter, Brigitte Forster, Christian Jirauschek
Ulrich Rührmair, Christian Hilgers, Sebastian Urban, Agnes Weiershäuser, Elias Dinter, Brigitte Forster, Christian Jirauschek
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Filip Zagorski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
Filip Zagorski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
Guangjun Fan, Yongbin Zhou, F. -X. Standaert, Dengguo Feng
Guangjun Fan, Yongbin Zhou, F. -X. Standaert, Dengguo Feng
A Closer Look at HMAC
Krzysztof Pietrzak
Krzysztof Pietrzak
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
Christina Boura, Anne Canteaut
Christina Boura, Anne Canteaut
Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
Arno Mittelbach
New modular multiplication and division algorithms based on continued fraction expansion
Mourad Gouicem
Mourad Gouicem
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng
Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko
Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
Jan Camenisch, Robert R. Enderlein, Victor Shoup
Jan Camenisch, Robert R. Enderlein, Victor Shoup
Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
Shi Pu, Jyh-Charn Liu
Shi Pu, Jyh-Charn Liu
From oblivious AES to efficient and secure database join in the multiparty setting
Sven Laur, Riivo Talviste, Jan Willemson
Sven Laur, Riivo Talviste, Jan Willemson
Breaking NLM-MAC Generator
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
Non-malleable Codes from Additive Combinatorics
Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett
Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett
Selecting polynomials for the Function Field Sieve
Razvan Barbulescu
Razvan Barbulescu
Quantum algorithms for the subset-sum problem
Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer
Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer
On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
Zhizhou Li, Ten H. Lai
Zhizhou Li, Ten H. Lai
Discrete logarithm in GF(2^809) with FFS
Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann
Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann
Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat, Chih-hao Shen
abhi shelat, Chih-hao Shen
On the (re)design of an FPGA-based PUF
Philipp Grabher, Dan Page, Marcin Wójcik
Philipp Grabher, Dan Page, Marcin Wójcik
On the Impossibility of Cryptography with Tamperable Randomness
Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth
Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng
Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng
A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
David Lubicz, Damien Robert
David Lubicz, Damien Robert
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
Power Analysis Attacks against FPGA Implementations of KLEIN
Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong
Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
Appala Naidu Tentu, Prabal Paul, V Ch Venkaiah
Appala Naidu Tentu, Prabal Paul, V Ch Venkaiah
A family of 6-to-4-bit S-boxes with large linear branch number
Daniel Loebenberger, Michael Nüsken
Daniel Loebenberger, Michael Nüsken
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
Jorge Munilla, Alberto Peinado, Guoming Yang, Willy Susilo
Jorge Munilla, Alberto Peinado, Guoming Yang, Willy Susilo
On the (Im)possibility of Projecting Property in Prime-Order Setting
Jae Hong Seo
Jae Hong Seo
Security Analysis of Linearly Filtered NLFSRs
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett
The Vernam cipher is robust to small deviations from randomness
Boris Ryabko
Boris Ryabko
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
Collusion-Resistant Domain-Specific Pseudonymous Signatures
Julien Bringer, Herve Chabanne, Alain Patey
Julien Bringer, Herve Chabanne, Alain Patey
On the evaluation of modular polynomials
Andrew V. Sutherland
Andrew V. Sutherland
A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
Masao KASAHARA
Masao KASAHARA
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
Cryptanalysis of RC4(n,m) Stream Cipher
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
A generic construction for voting correctness at minimum cost - Application to Helios
Veronique Cortier, David Galindo, Stephane Glondu, Malika Izabachene
Veronique Cortier, David Galindo, Stephane Glondu, Malika Izabachene
Distinguishing Attacks on RC4 and A New Improvement of the Cipher
Jing Lv, Bin Zhang, Dongdai Lin
Jing Lv, Bin Zhang, Dongdai Lin
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
Deukjo Hong, Daesung Kwon
Deukjo Hong, Daesung Kwon
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
Ray Perlner, Daniel Smith-Tone
Ray Perlner, Daniel Smith-Tone
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
Raphael Spreitzer, Thomas Plos
Raphael Spreitzer, Thomas Plos
Confined Guessing: New Signatures From Standard Assumptions
Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
Fast Collision Attack on MD5
Tao Xie, Fanbao Liu, Dengguo Feng
Tao Xie, Fanbao Liu, Dengguo Feng
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
Simon Hoerder, Kimmo Järvinen, Dan Page
Simon Hoerder, Kimmo Järvinen, Dan Page
Single Password Authentication
Tolga Acar, Mira Belenkiy, Alptekin Küpçü
Tolga Acar, Mira Belenkiy, Alptekin Küpçü
On generalized semi-bent (and partially bent) Boolean functions
Brajesh Kumar Singh
Brajesh Kumar Singh
A New Security and Privacy Framework for RFID In Cloud Computing
Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
Provably Secure LWE Encryption with Smallish Uniform Noise and Secret
Daniel Cabarcas, Florian Göpfert, Patrick Weiden
Daniel Cabarcas, Florian Göpfert, Patrick Weiden
Search Pattern Leakage in Searchable Encryption: Attacks and New Construction
Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan
Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan
A Non Asymptotic Analysis of Information Set Decoding
Yann Hamdaoui, Nicolas Sendrier
Yann Hamdaoui, Nicolas Sendrier
Completeness Theorems for All Finite Stateless 2-Party Primitives
Daniel Kraschewski
Daniel Kraschewski
Interactive Coding, Revisited
Kai-Min Chung, Rafael Pass, Sidharth Telang
Kai-Min Chung, Rafael Pass, Sidharth Telang
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
Dingding Jia, Bao Liand Yamin Liu, Qixiang Mei
Dingding Jia, Bao Liand Yamin Liu, Qixiang Mei
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version)
Armando Faz-Hernandez, Patrick Longa, Ana H. Sanchez
Armando Faz-Hernandez, Patrick Longa, Ana H. Sanchez
The fragility of AES-GCM authentication algorithm
Shay Gueron, Vlad Krasnov
Shay Gueron, Vlad Krasnov
Incentivizing Outsourced Computation
Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya
Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
On the security of a certicateless signature scheme in the standard model
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
Policy-based Secure Deletion
Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti
Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti
Some Fixes To SSH
Xu ZiJie
Xu ZiJie
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar, Soumyadeep Bhattacharya
Gautham Sekar, Soumyadeep Bhattacharya
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan, Shucheng Yu
Jiawei Yuan, Shucheng Yu
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
Alexander Rostovtsev
Alexander Rostovtsev
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
Naomi Benger, Manuel Charlemagne, Kefei Chen
Naomi Benger, Manuel Charlemagne, Kefei Chen
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
Key Wrapping with a Fixed Permutation
Dmitry Khovratovich
Dmitry Khovratovich
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter, Carlos Cid
Gordon Procter, Carlos Cid
An architecture for practical actively secure MPC with dishonest majority
Marcel Keller, Peter Scholl, Nigel P. Smart
Marcel Keller, Peter Scholl, Nigel P. Smart
A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES
Kisoon YOON
Kisoon YOON
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
M. Shakiba, M. Dakhilalian, H. Mala
M. Shakiba, M. Dakhilalian, H. Mala
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin, Nils Fleischhacker
Marc Fischlin, Nils Fleischhacker
Rethinking Definitions of Security for Session Key Agreement
Wesley George, Charles Rackoff
Wesley George, Charles Rackoff
Multi-bit homomorphic encryption based on learning with errors over rings
Zhang Wei, Liu Shuguang, Yang Xiaoyuan
Zhang Wei, Liu Shuguang, Yang Xiaoyuan
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
Payman Mohassel, Saeed Sadeghian
Payman Mohassel, Saeed Sadeghian
2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
Dieter Schmidt
Dieter Schmidt
An MQ/Code Cryptosystem Proposal
Leonard J. Schulman
Leonard J. Schulman
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III
Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III
New Lattice Based Signature Using The Jordan Normal Form
Hemlata Nagesh, Birendra Kumar Sharma
Hemlata Nagesh, Birendra Kumar Sharma
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
Niu Liu, Shaohua Tang, Lingling Xu
Niu Liu, Shaohua Tang, Lingling Xu
Two is the fastest prime: lambda coordinates for binary elliptic curves
Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
Blank Digital Signatures
Christian Hanser, Daniel Slamanig
Christian Hanser, Daniel Slamanig
An Ideal-Security Protocol for Order-Preserving Encoding
Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich
Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich
Attribute-Based Encryption for Circuits from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters
Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters
Oblivious PAKE: Efficient Handling of Password Trials
Franziskus Kiefer, Mark Manulis
Franziskus Kiefer, Mark Manulis
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
Aysajan Abidin, Jan-Åke Larsson
Aysajan Abidin, Jan-Åke Larsson
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
Ananth Raghunathan, Gil Segev, Salil Vadhan
Ananth Raghunathan, Gil Segev, Salil Vadhan
Tamper Resilient Cryptography Without Self-Destruct
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
Practical collision attack on 40-step RIPEMD-128
Gaoli Wang
Gaoli Wang
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
Helger Lipmaa
Helger Lipmaa
An Attack Against Fixed Value Discrete Logarithm Representations
Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks
Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks
Speeding up Ate Pairing Computation in Affine Coordinates
Duc-Phong Le, Chik How Tan
Duc-Phong Le, Chik How Tan
Throughput Optimized Implementations of QUAD
Jason R. Hamlet, Robert W. Brocato
Jason R. Hamlet, Robert W. Brocato
On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
Namhun Koo, Gook Hwa Cho, Soonhak Kwon
Namhun Koo, Gook Hwa Cho, Soonhak Kwon
The Algorithm of AAES
Shiyong Zhang, Gongliang Chen, Lei Fan
Shiyong Zhang, Gongliang Chen, Lei Fan
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
Public Key Exchange Using Matrices Over Group Rings
Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
PUF Modeling Attacks on Simulated and Silicon Data
Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas
Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas
Message Authentication Codes Secure against Additively Related-Key Attacks
Keita Xagawa
Keita Xagawa
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
Gilad Asharov, Yehuda Lindell, Tal Rabin
Gilad Asharov, Yehuda Lindell, Tal Rabin
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
Charanjit S. Jutla, Arnab Roy
Charanjit S. Jutla, Arnab Roy
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
Ivan Damgard, Alessandra Scafuro
Ivan Damgard, Alessandra Scafuro
On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
Murat Cenk, M. Anwar Hasan
Murat Cenk, M. Anwar Hasan
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
Roohallah Rastaghi
Roohallah Rastaghi
Lossy Chains and Fractional Secret Sharing
Yuval Ishai, Eyal Kushilevitz, Omer Strulovich
Yuval Ishai, Eyal Kushilevitz, Omer Strulovich
A Tutorial on White-box AES
James A. Muir
James A. Muir
On the Complexity of Broadcast Setup
Martin Hirt, Pavel Raykov
Martin Hirt, Pavel Raykov
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
Yuchen Cao, Yongbin Zhou, Zhenmei Yu
Yuchen Cao, Yongbin Zhou, Zhenmei Yu
Notions of Black-Box Reductions, Revisited
Paul Baecher, Chris Brzuska, Marc Fischlin
Paul Baecher, Chris Brzuska, Marc Fischlin
Attacks and Comments on Several Recently Proposed Key Management Schemes
Niu Liu, Shaohua Tang, Lingling Xu
Niu Liu, Shaohua Tang, Lingling Xu
Constant-round secure two-party computation from a linear number of oblivious transfer
Samuel Ranellucci, Alain Tapp
Samuel Ranellucci, Alain Tapp
Learning with Rounding, Revisited: New Reduction, Properties and Applications
Joel Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
Joel Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
State convergence in bit-based stream ciphers
Sui-Guan Teo, Harry Bartlett, Ali Alhamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
Sui-Guan Teo, Harry Bartlett, Ali Alhamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
Antoine Joux
Antoine Joux
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
On the security of a certificateless aggregate signature scheme
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou
Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
Vadim Lyubashevsky, Daniel Masny
Vadim Lyubashevsky, Daniel Masny
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
Functional Encryption Supporting Recursive Languages
Somindu C. Ramanna, Palash Sarkar
Somindu C. Ramanna, Palash Sarkar
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
James McLaughlin, John A. Clark
James McLaughlin, John A. Clark
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Dan Boneh, Mark Zhandry
Dan Boneh, Mark Zhandry
Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
Namhun Koo, Gook Hwa Cho, Soonhak Kwon
Namhun Koo, Gook Hwa Cho, Soonhak Kwon
Efficient Private File Retrieval by Combining ORAM and PIR
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
Between a Rock and a Hard Place: Interpolating Between MPC and FHE
Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse
Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse
A Security Framework for Analysis and Design of Software Attestation
Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
Secret Sharing, Rank Inequalities, and Information Inequalities
Sebastia Martin, Carles Padro, An Yang
Sebastia Martin, Carles Padro, An Yang
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Yan Huang, Jonathan Katz, Dave Evans
Yan Huang, Jonathan Katz, Dave Evans
An efficient attack of a McEliece cryptosystem variant based on convolutional codes
Grégory Landais, Jean-Pierre Tillich
Grégory Landais, Jean-Pierre Tillich
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Yehuda Lindell
Broadcast Steganography
Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
UC-Secure Multi-Session OT Using Tamper-Proof Hardware
Kaoru Kurosawa, Ro Nojima, Le Trieu Phong
Kaoru Kurosawa, Ro Nojima, Le Trieu Phong
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$
Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
Marek Jawurek, Florian Kerschbaum, Claudio Orlandi
Marek Jawurek, Florian Kerschbaum, Claudio Orlandi
The UC approach: an application view
István Vajda
István Vajda
Relation collection for the Function Field Sieve
Jérémie Detrey, Pierrick Gaudry, Marion Videau
Jérémie Detrey, Pierrick Gaudry, Marion Videau
Related-key Attacks Against Full Hummingbird-2
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Hardness of SIS and LWE with Small Parameters
Daniele Micciancio, Chris Peikert
Daniele Micciancio, Chris Peikert
Why Proving HIBE Systems Secure is Difficult
Allison Lewko, Brent Waters
Allison Lewko, Brent Waters
Power Analysis of Hardware Implementations Protected with Secret Sharing
Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michael Peeters, Gilles Van Assche
Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michael Peeters, Gilles Van Assche
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref
Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref
Instantiating Treeless Signature Schemes
Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann
Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
Sven Laur, Bingsheng Zhang
Sven Laur, Bingsheng Zhang
A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
Christian L. F. Corniaux, Hossein Ghodosi
Christian L. F. Corniaux, Hossein Ghodosi
Symbolic Universal Composability
Florian Böhl, Dominique Unruh
Florian Böhl, Dominique Unruh
On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
On FHE without bootstrapping
Aayush Jain
Aayush Jain
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay
Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay
Cryptanalysis of the Dragonfly Key Exchange Protocol
Dylan Clarke, Feng Hao
Dylan Clarke, Feng Hao
CRT-based Fully Homomorphic Encryption over the Integers
Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon
Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
Kishan Chand Gupta, Indranil Ghosh Ray
Kishan Chand Gupta, Indranil Ghosh Ray
Secrecy without one-way functions
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
Joint Compartmented Threshold Access Structures
Ali Aydın Selçuk, Ramazan Yılmaz
Ali Aydın Selçuk, Ramazan Yılmaz
A revocable certificateless signature scheme
Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng
Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng
Some Complexity Results and Bit Unpredictable for Short Vector Problem
Kuan Cheng
Kuan Cheng
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
Payman Mohassel, Ben Riva
Payman Mohassel, Ben Riva
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
Roohallah Rastaghi
Roohallah Rastaghi
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
Christopher Meyer, Jörg Schwenk
Christopher Meyer, Jörg Schwenk
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
Basel Halak, Julian Murphy, Alex Yakovlev
Basel Halak, Julian Murphy, Alex Yakovlev
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
Carles Padro
Carles Padro
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen, Jesper Buus Nielsen
Tore Kasper Frederiksen, Jesper Buus Nielsen
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Jiawei Yuan, Shucheng Yu
Jiawei Yuan, Shucheng Yu
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
Fangguo Zhang, Xu Ma, Shengli Liu
Fangguo Zhang, Xu Ma, Shengli Liu
Differential Fault Attack on the PRINCE Block Cipher
Ling Song, Lei Hu
Ling Song, Lei Hu
Complexity of Multi-Party Computation Functionalities
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Trace Expression of r-th Root over Finite Field
Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
Roohallah Rastaghi
Roohallah Rastaghi
Creating a Challenge for Ideal Lattices
Thomas Plantard, Michael Schneider
Thomas Plantard, Michael Schneider
Verifiable Data Streaming
Dominique Schröder, Heike Schröder
Dominique Schröder, Heike Schröder
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
Jayaprakash Kar
Jayaprakash Kar
Batch Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
Improvements to NFC Mobile Transaction and Authentication Protocol
Muhammad Qasim Saeed
Muhammad Qasim Saeed
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Detection of Cheaters in Non-interactive Polynomial Evaluation
Maki Yoshida, Satoshi Obana
Maki Yoshida, Satoshi Obana
An Analysis of the EMV Channel Establishment Protocol
Chris Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson
Chris Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
Haiyan Sun
Haiyan Sun
Improved Differential Fault Attack on MICKEY 2.0
Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
Stanislav Bulygin
Stanislav Bulygin
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven Watson
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven Watson
RSA private key reconstruction from random bits using SAT solvers
Constantinos Patsakis
Constantinos Patsakis
The IITM Model: a Simple and Expressive Model for Universal Composability
Ralf Kuesters, Max Tuengerthal, Daniel Rausch
Ralf Kuesters, Max Tuengerthal, Daniel Rausch
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
A New Practical Identity-Based Encryption System
Jong Hwan Park, Dong Hoon Lee
Jong Hwan Park, Dong Hoon Lee
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
James McLaughlin, John A. Clark
James McLaughlin, John A. Clark
Rate-Limited Secure Function Evaluation
Özgür Dagdelen, Payman Mohassel, Daniele Venturi
Özgür Dagdelen, Payman Mohassel, Daniele Venturi
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
Markus Rückert, Dominique Schroeder
Markus Rückert, Dominique Schroeder
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Peter Gaźi
Peter Gaźi
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
Jae Hong Seo, Keita Emura
Jae Hong Seo, Keita Emura
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
Alexandra Boldyreva, Robert Lychev
Alexandra Boldyreva, Robert Lychev
Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo, Keita Emura
Jae Hong Seo, Keita Emura
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
Graham Enos
Graham Enos
On formal and automatic security verification of WSN transport protocols
Ta Vinh Thong, Amit Dvir
Ta Vinh Thong, Amit Dvir
Efficiently Outsourcing Multiparty Computation under Multiple Keys
Andreas Peter, Erik Tews, Stefan Katzenbeisser
Andreas Peter, Erik Tews, Stefan Katzenbeisser
Tropical cryptography
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
James McLaughlin, John A. Clark
James McLaughlin, John A. Clark
Simultaneous Resettable WI from One-way Functions
Kai-Min Chung, Rafael Pass
Kai-Min Chung, Rafael Pass
Achieving Anonymity Against Major Face Recognition Algorithms
Benedikt Driessen, Markus Dürmuth
Benedikt Driessen, Markus Dürmuth
Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
Kai-Min Chung, Rafael Pass, Karn Seth
Kai-Min Chung, Rafael Pass, Karn Seth
A Matrix Approach for Constructing Quadratic APN Functions
Yuyin Yu, Mingsheng Wang, Yongqiang Li
Yuyin Yu, Mingsheng Wang, Yongqiang Li
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
Qingfeng Cheng
Qingfeng Cheng
Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue, Faouzi Chekir
Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue, Faouzi Chekir
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
Damien Stehlé, Ron Steinfeld
Damien Stehlé, Ron Steinfeld
On Formal Expressions of BRW-polynomials
Guillermo Morales-Luna
Guillermo Morales-Luna
Generalized (Identity-Based) Hash Proof System and Its Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Shielding circuits with groups
Eric Miles, Emanuele Viola
Eric Miles, Emanuele Viola
Reusable Garbled Circuits and Succinct Functional Encryption
Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
Non-Interactive Key Exchange
Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
Time-memory Trade-offs for Near-collisions
Gaëtan Leurent
Gaëtan Leurent
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang
Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
Nir Bitansky, Omer Paneth
Nir Bitansky, Omer Paneth
Defensive Leakage Camouflage
E. Brier, Q. Fortier, R. Korkikian, K. W. Magld, D. Naccache, G. Ozari de Almeida, A. Pommellet, A. H. Ragab, J. Vuillemin
E. Brier, Q. Fortier, R. Korkikian, K. W. Magld, D. Naccache, G. Ozari de Almeida, A. Pommellet, A. H. Ragab, J. Vuillemin
On the Impossibility of Sender-Deniable Public Key Encryption
Dana Dachman-Soled
Dana Dachman-Soled
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
Marc Obrador, Paz Morillo, Sandra Guasch
Marc Obrador, Paz Morillo, Sandra Guasch
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
Qingfeng Cheng
Qingfeng Cheng
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, Avraham Entelis
Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, Avraham Entelis
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
On the (In)security of Fischlin's Paradigm
Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao
Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao
Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields
Antoine Joux
Antoine Joux
An ideal multi-secret sharing scheme based on minimal privileged coalitions
Yun Song, Zhihui Li
Yun Song, Zhihui Li
Succinct Non-Interactive Arguments via Linear Interactive Proofs
Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Jan Camenisch, Anna Lysyanskaya, Gregory Neven
Jan Camenisch, Anna Lysyanskaya, Gregory Neven
Attribute-Based Functional Encryption on Lattices
Xavier Boyen
Xavier Boyen
New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
Discrete Gaussian Leftover Hash Lemma over Infinite Domains
Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai
Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai
Systematic Treatment of Remote Attestation
Aurelien Francillon, Quan Nguyen, Kasper B. Rasmussen, Gene Tsudik
Aurelien Francillon, Quan Nguyen, Kasper B. Rasmussen, Gene Tsudik
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
Farzaneh Abed, Eik List, Stefan Lucks
Farzaneh Abed, Eik List, Stefan Lucks
Unprovable Security of 2-Message Zero Knowledge
Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass
Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass
Non Observability in the Random Oracle Model
Prabhanjan Ananth, Raghav Bhaskar
Prabhanjan Ananth, Raghav Bhaskar
Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng, Wen-Feng Qi
Qun-Xiong Zheng, Wen-Feng Qi
Calling out Cheaters: Covert Security With Public Verifiability
Gilad Asharov, Claudio Orlandi
Gilad Asharov, Claudio Orlandi
Cryptanalysis of WIDEA
Gaëtan Leurent
Gaëtan Leurent
On the (In)security of the Fiat-Shamir Paradigm, Revisited
Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt
Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt
Why "Fiat-Shamir for Proofs" Lacks a Proof
Nir Bitansky, Sanjam Garg, Daniel Wichs
Nir Bitansky, Sanjam Garg, Daniel Wichs
On the Non-malleability of the Fiat-Shamir Transform
Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
Profiled Model Based Power Simulator for Side Channel Evaluation
Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le
Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le
Cryptanalysis of RAPP, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou
Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou
How Practical is Public-Key Encryption Based on LPN and Ring-LPN?
Ivan Damgård, Sunoo Park
Ivan Damgård, Sunoo Park
5PM: Secure Pattern Matching
Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
Verifiable Elections That Scale for Free
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
Cryptanalysis of RAKAPOSHI Stream Cipher
Lin Ding, Jie Guan
Lin Ding, Jie Guan
Fully Automated Analysis of Padding-Based Encryption in the Computational Model
Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella-Béguelin
Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella-Béguelin
Cryptanalysis of matrix conjugation schemes
A. D. Myasnikov, A. Ushakov
A. D. Myasnikov, A. Ushakov
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters
Generic Constructions of Integrated PKE and PEKS
Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin
Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin
Root Optimization of Polynomials in the Number Field Sieve
Shi Bai, Richard P. Brent, Emmanuel Thomé
Shi Bai, Richard P. Brent, Emmanuel Thomé
The Weakness of Integrity Protection for LTE
Teng Wu, Guang Gong
Teng Wu, Guang Gong
Cryptography Using CAPTCHA Puzzles
Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
Jintai Ding, Xiang Xie, Xiaodong Lin
Jintai Ding, Xiang Xie, Xiaodong Lin
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Karyn Benson, Hovav Shacham, Brent Waters
Karyn Benson, Hovav Shacham, Brent Waters
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl
Jian Zou, Wenling Wu, Shuang Wu, Le Dong
Jian Zou, Wenling Wu, Shuang Wu, Le Dong
Square root computation over even extension fields
Gora Adj, Francisco Rodríguez-Henríquez
Gora Adj, Francisco Rodríguez-Henríquez
Generic Related-key Attacks for HMAC
Thomas Peyrin, Yu Sasaki, Lei Wang
Thomas Peyrin, Yu Sasaki, Lei Wang
Fingerprint Tables: A Generalization of Rainbow Tables
Gildas Avoine, Adrien Bourgeois, Xavier Carpent
Gildas Avoine, Adrien Bourgeois, Xavier Carpent
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
Jiawei Yuan, Shucheng Yu
Jiawei Yuan, Shucheng Yu
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
Guang Gong, Mark Aagaard, Xinxin Fan
Guang Gong, Mark Aagaard, Xinxin Fan
Natural Generalizations of Threshold Secret Sharing
Oriol Farras, Carles Padro, Chaoping Xing, An Yang
Oriol Farras, Carles Padro, Chaoping Xing, An Yang
Hiding the Input-Size in Secure Two-Party Computation
Yehuda Lindell, Kobbi Nissim, Claudio Orlandi
Yehuda Lindell, Kobbi Nissim, Claudio Orlandi
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
Benedikt Gierlichs, Jorn-Marc Schmidt, Michael Tunstall
Benedikt Gierlichs, Jorn-Marc Schmidt, Michael Tunstall
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
Jialin Huang, Xuejia Lai
Jialin Huang, Xuejia Lai
Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan
Julia Borghoff
Julia Borghoff
Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
Yoshinori Aono
Yoshinori Aono
Lecture Notes in Secret Sharing
Carles Padro
Carles Padro
Robust Encryption, Revisited
Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
Itai Dinur, Orr Dunkelman, Adi Shamir
Itai Dinur, Orr Dunkelman, Adi Shamir
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
Tatsuaki Okamoto, Katsuyuki Takashima
Tatsuaki Okamoto, Katsuyuki Takashima
Fast Cryptography in Genus 2
Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay
Zhen Liu, Zhenfu Cao, Duncan S. Wong
Zhen Liu, Zhenfu Cao, Duncan S. Wong
Construction of Differential Characteristics in ARX Designs -- Application to Skein
Gaetan Leurent
Gaetan Leurent
False Negative probabilities in Tardos codes
Antonino Simone, Boris Skoric
Antonino Simone, Boris Skoric
Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem
Chenglian Liu, Ziwei Ye
Chenglian Liu, Ziwei Ye
Uniform Compression Functions Can Fail to Preserve “Full” Entropy
Daniel R. L. Brown
Daniel R. L. Brown
PRE- Stronger Security Notion and Efficient Construction with New Property
Jiang Zhang, Zhenfeng Zhang, Yu Chen
Jiang Zhang, Zhenfeng Zhang, Yu Chen
Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?
Alexander Rostovtsev
Alexander Rostovtsev
Asynchronous Physical Unclonable Functions – AsyncPUF
Julian Murphy
Julian Murphy
Breaking Another Quasigroup-Based Cryptographic Scheme
Markus Dichtl, Pascale Böffgen
Markus Dichtl, Pascale Böffgen
Design of Secure Image Transmission In MANET using Number Theory Based Image Compression and uasigroup Encryption (NTICQE) Algorithm
Munivel E, Rajeswari Mukesh
Munivel E, Rajeswari Mukesh
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pierpzyk
Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pierpzyk
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
Fixed Argument Pairing Inversion on Elliptic Curves
Sungwook Kim, Jung Hee Cheon
Sungwook Kim, Jung Hee Cheon
Security Evaluation of Rakaposhi Stream Cipher
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
Privacy Preserving Revocable Predicate Encryption Revisited
Kwangsu Lee, Intae Kim, Seong Oun Hwang
Kwangsu Lee, Intae Kim, Seong Oun Hwang
Refine the Concept of Public Key Encryption with Delegated Search
Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma
Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma
How powerful are the DDH hard groups?
Periklis A. Papakonstantinou, Charles W. Rackoff, Yevgeniy Vahlis
Periklis A. Papakonstantinou, Charles W. Rackoff, Yevgeniy Vahlis
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
Kan Yang, Zhen Liu, Zhenfu Cao, Xiaohua Jia, Duncan S. Wong, Kui Ren
Kan Yang, Zhen Liu, Zhenfu Cao, Xiaohua Jia, Duncan S. Wong, Kui Ren
Formal analysis of privacy in Direct Anonymous Attestation schemes
Ben Smyth, Mark D. Ryan, Liqun Chen
Ben Smyth, Mark D. Ryan, Liqun Chen
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Yannick Seurin, Joana Treger
Yannick Seurin, Joana Treger
Search in Encrypted Data: Theoretical Models and Practical Applications
Qiang Tang
Qiang Tang
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions
Daniel Smith-Tone, Cristina Tone
Daniel Smith-Tone, Cristina Tone
Galindo-Garcia Identity-Based Signature, Revisited
Sanjit Chatterjee, Chethan Kamath, Vikas Kumar
Sanjit Chatterjee, Chethan Kamath, Vikas Kumar
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
Impossibility Results for Indifferentiability with Resets
Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
Protocols for Multiparty Coin Toss With Dishonest Majority
Amos Beimel, Eran Omri, Ilan Orlov
Amos Beimel, Eran Omri, Ilan Orlov
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
Bin Wang
Bin Wang
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
Gaoli Wang, Yanzhao Shen
Gaoli Wang, Yanzhao Shen
Coarse-grained integer - Smooth? Rough? Both!
Daniel Loebenberger, Michael Nüsken
Daniel Loebenberger, Michael Nüsken
Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme
Cai-xue Zhou
Cai-xue Zhou
Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification
Aviad Kipnis, Eliphaz Hibshoosh
Aviad Kipnis, Eliphaz Hibshoosh
On the Complexity of the BKW Algorithm on LWE
Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
Secure Outsourced Attribute-based Encryption
Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Duncan S. Wong
Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Duncan S. Wong
Cryptanalysis of Double-Block-Length Hash Mode MJH
Deukjo Hong, Daesung Kwon
Deukjo Hong, Daesung Kwon
New Preimage Attack on MDC-4
Deukjo Hong, Daesung Kwon
Deukjo Hong, Daesung Kwon
Pairings on Generalized Huff Curves
Abdoul Aziz Ciss, Djiby Sow
Abdoul Aziz Ciss, Djiby Sow
Message-Locked Encryption and Secure Deduplication
Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
On the Security of TLS Renegotiation
Florian Giesen, Florian Kohlar, Douglas Stebila
Florian Giesen, Florian Kohlar, Douglas Stebila
SCAPI: The Secure Computation Application Programming Interface
Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell
Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell
Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
Muhammad Yasir Malik
Muhammad Yasir Malik
Efficient Group Signatures in the Standard Model
Laila El Aimani, Olivier Sanders
Laila El Aimani, Olivier Sanders
Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis
Xi Xiong, Haining Fan
Xi Xiong, Haining Fan
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
Alexandra Boldyreva, Nathan Chenette, Adam O’Neill
Alexandra Boldyreva, Nathan Chenette, Adam O’Neill
Order-Preserving Symmetric Encryption
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes
David McGrew
David McGrew
Resolving the conflict between generality and plausibility in verified computation
Srinath Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish
Srinath Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong
Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong
Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction
Claus P. Schnorr, Taras Shevchenko
Claus P. Schnorr, Taras Shevchenko
Asynchronous Computational VSS with Reduced Communication Complexity
Michael Backes, Amit Datta, Aniket Kate
Michael Backes, Amit Datta, Aniket Kate
An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
Security Analysis of an Open Car Immobilizer Protocol Stack
Stefan Tillich, Marcin Wójcik
Stefan Tillich, Marcin Wójcik
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
Nishanth Chandran, Sanjam Garg
Nishanth Chandran, Sanjam Garg
Polynomial time solutions of computational problems in noncommutative-algebraic cryptography
Boaz Tsaban
Boaz Tsaban
An arithmetic intersection formula for denominators of Igusa class polynomials
Kristin Lauter, Bianca Viray
Kristin Lauter, Bianca Viray
Resource-Restricted Indifferentiability
Grégory Demay, Peter Gaźi, Martin Hirt, Ueli Maurer
Grégory Demay, Peter Gaźi, Martin Hirt, Ueli Maurer
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff
Byoung-Il Kim, Jin Hong
Byoung-Il Kim, Jin Hong
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg, Craig Gentry, Shai Halevi
Sanjam Garg, Craig Gentry, Shai Halevi
A NEW APPROACH TO THE DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS
Taechan Kim, Jung Hee Cheon
Taechan Kim, Jung Hee Cheon
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting
Marina Blanton, Mehrdad Aliasgari
Marina Blanton, Mehrdad Aliasgari
Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem
Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
Quantum-Secure Message Authentication Codes
Dan Boneh, Mark Zhandry
Dan Boneh, Mark Zhandry
Secure Outsourced Attribute-Based Signatures
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay, Adriana Lopez-Alt, Hoeteck Wee, Daniel Wichs
Carmit Hazay, Adriana Lopez-Alt, Hoeteck Wee, Daniel Wichs
Collecting Data while Preserving Individuals' Privacy: A Case Study
Alexis Bonnecaze, Robert Rolland
Alexis Bonnecaze, Robert Rolland
A note on invariant linear transformations in multivariate public key cryptography
Andreas Wiemers
Andreas Wiemers
How to Garble RAM Programs
Steve Lu, Rafail Ostrovsky
Steve Lu, Rafail Ostrovsky
The LED Block Cipher
Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw
Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw
On the coefficients of the polynomial in the number field sieve
Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
Taking proof-based verified computation a few steps closer to practicality (extended version)
Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Muqeet Ali, Andrew J. Blumberg, Michael Walfish
Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Muqeet Ali, Andrew J. Blumberg, Michael Walfish
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj
Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj
Evaluating User Privacy in Bitcoin
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
Oriol Farràs, Carles Padró
Oriol Farràs, Carles Padró
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps
Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani
Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani
Attribute-Based Encryption for Circuits from Multilinear Maps
Amit Sahai, Brent Waters
Amit Sahai, Brent Waters
Biclique Cryptanalysis Of PRESENT, LED, And KLEIN
Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
--withdrawn--
--withdrawn--
--withdrawn--
--withdrawn--
--withdrawn--
--withdrawn--
Breaking Public Keys - How to Determine an Unknown RSA Public Modulus
Hans-Joachim Knobloch
Hans-Joachim Knobloch
Symbolic computation in block cipher with application to PRESENT
Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
SHADE: Secure HAmming DistancE computation from oblivious transfer
Julien Bringer, Herve Chabanne, Alain Patey
Julien Bringer, Herve Chabanne, Alain Patey
On Provably Secure Code-based Signature and Signcryption Scheme
Preetha Mathew K, Sachin Vasant, C. Pandu Rangan
Preetha Mathew K, Sachin Vasant, C. Pandu Rangan
Quantitative Analysis of the Full Bitcoin Transaction Graph
Dorit Ron, Adi Shamir
Dorit Ron, Adi Shamir
New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis, Brent Waters
Yannis Rouselakis, Brent Waters
Using Randomizers for Batch Verification of ECDSA Signatures
Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury
Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury
On the (in)security of some smart-card-based password authentication schemes for WSN
Ding Wang, Chun-guang Ma
Ding Wang, Chun-guang Ma
Cryptanalysis of the OKH Authenticated Encryption Scheme
Peng Wang, Wenling Wu, Liting Zhang
Peng Wang, Wenling Wu, Liting Zhang
Defending Against the Unknown Enemy: Applying FlipIt to System Security
Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos
Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
A Framework for Unique Ring Signatures
Matthew Franklin, Haibin Zhang
Matthew Franklin, Haibin Zhang
Concurrent Signature without Random Oracles
Xiao Tan, Qiong Huang, Duncan S. Wong
Xiao Tan, Qiong Huang, Duncan S. Wong
Nanoelectronic Solutions for Hardware Security
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
Quantum algorithm for the discrete logarithm problem for matrices over finite group rings
A. D. Myasnikov, A. Ushakov
A. D. Myasnikov, A. Ushakov
Limits on the Usefulness of Random Oracles
Iftach Haitner, Eran Omri, Hila Zarosim
Iftach Haitner, Eran Omri, Hila Zarosim
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
Divya Gupta, Amit Sahai
Divya Gupta, Amit Sahai
Improved side channel attack on the block cipher NOEKEON
Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock
Hadi Soleimany, Kaisa Nyberg
Hadi Soleimany, Kaisa Nyberg
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling, Khoa Nguyen, Damien Stehle, Huaxiong Wang
San Ling, Khoa Nguyen, Damien Stehle, Huaxiong Wang
On Transaction Pseudonyms with Implicit Attributes
Stefan G. Weber
Stefan G. Weber
Leakage Squeezing of Order Two
Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes
Joep de Groot, Boris Škorić, Niels de Vreede, Jean-Paul Linnartz
Joep de Groot, Boris Škorić, Niels de Vreede, Jean-Paul Linnartz
Packed Ciphertexts in LWE-based Homomorphic Encryption
Zvika Brakerski, Craig Gentry, Shai Halevi
Zvika Brakerski, Craig Gentry, Shai Halevi
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
Kai-Min Chung, Huijia Lin, Rafael Pass
Kai-Min Chung, Huijia Lin, Rafael Pass
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Kwangsu Lee, Dong Hoon Lee, Moti Yung
Kwangsu Lee, Dong Hoon Lee, Moti Yung
An Attack on a Fully Homomorphic Encryption Scheme
Hu Yupu, Wang Fenghe
Hu Yupu, Wang Fenghe
Computational Soundness of Coinductive Symbolic Security under Active Attacks
Mohammad Hajiabadi, Bruce M. Kapron
Mohammad Hajiabadi, Bruce M. Kapron
Plaintext Awareness in Identity-Based Key Encapsulation
Mark Manulis, Bertram Poettering, Douglas Stebila
Mark Manulis, Bertram Poettering, Douglas Stebila
Domain-Specific Pseudonymous Signatures for the German Identity Card
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)
Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
Resource-based Corruptions and the Combinatorics of Hidden Diversity
Juan Garay, David Johnson, Aggelos Kiayias, Moti Yung
Juan Garay, David Johnson, Aggelos Kiayias, Moti Yung
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
Security weakness in the Proof of Storage with Deduplication
Youngjoo Shin, Junbeom Hur, Kwangjo Kim
Youngjoo Shin, Junbeom Hur, Kwangjo Kim
Bellcore attack in practice
Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos
Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos
Provably Secure Concurrent Error Detection Against Differential Fault Analysis
Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri
Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri
Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists
Liangze Li, Hongfeng Wu, Fan Zhang
Liangze Li, Hongfeng Wu, Fan Zhang
Dynamic Proofs of Retrievability via Oblivious RAM
David Cash, Alptekin Kupcu, Daniel Wichs
David Cash, Alptekin Kupcu, Daniel Wichs
Faster batch forgery identification
Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk
Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk
Efficient Modular NIZK Arguments from Shift and Product
Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity
Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta
Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta
Rotational cryptanalysis of round-reduced Keccak
Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny
Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny
A Versatile Multi-Input Multiplier over Finite Fields
Haibo Yi, Shaohua Tang, Lingling Xu
Haibo Yi, Shaohua Tang, Lingling Xu
Differential Analysis of the LED Block Cipher
Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
Enhanced Chosen-Ciphertext Security and Applications
Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
Salus: A System for Server-Aided Secure Function Evaluation
Seny Kamara, Payman Mohassel, Ben Riva
Seny Kamara, Payman Mohassel, Ben Riva
2048XKS - A Software Oriented High Security Block Cipher
Dieter Schmidt
Dieter Schmidt
A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
Ga Won Lee, Jin Hong
Ga Won Lee, Jin Hong
Efficient Implementation of RSA Algorithm with MKE
Sami A. Nagar, Dr. Saad Alshamma
Sami A. Nagar, Dr. Saad Alshamma
Private Top-k Aggregation Protocols
Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
Intercepting Tokens: The Empire Strikes Back in the Clone Wars
Özgür Dagdelen, Marc Fischlin
Özgür Dagdelen, Marc Fischlin
Secret Sharing and Secure Computing from Monotone Formulae
Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen
Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl
Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes
Maura B. Paterson, Douglas R. Stinson
Maura B. Paterson, Douglas R. Stinson
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
Thijs Laarhoven, Joop van de Pol, Benne de Weger
Thijs Laarhoven, Joop van de Pol, Benne de Weger
Pairing computation on Edwards curves with high-degree twists
Liangze Li, Hongfeng Wu, Fan Zhang
Liangze Li, Hongfeng Wu, Fan Zhang
Generic Construction of Trace and Revoke Schemes
Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selcuk
Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selcuk
Dynamic Searchable Symmetric Encryption
Seny Kamara, Charalampos Papamanthou, Tom Roeder
Seny Kamara, Charalampos Papamanthou, Tom Roeder
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)
Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knežević, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçın
Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knežević, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçın
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption
Graham Enos, Yuliang Zheng
Graham Enos, Yuliang Zheng
Cryptanalysis of a recent two factor authentication scheme
Michael Scott
Michael Scott
Invertible Polynomial Representation for Private Set Operations
Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee
Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee
Computing endomorphism rings of abelian varieties of dimension two
Gaetan Bisson
Gaetan Bisson
Tahoe – The Least-Authority Filesystem
Zooko Wilcox-O'Hearn, Brian Warner
Zooko Wilcox-O'Hearn, Brian Warner
The Curious Case of Non-Interactive Commitments
Mohammad Mahmoody, Rafael Pass
Mohammad Mahmoody, Rafael Pass
False Positive probabilities in q-ary Tardos codes: comparison of attacks
A. Simone, B. Skoric
A. Simone, B. Skoric
Functional Encryption with Bounded Collusions via Multi-Party Computation
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
Optimizing Segment Based Document Protection (Corrected Version)
Miroslaw Kutylowski, Maciej Gebala
Miroslaw Kutylowski, Maciej Gebala
Faster implementation of scalar multiplication on Koblitz curves
Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez
Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee, Dong Hoon Lee, Moti Yung
Kwangsu Lee, Dong Hoon Lee, Moti Yung
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
Ashish Choudhury, Martin Hirt, Arpita Patra
Ashish Choudhury, Martin Hirt, Arpita Patra
Garbling XOR Gates ``For Free'' in the Standard Model
Benny Applebaum
Benny Applebaum
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
Mihir Bellare, Adam O'Neill
Mihir Bellare, Adam O'Neill
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
Mihir Bellare, Kenneth G. Paterson, Susan Thomson
Mihir Bellare, Kenneth G. Paterson, Susan Thomson
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
Ivan Damgard, Sarah Zakarias
Ivan Damgard, Sarah Zakarias
Entangled Cloud Storage
Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgard, Daniele Venturi
Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgard, Daniele Venturi
Enabling 3-share Threshold Implementations for any 4-bit S-box
Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
On 3-share Threshold Implementations for 4-bit S-boxes
Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang
Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich
Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich
Succinct Malleable NIZKs and an Application to Compact Shuffles
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
On pseudorandomization of information-theoretically secure schemes without hardness assumptions
Koji Nuida
Koji Nuida
Scalable Deniable Group Key Establishment
Kashi Neupane, Rainer Steinwandt, Adriana Suarez Corona
Kashi Neupane, Rainer Steinwandt, Adriana Suarez Corona
Hierarchical Identity-Based (Lossy) Trapdoor Functions
Alex Escala, Javier Herranz, Benoit Libert, Carla Rafols
Alex Escala, Javier Herranz, Benoit Libert, Carla Rafols
Are We Compromised? Modelling Security Assessment Games
Viet Pham, Carlos Cid
Viet Pham, Carlos Cid
Privacy Amplification with Asymptotically Optimal Entropy Loss
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin
Constant Ciphertext Length in CP-ABE
Nishant Doshi, Devesh Jinwala
Nishant Doshi, Devesh Jinwala
Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
Martín A. G. Vigil, Daniel Cabarcas, Alexander Wiesmaier, Johannes Buchmann
Martín A. G. Vigil, Daniel Cabarcas, Alexander Wiesmaier, Johannes Buchmann
Almost Perfect Algebraic Immune Functions with Good Nonlinearity
Meicheng Liu, Dongdai Lin
Meicheng Liu, Dongdai Lin
The low-call diet: Authenticated Encryption for call counting HSM users
Mike Bond, George French, Nigel P. Smart, Gaven J. Watson
Mike Bond, George French, Nigel P. Smart, Gaven J. Watson
Updating attribute in CP-ABE: A New Approach
Nishant Doshi, Devesh Jinwala
Nishant Doshi, Devesh Jinwala
"Metaproofs" (and their Cryptographic Applications)
Alfredo De Santis, Moti Yung
Alfredo De Santis, Moti Yung
Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
Efficient Query Integrity for Outsourced Dynamic Databases
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
A Method for Generating Full Cycles by a Composition of NLFSRs
Elena Dubrova
Elena Dubrova
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown
Lidong Han, Wei Wei, Mingjie Liu
Lidong Han, Wei Wei, Mingjie Liu
Desynchronization Attack on RAPP Ultralightweight Authentication Protocol
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref
Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref
Short communication: An interpretation of the Linux entropy estimator
Benjamin Pousse
Benjamin Pousse
Computational Soundness without Protocol Restrictions
Michael Backes, Ankit Malik, Dominique Unruh
Michael Backes, Ankit Malik, Dominique Unruh
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley, HeeSeok Kim, Michael Tunstall
Neil Hanley, HeeSeok Kim, Michael Tunstall
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture
Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui
Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui
An Efficient Signcryption Scheme from q-Diffie-Hellman Problems
Jayaprakash Kar
Jayaprakash Kar
Approaches for the Parallelization of Software Implementation of Integer Multiplication
Vladislav Kovtun, Andrew Okhrimenko
Vladislav Kovtun, Andrew Okhrimenko
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance
John Steinberger
John Steinberger
Short Signatures From Diffie-Hellman: Realizing Short Public Key
Jae Hong Seo
Jae Hong Seo
Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles
Mohammad Reza Reyhanitabar, Willy Susilo
Mohammad Reza Reyhanitabar, Willy Susilo
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol
Wang Qinglong, Xu Li
Wang Qinglong, Xu Li
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
A j-lanes tree hashing mode and j-lanes SHA-256
Shay Gueron
Shay Gueron
Efficient Signatures of Knowledge and DAA in the Standard Model
David Bernhard, Georg Fuchsbauer, Essam Ghadafi
David Bernhard, Georg Fuchsbauer, Essam Ghadafi
On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa, Pooya Farshim
Manuel Barbosa, Pooya Farshim
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
Zhengan Huang, Shengli Liu, Baodong Qin
Zhengan Huang, Shengli Liu, Baodong Qin
On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme –
Amir Moradi, Oliver Mischke
Amir Moradi, Oliver Mischke
A Quasigroup Based Random Number Generator for Resource Constrained Environments
Matthew Battey, Abhishek Parakh
Matthew Battey, Abhishek Parakh
Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime
Sorin Iftene
Sorin Iftene
Perfect Keyword Privacy in PEKS Systems
Mototsugu Nishioka
Mototsugu Nishioka
Functional Encryption: New Perspectives and Lower Bounds
Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
New results on nonexistence of generalized bent functions
Yupeng Jiang, Yingpu Deng
Yupeng Jiang, Yingpu Deng
Computational Entropy and Information Leakage
Benjamin Fuller, Leonid Reyzin
Benjamin Fuller, Leonid Reyzin
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
Carles Padro, Leonor Vazquez, An Yang
Carles Padro, Leonor Vazquez, An Yang
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
Xiang Xie, Rui Xue, Rui Zhang
Xiang Xie, Rui Xue, Rui Zhang
Perfect Ambiguous Optimistic Fair Exchange
Yang Wang, Man Ho Au, Willy Susilo
Yang Wang, Man Ho Au, Willy Susilo
Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
Nir Bitansky, Alessandro Chiesa
Nir Bitansky, Alessandro Chiesa
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
Yohei Watanabe, Takenobu Seito, Junji Shikata
Yohei Watanabe, Takenobu Seito, Junji Shikata
Barriers in Cryptography with Weak, Correlated and Leaky Sources
Daniel Wichs
Daniel Wichs
Computing small discrete logarithms faster
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Hush Functions Extended to Any Size Input versus Any Size Output
Gideon Samid
Gideon Samid
Crowd-Blending Privacy
Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass
Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass
Must you know the code of f to securely compute f?
Mike Rosulek
Mike Rosulek
A Probabilistic Quantum Key Transfer Protocol
Abhishek Parakh
Abhishek Parakh
New Leakage Resilient CCA-Secure Public Key Encryption
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
EPiC: Efficient Privacy-Preserving Counting for MapReduce
Erik-Oliver Blass, Guevara Noubir, Triet D. Vo-Huu
Erik-Oliver Blass, Guevara Noubir, Triet D. Vo-Huu
Stam's Conjecture and Threshold Phenomena in Collision Resistance
John Steinberger, Xiaoming Sun, Zhe Yang
John Steinberger, Xiaoming Sun, Zhe Yang
Tweakable Blockciphers with Beyond Birthday-Bound Security
Will Landecker, Thomas Shrimpton, R. Seth Terashima
Will Landecker, Thomas Shrimpton, R. Seth Terashima
Long Term Confidentiality: a Survey
Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
Multi-receiver Homomorphic Authentication Codes for Network Coding
Zhaohui Tang, Hoon Wei Lim
Zhaohui Tang, Hoon Wei Lim
Differential Fault Analysis of AES: Towards Reaching its Limits
Sk Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
Sk Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
A note on ‘An efficient certificateless aggregate signature with constant pairing computations’
Debiao He, Jianhua Chen, Miaomiao Tian
Debiao He, Jianhua Chen, Miaomiao Tian
Factorization of a 1061-bit number by the Special Number Field Sieve
Greg Childers
Greg Childers
Improved CRT Algorithm for Class Polynomials in Genus 2
Kristin Lauter, Damien Robert
Kristin Lauter, Damien Robert
Group Signatures with Almost-for-free Revocation
Benoit Libert, Thomas Peters, Moti Yung
Benoit Libert, Thomas Peters, Moti Yung
Adaptively Secure Multi-Party Computation with Dishonest Majority
Sanjam Garg, Amit Sahai
Sanjam Garg, Amit Sahai
New Preimage Attacks Against Reduced SHA-1
Simon Knellwolf, Dmitry Khovratovich
Simon Knellwolf, Dmitry Khovratovich
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
Breaking and Repairing GCM Security Proofs
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai, Hakan Seyalioglu, Brent Waters
Amit Sahai, Hakan Seyalioglu, Brent Waters
Secure Database Commitments and Universal Arguments of Quasi Knowledge
Melissa Chase, Ivan Visconti
Melissa Chase, Ivan Visconti
Differential Privacy with Imperfect Randomness
Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan
Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan
Algebraic (Trapdoor) One Way Functions and their Applications
Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
Impossibility Results for Static Input Secure Computation
Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
A formal study of two physical countermeasures against side channel attacks
Sébastien Briais, Sylvain Guilley, Jean-Luc Danger
Sébastien Briais, Sylvain Guilley, Jean-Luc Danger
Simple construction of epsilon-biased distribution
Long Hoang Nguyen, Andrew William Roscoe
Long Hoang Nguyen, Andrew William Roscoe
Rational authentication protocols and their use in financial transactions
Long Hoang Nguyen
Long Hoang Nguyen
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
Robert Drylo
Robert Drylo
A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes
Ed Kendall, Michelle Kendall, Wilfrid S. Kendall
Ed Kendall, Michelle Kendall, Wilfrid S. Kendall
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
Gautham Sekar
Scalable Group Signatures with Revocation
Benoit Libert, Thomas Peters, Moti Yung
Benoit Libert, Thomas Peters, Moti Yung
Programmable encryption and key-dependent messages
Dominique Unruh
Dominique Unruh
Biclique Cryptanalysis of TWINE
Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny
Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny
A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers
Denise Demirel, Jeroen van de Graaf
Denise Demirel, Jeroen van de Graaf
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
Kan Yang, Xiaohua Jia, Kui Ren
Kan Yang, Xiaohua Jia, Kui Ren
Weaknesses of an Improvement Authentication Scheme using
Rafael Martínez-Peláez, Francisco Rico-Novella
Rafael Martínez-Peláez, Francisco Rico-Novella
Efficient Padding Oracle Attacks on Cryptographic Hardware
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
Cas Cremers, Michèle Feltz
Cas Cremers, Michèle Feltz
Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion
Jialin Huang, Xuejia Lai
Jialin Huang, Xuejia Lai
Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials
Yin Li, Gong-liang Chen, Xiao-ning Xie
Yin Li, Gong-liang Chen, Xiao-ning Xie
Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
Mukund Kalyanaraman, Michael Orshansky
Mukund Kalyanaraman, Michael Orshansky
Probabilistic Infinite Secret Sharing
Laszlo Csirmaz
Laszlo Csirmaz
Infinite Secret Sharing -- Examples
Alexander Dibert, Laszlo Csirmaz
Alexander Dibert, Laszlo Csirmaz
Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme
Qingfeng Cheng
Qingfeng Cheng
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes
Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto
Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto
Efficient Implementation of Bilinear Pairings on ARM Processors
Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
Cross-Unlinkable Hierarchical Group Signatures
Julien Bringer, Herve Chabanne, Alain Patey
Julien Bringer, Herve Chabanne, Alain Patey
Comments on four multi-server authentication protocols using smart card
Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang
Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang
Secure Computation on Floating Point Numbers
Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele
Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele
Secret Sharing Schemes for Very Dense Graphs
Amos Beimel, Oriol Farràs, Yuval Mintz
Amos Beimel, Oriol Farràs, Yuval Mintz
Fully Private Revocable Predicate Encryption
Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
Forward-Secure Hierarchical Predicate Encryption
Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Martin Albrecht, Gregor Leander
Martin Albrecht, Gregor Leander
An Algebraic Fault Attack on the LED Block Cipher
Philipp Jovanovic, Martin Kreuzer, Ilia Polian
Philipp Jovanovic, Martin Kreuzer, Ilia Polian
Differential Fault Analysis on Block Cipher Piccolo
Kitae Jeong
Kitae Jeong
PIRMAP: Efficient Private Information Retrieval for MapReduce
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
Cross-Domain Password-Based Authenticated Key Exchange Revisited
Liqun Chen, Hoon Wei Lim, Guomin Yang
Liqun Chen, Hoon Wei Lim, Guomin Yang
On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$
Brajesh Kumar Singh
Brajesh Kumar Singh
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash
Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash
An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
ID Based Signcryption Scheme in Standard Model
S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
Shaohui Wang, Sujuan Liu, Danwei Chen
Shaohui Wang, Sujuan Liu, Danwei Chen
Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three
Chol-Sun Sin
Chol-Sun Sin
Wide Strong Private RFID Identification based on Zero-Knowledge
Roel Peeters, Jens Hermans
Roel Peeters, Jens Hermans
The Arithmetic Codex
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
New cryptographic constructions using generalized learning with errors problem
Jintai ding
Jintai ding
Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
Rafael Martínez-Peláez, Francisco Rico-Novella
Rafael Martínez-Peláez, Francisco Rico-Novella
CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing
Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen
Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen
Functional Encryption for Regular Languages
Brent Waters
Brent Waters
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
Junji Shikata
Junji Shikata
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles
Zheng Yang
Zheng Yang
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
Ioana Boureanu, Serge Vaudenay
Ioana Boureanu, Serge Vaudenay
All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
Eiichiro Fujisaki
Multiparty Proximity Testing with Dishonest Majority from Equality Testing
Ran Gelles, Rafail Ostrovsky, Kina Winoto
Ran Gelles, Rafail Ostrovsky, Kina Winoto
Distributed Key Generation in the Wild
Aniket Kate, Yizhou Huang, Ian Goldberg
Aniket Kate, Yizhou Huang, Ian Goldberg
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
Colleen M. Swanson, Douglas R. Stinson
Colleen M. Swanson, Douglas R. Stinson
How to Store some Secrets
Reto E. Koenig, Rolf Haenni
Reto E. Koenig, Rolf Haenni
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
Omar Choudary, Felix Grobert, Joachim Metz
Omar Choudary, Felix Grobert, Joachim Metz
Optimal Lower Bound for Differentially Private Multi-Party Aggregation
T-H. Hubert Chan, Elaine Shi, Dawn Song
T-H. Hubert Chan, Elaine Shi, Dawn Song
New Preimage Attacks on Hash Modes of AES-256
Deukjo Hong, Dong-Chan Kim, Daesung Kwon
Deukjo Hong, Dong-Chan Kim, Daesung Kwon
Simultaneous hashing of multiple messages
Shay Gueron, Vlad Krasnov
Shay Gueron, Vlad Krasnov
Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton
Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton
Factorisation of RSA-704 with CADO-NFS
Shi Bai, Emmanuel Thomé, Paul Zimmermann
Shi Bai, Emmanuel Thomé, Paul Zimmermann
Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif
On Continual Leakage of Discrete Log Representations
Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
Securing Circuits Against Constant-Rate Tampering
Dana Dachman-Soled, Yael Tauman Kalai
Dana Dachman-Soled, Yael Tauman Kalai
Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
Ivan Damgard, Adriana Lopez-Alt
Ivan Damgard, Adriana Lopez-Alt
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions
Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau
Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau
Achieving Constant Round Leakage-Resilient Zero-Knowledge
Omkant Pandey
Omkant Pandey
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
Michele Mosca, Douglas Stebila, Berkant Ustaoglu
Michele Mosca, Douglas Stebila, Berkant Ustaoglu
Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics
Céline Blondeau, Benoît Gérard, Kaisa Nyberg
Céline Blondeau, Benoît Gérard, Kaisa Nyberg
Another look at non-uniformity
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
Gilles Piret, Thomas Roche, Claude Carlet
Gilles Piret, Thomas Roche, Claude Carlet
Publicly Verifiable Ciphertexts
Juan Manuel Gonzälez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila
Juan Manuel Gonzälez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila
Fully Anonymous Attribute Tokens from Lattices
Jan Camenisch, Gregory Neven, Markus Rückert
Jan Camenisch, Gregory Neven, Markus Rückert
Never trust a bunny
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
Arno Mittelbach
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik
Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik
On Hashing Graphs
Ashish Kundu, Elisa Bertino
Ashish Kundu, Elisa Bertino
SipHash: a fast short-input PRF
Jean-Philippe Aumasson, Daniel J. Bernstein
Jean-Philippe Aumasson, Daniel J. Bernstein
A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption
Liangliang Xiao, I-Ling Yen
Liangliang Xiao, I-Ling Yen
A Differential Fault Attack on Grain-128a using MACs
Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven
Algebraic Differential Fault Attacks on LED using a Single Fault Injection
Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji
Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji
Edwards model of elliptic curves defined over any fields
Oumar DIAO, Emmanuel FOUOTSA
Oumar DIAO, Emmanuel FOUOTSA
Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code
Masao KASAHARA
Masao KASAHARA
High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions
Tamas Gyorfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre
Tamas Gyorfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre
Enhancing Location Privacy for Electric Vehicles (at the right time)
Joseph Liu, Man Ho Au, Willy Susilo, Jianying Zhou
Joseph Liu, Man Ho Au, Willy Susilo, Jianying Zhou
From Selective to Full Security: Semi-Generic Transformations in the Standard Model
Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
Deciding Epistemic and Strategic Properties of Cryptographic Protocols
Henning Schnoor
Henning Schnoor
Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash
Adi Shamir, Eldad Zinger
Adi Shamir, Eldad Zinger
Characterizations on Algebraic Immunity for Multi-Output Boolean Functions
Xiao Zhong, Mingsheng Wang
Xiao Zhong, Mingsheng Wang
Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
Sanjay Bhattacherjee, Palash Sarkar
Sanjay Bhattacherjee, Palash Sarkar
RSA modulus generation in the two-party case
Gerald Gavin
Gerald Gavin
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu
Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu
On the Traceability of Tags in SUAP RFID Authentication Protocols
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
On the Feasibility of Extending Oblivious Transfer
Yehuda Lindell, Hila Zarosim
Yehuda Lindell, Hila Zarosim
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Homomorphic Authentication Codes for Network Coding
Zhaohui Tang
Zhaohui Tang
A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences
Xu ZiJie, Xu Ke
Xu ZiJie, Xu Ke
An Analysis of ZVP-Attack on ECC Cryptosystems
Claude Crépeau, Raza Ali Kazmi
Claude Crépeau, Raza Ali Kazmi
The Multivariate Probabilistic Encryption Scheme MQQ-ENC
Danilo Gligoroski, Simona Samardjiska
Danilo Gligoroski, Simona Samardjiska
Security Analysis of RAPP An RFID Authentication Protocol based on Permutation
Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
Allison Lewko, Brent Waters
Allison Lewko, Brent Waters
A note on generalized bent criteria for Boolean functions
Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica
Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica
3D Hardware Canaries
Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf
Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf
ML Confidential: Machine Learning on Encrypted Data
Thore Graepel, Kristin Lauter, Michael Naehrig
Thore Graepel, Kristin Lauter, Michael Naehrig
Revisiting Dedicated and Block Cipher based Hash Functions
Anupam Pattanayak
Anupam Pattanayak
DECT Security Analysis
Erik Tews
Erik Tews
The Discrete Logarithm Problem in non-representable rings
Matan Banin, Boaz Tsaban
Matan Banin, Boaz Tsaban
Bounds on the Threshold Gap in Secret Sharing and its Applications
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
Ignacio Cascudo, Ronald Cramer, Chaoping Xing
Non-uniform cracks in the concrete: the power of free precomputation
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
Markku-Juhani O. Saarinen, Daniel Engels
Markku-Juhani O. Saarinen, Daniel Engels
Computationally Complete Symbolic Attacker in Action
Gergei Bana, Pedro Adão, Hideki Sakurada
Gergei Bana, Pedro Adão, Hideki Sakurada
Using Variance to Analyze Visual Cryptography Schemes
Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou
Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou
Generation of Nonlinear Feedback Shift Registers with special-purpose hardware
Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki
Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki
An anonymous proxy signature scheme without random oracles
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Debiao He
Debiao He
Tightly Secure Signatures and Public-Key Encryption
Dennis Hofheinz, Tibor Jager
Dennis Hofheinz, Tibor Jager
A mathematical problem for security analysis of hash functions and pseudorandom generators
Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata
Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata
Fast and compact elliptic-curve cryptography
Mike Hamburg
Mike Hamburg
Verified Security of Redundancy-Free Encryption from Rabin and RSA
Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin
Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin
Multi-Channel Broadcast Encryption
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
Duong Hieu Phan, Viet Cuong Trinh
Duong Hieu Phan, Viet Cuong Trinh
Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
On The Distribution of Linear Biases: Three Instructive Examples
Mohamed Ahmed Abdelraheem, Martin Aagren, Peter Beelen, Gregor Leander
Mohamed Ahmed Abdelraheem, Martin Aagren, Peter Beelen, Gregor Leander
On instance separation in the UC-framework
István Vajda
István Vajda
A Public Shuffle without Private Permutations
Myungsun Kim, Jinsu Kim, Jung Hee Cheon
Myungsun Kim, Jinsu Kim, Jung Hee Cheon
Threshold Implementations of all 3x3 and 4x4 S-boxes
B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, G. Stütz
B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, G. Stütz
Differential Power Analysis on ZUC Algorithm
TANG Ming, CHENG PingPan, QIU ZhenLong
TANG Ming, CHENG PingPan, QIU ZhenLong
Anonymous Credentials Light
Foteini Baldimtsi, Anna Lysyanskaya
Foteini Baldimtsi, Anna Lysyanskaya
Tamper and Leakage Resilience in the Split-State Model
Feng-Hao Liu, Anna Lysyanskaya
Feng-Hao Liu, Anna Lysyanskaya
In the blink of an eye: There goes your AES key
Sergei Skorobogatov, Christopher Woods
Sergei Skorobogatov, Christopher Woods
Broadcast-enhanced key predistribution schemes
Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson
Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson
Two grumpy giants and a baby
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors
Wei Wei, Chengliang Tian, Xiaoyun Wang
Wei Wei, Chengliang Tian, Xiaoyun Wang
An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle
Jon Passki, Tom Ritter
Jon Passki, Tom Ritter
Efficient Dynamic Provable Possession of Remote Data via Update Trees
Yihua Zhang, Marina Blanton
Yihua Zhang, Marina Blanton
Fully Homomorphic Message Authenticators
Rosario Gennaro, Daniel Wichs
Rosario Gennaro, Daniel Wichs
Ring Group Signatures
Liqun Chen
Liqun Chen
Fair Exchange of Short Signatures without Trusted Third Party
Philippe Camacho
Philippe Camacho
Computationally-Fair Group and Identity-Based Key-Exchange
Andrew C. Yao, Yunlei Zhao
Andrew C. Yao, Yunlei Zhao
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis
Sk Subidh Ali, Debdeep Mukhopadhyay
Sk Subidh Ali, Debdeep Mukhopadhyay
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
Some properties of q-ary functions based on spectral analysis
Deep Singh, Maheshanand Bhaintwal
Deep Singh, Maheshanand Bhaintwal
ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY
Md. Iftekhar Salam, Hoon-Jae Lee
Md. Iftekhar Salam, Hoon-Jae Lee
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
Dario Fiore, Rosario Gennaro
Dario Fiore, Rosario Gennaro
Improved ``Partial Sums"-based Square Attack on AES
Michael Tunstall
Michael Tunstall
Concurrent Zero Knowledge in the Bounded Player Model
Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti
Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti
Improved Indifferentiability Security Bound for the JH Mode
Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil
Rkia Aouinatou, Mostafa Belkasmi
Rkia Aouinatou, Mostafa Belkasmi
Official Arbitration with Secure Cloud Storage Application
Alptekin Küpçü
Alptekin Küpçü
Implementing BLAKE with AVX, AVX2, and XOP
Samuel Neves, Jean-Philippe Aumasson
Samuel Neves, Jean-Philippe Aumasson
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
Aleksandar Kircanski, Amr M. Youssef
Aleksandar Kircanski, Amr M. Youssef
Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
Passive Corruption in Statistical Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
Homomorphic Signature for Identity Authentication in Cloud Computing
Zhiwei Wang, Guozi Sun, Danwei Chen
Zhiwei Wang, Guozi Sun, Danwei Chen
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
Enrico Thomae
Enrico Thomae
Quantifying Side-Channel Information Leakage from Web Applications
Luke Mather, Elisabeth Oswald
Luke Mather, Elisabeth Oswald
On the CCA2 Security of McEliece in the Standard Model
Edoardo Persichetti
Edoardo Persichetti
Self-pairings on Hyperelliptic Curves
Steven D. Galbraith, Chang-An Zhao
Steven D. Galbraith, Chang-An Zhao
Compilation Techniques for Efficient Encrypted Computation
Christopher Fletcher, Marten van Dijk, Srinivas Devadas
Christopher Fletcher, Marten van Dijk, Srinivas Devadas
Foundations of Garbled Circuits
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
On the (In)Security of IDEA in Various Hashing Modes
Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang
Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang
One-way Functions from Chebyshev Polynomials
Kai-Yuen Cheong
Kai-Yuen Cheong
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
I. Damgard, M. Keller, E. Larraia, C. Miles, N. P. Smart
I. Damgard, M. Keller, E. Larraia, C. Miles, N. P. Smart
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
Michael Gerbush, Allison Lewko, Adam O'Neill, Brent Waters
Michael Gerbush, Allison Lewko, Adam O'Neill, Brent Waters
Transposition of AES Key Schedule
Jialin Huang, Xuejia Lai
Jialin Huang, Xuejia Lai
A Novel Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin
José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin
The Transformation from the Galois NLFSR to the Fibonacci Configuration
Lin Zhiqiang
Lin Zhiqiang
The myth of generic DPA...and the magic of learning
Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
How to Garble Arithmetic Circuits
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
FastPRP: Fast Pseudo-Random Permutations for Small Domains
Emil Stefanov, Elaine Shi
Emil Stefanov, Elaine Shi
Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
Zhian Zhu
Zhian Zhu
Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
The Linux Pseudorandom Number Generator Revisited
Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau
Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau
New Identity Based Encryption And Its Proxy Re-encryption
Xu An Wang, Xiaoyuan Yang
Xu An Wang, Xiaoyuan Yang
Binary and q-ary Tardos codes, revisited
Boris Skoric, Jan-Jaap Oosterwijk
Boris Skoric, Jan-Jaap Oosterwijk
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
On Efficient Pairings on Elliptic Curves over Extension Fields
Xusheng Zhang, Kunpeng Wang, Dongdai Lin
Xusheng Zhang, Kunpeng Wang, Dongdai Lin
A Secret Sharing Scheme Based on Group Presentations and the Word Problem
Maggie Habeeb, Delaram Kahrobaei, Vladimir Shpilrain
Maggie Habeeb, Delaram Kahrobaei, Vladimir Shpilrain
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes
Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen
Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen
Cryptography from tensor problems
Leonard J. Schulman
Leonard J. Schulman
COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES
MYUNGSUN KIM, JIHYE KIM, JUNG HEE CHEON
MYUNGSUN KIM, JIHYE KIM, JUNG HEE CHEON
Less is More: Relaxed yet Composable Security Notions for Key Exchange
C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. Williams
C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. Williams
Key distribution system and attribute-based encryption
Masahiro Yagisawa
Masahiro Yagisawa
Field Switching in BGV-Style Homomorphic Encryption
Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
Zero-Knowledge for Multivariate Polynomials
Valerie Nachef, Jacques Patarin, Emmanuel Volte
Valerie Nachef, Jacques Patarin, Emmanuel Volte
The Boomerang Attacks on the Round-Reduced Skein-512
Hongbo Yu, Jiazhe Chen, XIaoyun Wang
Hongbo Yu, Jiazhe Chen, XIaoyun Wang
In the point of view security, An efficient scheme in IBE with random oracle
Rkia Aouinatou, Mostafa Belkasmi
Rkia Aouinatou, Mostafa Belkasmi
On Necessary and Sufficient Conditions for Private Ballot Submission
D. Bernhard, O. Pereira, B. Warinschi
D. Bernhard, O. Pereira, B. Warinschi
Ring-LWE in Polynomial Rings
Leo Ducas, Alain Durmus
Leo Ducas, Alain Durmus
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis
Qi Chai, Guang Gong
Qi Chai, Guang Gong
Implementing Pairings at the 192-bit Security Level
Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez
Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez
A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT
Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang
Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang
On Ideal Lattices and Learning with Errors Over Rings
Vadim Lyubashevsky, Chris Peikert, Oded Regev
Vadim Lyubashevsky, Chris Peikert, Oded Regev
Languages with Efficient Zero-Knowledge PCP's are in SZK
Mohammad Mahmoody, David Xiao
Mohammad Mahmoody, David Xiao
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
Marten van Dijk, Ulrich Rührmair
Marten van Dijk, Ulrich Rührmair
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
Ding Wang, Chun-guang Ma, Peng Wu
Ding Wang, Chun-guang Ma, Peng Wu
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya
Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya
When Homomorphism Becomes a Liability
Zvika Brakerski
Zvika Brakerski
Shorter IBE and Signatures via Asymmetric Pairings
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee
A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
Enrico Thomae
Enrico Thomae
A secret sharing scheme of prime numbers based on hardness of factorization
Kai-Yuen Cheong
Kai-Yuen Cheong
Almost-Everywhere Secure Computation with Edge Corruptions
Nishanth Chandran, Juan Garay, Rafail Ostrovsky
Nishanth Chandran, Juan Garay, Rafail Ostrovsky
Hedged Public-key Encryption: How to Protect against Bad Randomness
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
Private Fingerprint Matching
Siamak F. Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona
Siamak F. Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
T-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu
T-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler
Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler
Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version)
Shengbao Wu, Mingsheng Wang
Shengbao Wu, Mingsheng Wang
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
Perfect Algebraic Immune Functions
Meicheng Liu, Yin Zhang, Dongdai Lin
Meicheng Liu, Yin Zhang, Dongdai Lin
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks
Yusong Du, Fangguo Zhang
Yusong Du, Fangguo Zhang
Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications
Donghoon Chang, Moti Yung
Donghoon Chang, Moti Yung
A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER
Jay Shah, Ayan Mahalanobis
Jay Shah, Ayan Mahalanobis
Cryptanalysis of Hummingbird-2
Kai Zhang, Lin Ding, Jie Guan
Kai Zhang, Lin Ding, Jie Guan
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version)
Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
Information-flow control for programming on encrypted data
J. C. Mitchell, R. Sharma, D. Stefan, J. Zimmerman
J. C. Mitchell, R. Sharma, D. Stefan, J. Zimmerman
Unique Group Signatures
Matthew Franklin, Haibin Zhang
Matthew Franklin, Haibin Zhang
Robust biometric-based user authentication scheme for wireless sensor networks
Debiao He
Debiao He
Secure Similarity Coefficients Computation with Malicious Adversaries
Bo Zhang, Fangguo Zhang
Bo Zhang, Fangguo Zhang
Comment an Anonymous Multi-receiver Identity-based Encryption Scheme
J. H. Zhang, Y. B. Cui
J. H. Zhang, Y. B. Cui
Aggregate Signcryption
Alexander W. Dent
Alexander W. Dent
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault
Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
Jae Hong Seo, Jung Hee Cheon
Jae Hong Seo, Jung Hee Cheon
On The Security of One-Witness Blind Signature Schemes
Foteini Baldimtsi, Anna Lysyanskaya
Foteini Baldimtsi, Anna Lysyanskaya
Multi-Instance Security and its Application to Password-Based Cryptography
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
The BlueJay Ultra-Lightweight Hybrid Cryptosystem
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
A Multivariate based Threshold Ring Signature Scheme
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
An Efficient Homomorphic Encryption Protocol for Multi-User Systems
Liangliang Xiao, Osbert Bastani, I-Ling Yen
Liangliang Xiao, Osbert Bastani, I-Ling Yen
Extending Order Preserving Encryption for Multi-User Systems
Liangliang Xiao, I-Ling Yen, Dung T. Huynh
Liangliang Xiao, I-Ling Yen, Dung T. Huynh
Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes
Liangliang Xiao, I-Ling Yen
Liangliang Xiao, I-Ling Yen
On the Security of an Improved Password Authentication Scheme Based on ECC
Ding Wang, Chun-guang Ma
Ding Wang, Chun-guang Ma
Universally Composable Key-Management
Steve Kremer, Robert Künnemann, Graham Steel
Steve Kremer, Robert Künnemann, Graham Steel
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
Xin Li
Xin Li
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)
Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
Third-order nonlinearities of some biquadratic monomial Boolean functions
Brajesh Kumar Singh
Brajesh Kumar Singh
Replay attacks that violate ballot secrecy in Helios
Ben Smyth
Ben Smyth
Asymptotic fingerprinting capacity in the Combined Digit Model
Dion Boesten, Boris Skoric
Dion Boesten, Boris Skoric
Differentially Private Smart Metering with Battery Recharging
Michael Backes, Sebastian Meiser
Michael Backes, Sebastian Meiser
How to Construct Quantum Random Functions
Mark Zhandry
Mark Zhandry
A Modular Framework for Multi-Factor Authentication and Key Exchange
Nils Fleischhacker, Mark Manulis, Amir Azodi
Nils Fleischhacker, Mark Manulis, Amir Azodi
Yet Another SHA-3 Round 3 FPGA Results Paper
Brian Baldwin, William P. Marnane
Brian Baldwin, William P. Marnane
Billion-Gate Secure Computation with Malicious Adversaries
Benjamin Kreuter, abhi shelat, Chih-hao Shen
Benjamin Kreuter, abhi shelat, Chih-hao Shen
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams
Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams
Everlasting Multi-Party Computation
Dominique Unruh
Dominique Unruh
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination
Satrajit Ghosh, Abhijit Das
Satrajit Ghosh, Abhijit Das
Optimal First-Order Masking with Linear and Non-Linear Bijections
Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY, Jean-Luc DANGER
Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY, Jean-Luc DANGER
Zero Knowledge with Rubik's Cubes and Non-Abelian Groups
Emmanuel VOLTE, Jacques PATARIN, Valérie NACHEF
Emmanuel VOLTE, Jacques PATARIN, Valérie NACHEF
Automatically Verified Mechanized Proof of One-Encryption Key Exchange
Bruno Blanchet
Bruno Blanchet
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz
Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz
Quantum Money from Hidden Subspaces
Scott Aaronson, Paul Christiano
Scott Aaronson, Paul Christiano
Approaches for the performance increasing of software implementation of integer multiplication in prime fields
Vladislav Kovtun, Andrew Okhrimenko
Vladislav Kovtun, Andrew Okhrimenko
Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers
Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan
Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich
Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich
Pairing-based methods for genus 2 jacobians with maximal endomorphism ring
Sorina Ionica
Sorina Ionica
A List of Maximum Period NLFSRs
Elena Dubrova
Elena Dubrova
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
Cristina Onete
Cristina Onete
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
Morten Dahl, Chao Ning, Tomas Toft
Differential propagation analysis of Keccak
Joan Daemen, Gilles Van Assche
Joan Daemen, Gilles Van Assche
Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
Jayaprakash Kar
Jayaprakash Kar
New Constructions of Low Correlation Sequences with High Linear Complexity
Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set
Hai Xiong, Longjiang Qu, Chao Li
Hai Xiong, Longjiang Qu, Chao Li
Hybrid Encryption in the Multi-User Setting
G. M. Zaverucha
G. M. Zaverucha
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
Peter Gazi, Stefano Tessaro
Peter Gazi, Stefano Tessaro
Attack on Fully Homomorphic Encryption over the Integers
Gu Chunsheng
Gu Chunsheng
Fast Embedded Software Hashing
Dag Arne Osvik
Dag Arne Osvik
Toward Practical Group Encryption
Laila El Aimani, Marc Joye
Laila El Aimani, Marc Joye
The Joint Signature and Encryption Revisited
Laila El Aimani
Laila El Aimani
A Framework for the Cryptographic Verification of Java-like Programs
Ralf Kuesters, Tomasz Truderung, Juergen Graf
Ralf Kuesters, Tomasz Truderung, Juergen Graf
On security of a Certificateless Aggregate Signature Scheme
Limin Shen, Yinxia Sun
Limin Shen, Yinxia Sun
On Boolean Ideals and Varieties with Application to Algebraic Attacks
Alexander Rostovtsev, Alexey Mizyukin
Alexander Rostovtsev, Alexey Mizyukin
Circular chosen-ciphertext security with compact ciphertexts
Dennis Hofheinz
Dennis Hofheinz
Attacking Scrambled Burrows-Wheeler Transform
Martin Stanek
Martin Stanek
Replacing Username/Password with Software-Only Two-Factor Authentication
Michael Scott
Michael Scott
On Security Arguments of the Second Round SHA-3 Candidates
Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
On Polynomial Systems Arising from a Weil Descent
Christophe Petit, Jean-Jacques Quisquater
Christophe Petit, Jean-Jacques Quisquater
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita
Somewhat Practical Fully Homomorphic Encryption
Junfeng Fan, Frederik Vercauteren
Junfeng Fan, Frederik Vercauteren
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
Identity-Based Encryption with Master Key-Dependent Message Security and Applications
David Galindo, Javier Herranz, Jorge Villar
David Galindo, Javier Herranz, Jorge Villar
Bicliques for permutations: collision and preimage attacks in stronger settings
Dmitry Khovratovich
Dmitry Khovratovich
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors
Selcuk Baktir, Erkay Savas
Selcuk Baktir, Erkay Savas
Formal verication of secure ad-hoc network routing protocols using deductive model-checking
Ta Vinh Thong
Ta Vinh Thong
An Improved Differential Attack on Full GOST (extended version)
Nicolas T. Courtois
Nicolas T. Courtois
Usable assembly language for GPUs: a success story
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
Adaptive Key Protection in Complex Cryptosystems with Attributes
Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng
Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
A Digital Signature Scheme for Long-Term Security
Dimitrios Poulakis, Robert Rolland
Dimitrios Poulakis, Robert Rolland
Toward Practical Private Access to Data Centers via Parallel ORAM
Jacob R. Lorch, Bryan Parno, James Mickens, Mariana Raykova, Joshua Schiffman
Jacob R. Lorch, Bryan Parno, James Mickens, Mariana Raykova, Joshua Schiffman
CFS Software Implementation
Gregory Landais, Nicolas Sendrier
Gregory Landais, Nicolas Sendrier
Composition Theorems for CCA Cryptographic Security
Rodolphe Lampe, Jacques Patarin
Rodolphe Lampe, Jacques Patarin
Broadcast (and Round) Efficient Verifiable Secret Sharing
Juan Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov
Juan Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio, Irippuge Milinda Perera
Nelly Fazio, Irippuge Milinda Perera
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin, Cristina Onete
Marc Fischlin, Cristina Onete
Additive autocorrelation of some classes of cubic semi-bent Boolean functions
Deep Singh, Maheshanand Bhaintwal
Deep Singh, Maheshanand Bhaintwal
Compact Implementation of Threefish and Skein on FPGA
Nuray At, Jean-Luc Beuchat, Ismail San
Nuray At, Jean-Luc Beuchat, Ismail San
Short and Efficient Expressive Attribute-Based Signature in the Standard Model
Aijun Ge, Cheng Chen, Chuangui Ma, Zhenfeng Zhang
Aijun Ge, Cheng Chen, Chuangui Ma, Zhenfeng Zhang
On Securing Communication From Profilers
Sandra Diaz-Santiago, Debrup Chakraborty
Sandra Diaz-Santiago, Debrup Chakraborty
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-
A. Dehbaoui, J. M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, A. Tria
A. Dehbaoui, J. M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, A. Tria
Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three
Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao
Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps
Mitra Fatemi, Taraneh Eghlidos, Mohammadreza Aref
Mitra Fatemi, Taraneh Eghlidos, Mohammadreza Aref
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
Yongge Wang
Yongge Wang
Accelerating the Final Exponentiation in the Computation of the Tate Pairings
Taechan Kim, Sungwook Kim, Jung Hee Cheon
Taechan Kim, Sungwook Kim, Jung Hee Cheon
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
Universally Composable Security With Local Adversaries
Ran Canetti, Margarita Vald
Ran Canetti, Margarita Vald
Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing
XU Chun-xiang, HE Xiao-hu, Daniel Abraha
XU Chun-xiang, HE Xiao-hu, Daniel Abraha
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives
Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
Bart Mennink
Bart Mennink
On The Nonlinearity of Maximum-length NFSR Feedbacks
Meltem Sonmez Turan
Meltem Sonmez Turan
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks
Yin Zhang, Meicheng Liu, Dongdai Lin
Yin Zhang, Meicheng Liu, Dongdai Lin
Finding Optimal Formulae for Bilinear Maps
Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann
Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann
Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model
Yang Cui, Kirill Morozov
Yang Cui, Kirill Morozov
On the Optimality of Lattices for the Coppersmith Technique
Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe
Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
Guilin Wang, Jiangshan Yu, Qi Xie
Guilin Wang, Jiangshan Yu, Qi Xie
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents
Santanu Sarkar, Subhamoy Maitra
Santanu Sarkar, Subhamoy Maitra
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
FlipIt: The Game of "Stealthy Takeover"
Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
On the Circular Security of Bit-Encryption
Ron Rothblum
Ron Rothblum
Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>=3"
Zhihui Ou
Zhihui Ou
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
Shahram Khazaei, Björn Terelius, Douglas Wikström
Shahram Khazaei, Björn Terelius, Douglas Wikström
Homomorphic Evaluation of the AES Circuit
Craig Gentry, Shai Halevi, Nigel P. Smart
Craig Gentry, Shai Halevi, Nigel P. Smart
Combined Attacks on the AES Key Schedule
François Dassance, Alexandre Venelli
François Dassance, Alexandre Venelli
An algorithm for factoring integers
Yingpu Deng, Yanbin Pan
Yingpu Deng, Yanbin Pan
The Collision Security of MDC-4
Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
Jintai Ding, Dieter Schmidt
Jintai Ding, Dieter Schmidt
Recent Results on Balanced Symmetric Boolean Functions
Yingming Guo, Guangpu Gao, Yaqun Zhao
Yingming Guo, Guangpu Gao, Yaqun Zhao
Tolerant Algebraic Side-Channel Analysis of {AES}
Yossef Oren, Avishai Wool
Yossef Oren, Avishai Wool
Hardness of decision (R)LWE for any modulus
Adeline Langlois, Damien Stehle
Adeline Langlois, Damien Stehle
Worst-Case to Average-Case Reductions for Module Lattices
Adeline Langlois, Damien Stehle
Adeline Langlois, Damien Stehle
ECM at Work
Joppe W. Bos, Thorsten Kleinjung
Joppe W. Bos, Thorsten Kleinjung
A Lattice-Based Traitor Tracing Scheme
San Ling, Damien Stehle
San Ling, Damien Stehle
Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms
Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev
Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev
Remarks on- An ideal multi-secret sharing scheme based on MSP
Zhi-hui Li Jing Li
Zhi-hui Li Jing Li
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery
Stanislav Bulygin, Michael Walter
Stanislav Bulygin, Michael Walter
Improved Algebraic Side-Channel Attack on AES
Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter
Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter
Optimally Robust Private Information Retrieval
Casey Devet, Ian Goldberg, Nadia Heninger
Casey Devet, Ian Goldberg, Nadia Heninger
Semi-Supervised Template Attack
Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cedric Meuter, Gianluca Bontempi, Olivier Markowitch
Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cedric Meuter, Gianluca Bontempi, Olivier Markowitch
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
Michael Backes, Fabian Bendun, Dominique Unruh
Michael Backes, Fabian Bendun, Dominique Unruh
Strongly Unforgeable Proxy Re-Signatures in the Standard Model
S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan
S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
Masao KASAHARA
Masao KASAHARA
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Zvika Brakerski
Zvika Brakerski
MAGNITUDE SQUARED COHERENCE BASED SCA
Sebastien Tiran, Amine Dehbaoui, Philippe Maurine
Sebastien Tiran, Amine Dehbaoui, Philippe Maurine
Secure Identity-Based Encryption in the Quantum Random Oracle Model
Mark Zhandry
Mark Zhandry
Efficient identity-based threshold decryption scheme from bilinear pairings
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang
Another look at HMAC
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
Particularly Friendly Members of Family Trees
Craig Costello
Craig Costello
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer
Finding ECM-Friendly Curves through a Study of Galois Properties
Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery
Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery
Automatic Search of Attacks on round-reduced AES and Applications
Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
Extended Security Arguments for (Ring) Signature Schemes
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel
Parallelizing message schedules to accelerate the computations of hash functions
Shay Gueron, Vlad Krasnov
Shay Gueron, Vlad Krasnov
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Jiqiang Lu, Wen-She Yap, Yongzhuang Wei
Jiqiang Lu, Wen-She Yap, Yongzhuang Wei
Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”
Tsukasa Ishiguro
Tsukasa Ishiguro
Ron was wrong, Whit is right
Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter
Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter
Randomized Partial Checking Revisited
Shahram Khazaei, Douglas Wikström
Shahram Khazaei, Douglas Wikström
On the Security of Attribute Based Signature Schemes
S Sharmila Deva Selvi, Subhashini Venugopalan, C. Pandu Rangan
S Sharmila Deva Selvi, Subhashini Venugopalan, C. Pandu Rangan
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
David Mandell Freeman
Message Authentication, Revisited
Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs
Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs
Key recycling in authentication
Christopher Portmann
Christopher Portmann
Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings
Somindu C. Ramanna, Palash Sarkar
Somindu C. Ramanna, Palash Sarkar
A New Pseudorandom Generator from Collision-Resistant Hash Functions
Alexandra Boldyreva, Virendra Kumar
Alexandra Boldyreva, Virendra Kumar
Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks
Hongbin Tang, Xinsong Liu
Hongbin Tang, Xinsong Liu
On the performance of certain Private Set Intersection protocols
Emiliano De Cristofaro, Gene Tsudik
Emiliano De Cristofaro, Gene Tsudik
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage
Yevgeniy Dodis
Yevgeniy Dodis
Identity-based Encryption with Efficient Revocation
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
Eavesdropping on Satellite Telecommunication Systems
Benedikt Driessen
Benedikt Driessen
Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture
Jeremy Constantin, Andreas Burg, Frank K. Gurkaynak
Jeremy Constantin, Andreas Burg, Frank K. Gurkaynak
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160
Yu Sasaki, Lei Wang
Yu Sasaki, Lei Wang
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
Incremental Deterministic Public-Key Encryption
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity
Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis
Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis
Signature Schemes Secure against Hard-to-Invert Leakage
Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems
Jun Zhou, Zhenfu Cao
Jun Zhou, Zhenfu Cao
A novel Group Key Transfer Protocol
Chingfang Hsu, Bing Zeng, Qi Cheng, Guohua Cui
Chingfang Hsu, Bing Zeng, Qi Cheng, Guohua Cui
Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION
Norziana Jamil, Ramlan Mahmood, Muhammad Reza Z'aba, Nur Izura Udzir, Zuriati Ahmad Zukarnaen
Norziana Jamil, Ramlan Mahmood, Muhammad Reza Z'aba, Nur Izura Udzir, Zuriati Ahmad Zukarnaen
Single-block collision attack on MD5
Marc Stevens
Marc Stevens
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
Feng Hao, Dylan Clarke
Feng Hao, Dylan Clarke
Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure
François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
Some results on $q$-ary bent functions
Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh
Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh
Efficient Leakage-free Authentication of Trees, Graphs and Forests
Ashish Kundu, Mikhail Atallah, Elisa Bertino
Ashish Kundu, Mikhail Atallah, Elisa Bertino
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
Automatic Quantification of Cache Side-Channels
Boris Köpf, Laurent Mauborgne, Martin Ochoa
Boris Köpf, Laurent Mauborgne, Martin Ochoa
A note on hyper-bent functions via Dillon-like exponents
Sihem Mesnager, Jean-Pierre Flori
Sihem Mesnager, Jean-Pierre Flori
Counterexamples to Hardness Amplification Beyond Negligible
Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs
Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs
An error in "On a new formal proof model for RFID location privacy"
Da-Zhi Sun
Da-Zhi Sun
Fault Analysis of the KATAN Family of Block Ciphers
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Yannick Seurin
Yannick Seurin
A First-Order Leak-Free Masking Countermeasure
Houssem MAGHREBI, Emmanuel PROUFF, Sylvain GUILLEY, Jean-Luc DANGER
Houssem MAGHREBI, Emmanuel PROUFF, Sylvain GUILLEY, Jean-Luc DANGER
Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack
Ali Mackvandi, Maryam Saeed, Mansour Naddafiun
Ali Mackvandi, Maryam Saeed, Mansour Naddafiun
Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding
Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
A new remote data integrity checking scheme for cloud storage
Xiangtao Yan, Yifa Li
Xiangtao Yan, Yifa Li
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings
Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
On the security of Lo et al.’s ownership transfer protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Ali Mahani
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Ali Mahani
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
Mihir Bellare, Stefano Tessaro
Mihir Bellare, Stefano Tessaro
Security Analysis of J-PAKE
Mohsen Toorani
Mohsen Toorani
Dickson polynomials, hyperelliptic curves and hyper-bent functions
Jean-Pierre Flori, Sihem Mesnager
Jean-Pierre Flori, Sihem Mesnager
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
Gergei Bana, Hubert Comon-Lundh
Gergei Bana, Hubert Comon-Lundh
Attacks and Security Proofs of EAX-Prime
Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
Secondary constructions on generalized bent functions
Brajesh Kumar Singh
Brajesh Kumar Singh
Efficient Mix-Net Verication by Proofs of Random Blocks
Denise Demirel, Melanie Volkamer, Hugo Jonker
Denise Demirel, Melanie Volkamer, Hugo Jonker
A Cryptographic Treatment of the Wiretap Channel
Mihir Bellare, Stefano Tessaro, Alexander Vardy
Mihir Bellare, Stefano Tessaro, Alexander Vardy
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
Higher Order Algebraic Attacks on Stream Ciphers
Qichun Wang, Thomas Johansson
Qichun Wang, Thomas Johansson
Malleable Proof Systems and Applications
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
Biclique Attack of the Full ARIA-256
Shao-zhen Chen Tian-min Xu
Shao-zhen Chen Tian-min Xu
PayTree: "Amortized Signature" for Flexible Micro-Payments
Charanjit Jutla, Moti Yung
Charanjit Jutla, Moti Yung
On the Indifferentiability of the Integrated-Key Hash Functions
Saif Al-Kuwari
Saif Al-Kuwari
Security proof with dishonest keys
Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri
Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri
Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures
Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
Susan Hohenberger, Allison Lewko, Brent Waters
Susan Hohenberger, Allison Lewko, Brent Waters
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Benjamin Fuller, Adam O'Neill, Leonid Reyzin
Benjamin Fuller, Adam O'Neill, Leonid Reyzin
The new SHA-3 software shootout
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian
Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian
ECC2K-130 on NVIDIA GPUs
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
Digital Signatures from Challenge-Divided Sigma-Protocols
Andrew C. Yao, Yunlei Zhao
Andrew C. Yao, Yunlei Zhao
Position-Verification in Multi-Channel Models
Huajun Zhang, Zongyang Zhang, Zhenfu Cao
Huajun Zhang, Zongyang Zhang, Zhenfu Cao
A server-aided verification signature scheme without random oracles
Bin Wang, Qing Zhao
Bin Wang, Qing Zhao
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Johann Großschädl, Dan Page, Stefan Tillich
Johann Großschädl, Dan Page, Stefan Tillich
Evolutionary Construction of de Bruijn Sequences
Meltem Sonmez Turan
Meltem Sonmez Turan
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Alex Biryukov, Johann Großschädl
Alex Biryukov, Johann Großschädl
Fault Attack against Miller's algorithm
Nadia El Mrabet
Nadia El Mrabet
Computational Extractors and Pseudorandomness
Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin
Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
Alex Biryukov, Ilya Kizhvatov, Bin Zhang
Alex Biryukov, Ilya Kizhvatov, Bin Zhang
Improved Side Channel Attacks on Pairing Based Cryptography
Johannes Blömer, Peter Günther, Gennadij Liske
Johannes Blömer, Peter Günther, Gennadij Liske
Differential Attacks on Generalized Feistel Schemes
Valerie Nachef, Emmanuel Volte, Jacques Patarin
Valerie Nachef, Emmanuel Volte, Jacques Patarin
Security Analysis of a PUF based RFID Authentication Protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Waters Signatures with Optimal Security Reduction
Dennis Hofheinz, Tibor Jager, Edward Knapp
Dennis Hofheinz, Tibor Jager, Edward Knapp
Comments of an efficient and secure multi-server authentication scheme with key agreement
Yitao Chen
Yitao Chen
Decentralized Attribute-Based Signatures
Tatsuaki Okamoto, Katsuyuki Takashima
Tatsuaki Okamoto, Katsuyuki Takashima
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
Tatsuaki Okamoto, Katsuyuki Takashima
Tatsuaki Okamoto, Katsuyuki Takashima
Public-Key Encryption with Cluster-Chain-based Keyword Search
Peng Xu, Hai Jin, Wei Wang, Deqing Zou
Peng Xu, Hai Jin, Wei Wang, Deqing Zou
A generalization of the class of hyper-bent Boolean functions in binomial forms
Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
Efficient Network Coding Signatures in the Standard Model
Dario Catalano, Dario Fiore, Bogdan Warinschi
Dario Catalano, Dario Fiore, Bogdan Warinschi
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation
Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
A non-interactive deniable authentication scheme in the standard model
Bin Wang, Qing Zhao, Ke Dai
Bin Wang, Qing Zhao, Ke Dai
Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions
Cheng Chen, Zhenfeng Zhang, Dengguo Feng
Cheng Chen, Zhenfeng Zhang, Dengguo Feng
Yet Another Ultralightweight Authentication Protocol that is Broken
Gildas Avoine, Xavier Carpent
Gildas Avoine, Xavier Carpent
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation
Masao KASAHARA
Masao KASAHARA
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou
Authenticated Key Exchange under Bad Randomness
Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang
Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang
Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption)
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
Analysis of some natural variants of the PKP Algorithm
Rodolphe LAMPE, Jacques PATARIN
Rodolphe LAMPE, Jacques PATARIN
Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function
Roman Oliynykov
Roman Oliynykov
Identification Based Encryption with RSA-OAEP. Using SEM and Without
Rkia Aouinatou, Mostafa Belkasmi
Rkia Aouinatou, Mostafa Belkasmi
Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems
Falko Strenzke
Falko Strenzke
UC framework for anonymous communication
István Vajda
István Vajda
Physically Uncloneable Functions in the Universal Composition Framework
Chris Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
Chris Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
Better Bootstrapping in Fully Homomorphic Encryption
Craig Gentry, Shai Halevi, Nigel P. Smart
Craig Gentry, Shai Halevi, Nigel P. Smart
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
On definitions of selective opening security
Florian Böhl, Dennis Hofheinz, Daniel Kraschewski
Florian Böhl, Dennis Hofheinz, Daniel Kraschewski
CommitCoin: Carbon Dating Commitments with Bitcoin
Jeremy Clark, Aleksander Essex
Jeremy Clark, Aleksander Essex
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie
Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges
Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
Colleen M. Swanson, Douglas R. Stinson
Colleen M. Swanson, Douglas R. Stinson
Pseudorandom Signatures
Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering
Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering
Fast and Secure Root Finding for Code-based Cryptosystems
Falko Strenzke
Falko Strenzke
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man
SHA-3 on ARM11 processors
Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang
Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields
Christopher Wolf, Enrico Thomae
Christopher Wolf, Enrico Thomae
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
Piotr K. Tysowski, M. Anwarul Hasan
Piotr K. Tysowski, M. Anwarul Hasan
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
Suleyman Kardas, Atakan Arslan, Serkan Celik, Albert Levi
Suleyman Kardas, Atakan Arslan, Serkan Celik, Albert Levi
A Gross-Zagier formula for quaternion algebras over totally real fields
Eyal Z. Goren, Kristin E. Lauter
Eyal Z. Goren, Kristin E. Lauter
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Gonzalez Nieto
Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Gonzalez Nieto
On the Security of ID Based Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption
Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
Deploying secure multi-party computation for financial data analysis
Dan Bogdanov, Riivo Talviste, Jan Willemson
Dan Bogdanov, Riivo Talviste, Jan Willemson
New Impossible Differential Attacks on Camellia
Dongxia Bai, Leibo Li
Dongxia Bai, Leibo Li
Program Obfuscation with Leaky Hardware
Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum
Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum
Formally Assessing Cryptographic Entropy
Daniel R. L. Brown
Daniel R. L. Brown
Anonymous attestation with user-controlled linkability
D. Bernhard, G. Fuchsbauer, E. Ghadafi, N. P. Smart, B. Warinschi
D. Bernhard, G. Fuchsbauer, E. Ghadafi, N. P. Smart, B. Warinschi
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
Abhranil Maiti, Vikash Gunreddy, Patrick Schaumont
Abhranil Maiti, Vikash Gunreddy, Patrick Schaumont
Use Data-depend Function Build Message Expansion Function
ZiJie Xu, Ke Xu
ZiJie Xu, Ke Xu
Privacy-Preserving Stream Aggregation with Fault Tolerance
T-H. Hubert Chan, Elaine Shi, Dawn Song
T-H. Hubert Chan, Elaine Shi, Dawn Song
Elliptic Curve Cryptography in JavaScript
Laurie Haustenne, Quentin De Neyer, Olivier Pereira
Laurie Haustenne, Quentin De Neyer, Olivier Pereira
An Improved Certificateless Authenticated Key Agreement Protocol
Haomin Yang, Yaoxue Zhang, Yuezhi Zhou
Haomin Yang, Yaoxue Zhang, Yuezhi Zhou
Security Enhancement of the Vortex Family of Hash Functions
Shay Gueron, Michael Kounavis
Shay Gueron, Michael Kounavis
CHECKER: On-site checking in RFID-based supply chains
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
On the Security of NMAC and Its Variants
Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng
Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
Tatsuaki Okamoto, Katsuyuki Takashima
Tatsuaki Okamoto, Katsuyuki Takashima
Breaking $H^2$-MAC Using Birthday Paradox
Fanbao Liu, Tao Xie, Changxiang Shen
Fanbao Liu, Tao Xie, Changxiang Shen
The security impact of a new cryptographic library
Daniel J. Bernstein, Tanja Lange, Peter Schwabe
Daniel J. Bernstein, Tanja Lange, Peter Schwabe
Fully Homomorphic Encryption Based on Approximate Matrix GCD
Gu Chunsheng
Gu Chunsheng
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
Some Words About Cryptographic Key Recognition In Data Streams
Alexey Chilikov, Evgeny Alekseev
Alexey Chilikov, Evgeny Alekseev
Constructing differentially 4-uniform permutations over $\mbf_{2^{2m}}$ from quadratic APN permutations over $\mbf_{2^{2m+1}}$
Yongqiang Li, Mingsheng Wang
Yongqiang Li, Mingsheng Wang
Collision for 75-step SHA-1: Intensive Parallelization with GPU
E. A. Grechnikov, A. V. Adinetz
E. A. Grechnikov, A. V. Adinetz
Hummingbird: Privacy at the time of Twitter
Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks
Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
Rubik's for cryptographers
Christophe Petit, Jean-Jacques Quisquater
Christophe Petit, Jean-Jacques Quisquater
Random Number Generation Based on Oscillatory Metastability in Ring Circuits
Laszlo Hars
Laszlo Hars
Untangling RFID Privacy Models
Iwen Coisel, Tania Martin
Iwen Coisel, Tania Martin
Groestl Tweaks and their Effect on FPGA Results
Marcin Rogawski, Kris Gaj
Marcin Rogawski, Kris Gaj
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
Practical realisation and elimination of an ECC-related software bug attack
B. B. Brumley, M. Barbosa, D. Page, F. Vercauteren
B. B. Brumley, M. Barbosa, D. Page, F. Vercauteren
A Scalable Method for Constructing Galois NLFSRs with Period $2^n-1$ using Cross-Join Pairs
Elena Dubrova
Elena Dubrova
Cheating Human Vision in Visual Secret Sharing
Yu-Chi Chen, Gwoboa Horng, Du-Shiau Tsai
Yu-Chi Chen, Gwoboa Horng, Du-Shiau Tsai
Indifferentiability Security of the Fast Wide Pipe Hash: Breaking the Birthday Barrier
Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
Maximum Leakage Resilient IBE and IPE
Kaoru Kurosawa, Le Trieu Phong
Kaoru Kurosawa, Le Trieu Phong
A note on semi-bent functions with multiple trace terms and hyperelliptic curves
Sihem Mesnager
Sihem Mesnager
Algebraic Complexity Reduction and Cryptanalysis of GOST
Nicolas T. Courtois
Nicolas T. Courtois
Two RFID Privacy Models in Front of a Court
Mohammad Hassan Habibi, Mohammad Reza Aref
Mohammad Hassan Habibi, Mohammad Reza Aref
New attacks on Keccak-224 and Keccak-256
Itai Dinur, Orr Dunkelman, Adi Shamir
Itai Dinur, Orr Dunkelman, Adi Shamir
Indifferentiability of the Hash Algorithm BLAKE
Donghoon Chang, Mridul Nandi, Moti Yung
Donghoon Chang, Mridul Nandi, Moti Yung
Homomorphic encryption from codes
Andrej Bogdanov, Chin Ho Lee
Andrej Bogdanov, Chin Ho Lee
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
Provable Security of BLAKE with Non-Ideal Compression Function
Elena Andreeva, Atul Luykx, Bart Mennink
Elena Andreeva, Atul Luykx, Bart Mennink
Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64
Bo Zhu, Guang Gong
Bo Zhu, Guang Gong
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
Charm: A framework for Rapidly Prototyping Cryptosystems
Joseph A. Akinyele, Matthew D. Green, Avi D. Rubin
Joseph A. Akinyele, Matthew D. Green, Avi D. Rubin
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
Jiazhe Chen, Meiqin Wang, Bart Preneel
Jiazhe Chen, Meiqin Wang, Bart Preneel
On the Joint Security of Encryption and Signature in EMV
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud
Keke Chen
Keke Chen
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Gilad Asharov, Abhishek Jain, Daniel Wichs
Gilad Asharov, Abhishek Jain, Daniel Wichs
IBAKE: Identity-Based Authenticated Key Exchange Protocol
Vladimir Kolesnikov, Ganapathy S. Sundaram
Vladimir Kolesnikov, Ganapathy S. Sundaram
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks
Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert
Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert
The PHOTON Family of Lightweight Hash Functions
Jian Guo, Thomas Peyrin, Axel Poschmann
Jian Guo, Thomas Peyrin, Axel Poschmann
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
Patrick Longa, Francesco Sica
Patrick Longa, Francesco Sica
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}
Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz
Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz
$GF(2^{n})$ Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials
Xi Xiong, Haining Fan
Xi Xiong, Haining Fan
Efficient and Secure Delegation of Linear Algebra
Payman Mohassel
Payman Mohassel
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
Aurore Guillevic, Damien Vergnaud
Aurore Guillevic, Damien Vergnaud
Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family
Le Dong, Wenling Wu, Shuang Wu, Jian Zou
Le Dong, Wenling Wu, Shuang Wu, Jian Zou
Positive Results for Concurrently Secure Computation in the Plain Model
Vipul Goyal
Vipul Goyal
A Multi-Receiver ID-Based Generalized Signcryption Scheme
Caixue Zhou
Caixue Zhou
A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms
Chunming Tang, Yanfeng Qi, Maozhi Xu, Baocheng Wang, Yixian Yang
Chunming Tang, Yanfeng Qi, Maozhi Xu, Baocheng Wang, Yixian Yang
Efficient Password-Based Authenticated Key Exchange from Lattices
Yi Ding, Lei Fan
Yi Ding, Lei Fan
New Subexponential Algorithms for Factoring in $SL(2,\fq)$
Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault
Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan
Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan
Parallel Homomorphic Encryption
Seny Kamara, Mariana Raykova
Seny Kamara, Mariana Raykova
Efficient Multi-Query CPIR from Ring-LWE
Helger Lipmaa
Helger Lipmaa
Receipt Freeness of Prêt à Voter Provably Secure
Dalia Khader, Peter Y. A. Ryan
Dalia Khader, Peter Y. A. Ryan
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
Yu Chen, Liqun Chen, Zongyang Zhang
Yu Chen, Liqun Chen, Zongyang Zhang
Generic Constructions for Verifiable Signcryption
Laila El Aimani
Laila El Aimani
A Unified Framework for Small Secret Exponent Attack on RSA
Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
An Efficient Broadcast Attack against NTRU
Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication
Chen Su, Haining Fan
Chen Su, Haining Fan
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
Arpita Maitra, Goutam Paul
Arpita Maitra, Goutam Paul
Signatures of Correct Computation
Charalampos Papamanthou, Elaine Shi, Roberto Tamassia
Charalampos Papamanthou, Elaine Shi, Roberto Tamassia
TweLEX: A Tweaked Version of the LEX Stream Cipher
Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay
Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay
Iris: A Scalable Cloud File System with Efficient Integrity Checks
Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels
Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels
A Single-Key Attack on 6-Round KASUMI
Teruo Saito
Teruo Saito
Revocable Identity-Based Encryption from Lattices
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen
Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$
Abdoul Aziz Ciss
Abdoul Aziz Ciss
Standard Security Does Not Imply Security Against Selective-Opening
Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek
Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek
On a new generalization of Huff curves
Abdoul Aziz Ciss, Djiby Sow
Abdoul Aziz Ciss, Djiby Sow
Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements
Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama
Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama
ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS
Balasingham Balamohan
Balasingham Balamohan
An Efficient Protocol for the Commit-Prove-Fair-Open functionality
Ou Ruan, Cai Fu, Guohua Cui
Ou Ruan, Cai Fu, Guohua Cui
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
Jing Liu, Qiong Huang, Bo Yang, Yang Zhang
Jing Liu, Qiong Huang, Bo Yang, Yang Zhang
Exclusive Key Based Group Rekeying Protocols
Jing Liu, Changji Wang
Jing Liu, Changji Wang
Towards Efficient Provable Data Possession in Cloud Storage
Jia Xu, Ee-Chien Chang, Jianying Zhou
Jia Xu, Ee-Chien Chang, Jianying Zhou
A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
Masao Kasahara
Masao Kasahara
The ElGamal cryptosystem over circulant matrices
Ayan Mahalanobis
Ayan Mahalanobis
Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions
Brajesh Kumar Singh, Sugata Gangopadhyay
Brajesh Kumar Singh, Sugata Gangopadhyay
Degree of regularity for HFE-
Jintai Ding, Thorsten Kleinjung
Jintai Ding, Thorsten Kleinjung
Analysis of the Hamming Weight of the Extended wmbNAF
Ming Li, Ali Miri, Daming Zhu
Ming Li, Ali Miri, Daming Zhu
Single Layer Optical-scan Voting with Fully Distributed Trust
Aleksander Essex, Christian Henrich, Urs Hengartner
Aleksander Essex, Christian Henrich, Urs Hengartner
On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption
Moon Sung Lee
Moon Sung Lee
Fully Homomorphic Encryption with Polylog Overhead
Craig Gentry, Shai Halevi, Nigel P. Smart
Craig Gentry, Shai Halevi, Nigel P. Smart
Cryptographic Hash Functions: Recent Design Trends and Security Notions
Saif Al-Kuwari, James H. Davenport, Russell J. Bradford
Saif Al-Kuwari, James H. Davenport, Russell J. Bradford
Private-key Symbolic Encryption
N. Ahmed, C. D. Jensen, E. Zenner
N. Ahmed, C. D. Jensen, E. Zenner
On the Security of RFID Anti Cloning Security Protocol(ACSP)
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
A Group Testing Approach to Improved Corruption Localizing Hashing
Annalisa De Bonis, Giovanni Di Crescenzo
Annalisa De Bonis, Giovanni Di Crescenzo
A Domain-Specific Language for Computing on Encrypted Data
Alex Bain, John Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman
Alex Bain, John Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman
Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation
Ching-Hua Yu, Bo-Yin Yang
Ching-Hua Yu, Bo-Yin Yang
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
Eike Kiltz, Adam O'Neill, Adam Smith
Eike Kiltz, Adam O'Neill, Adam Smith
Improved Attacks on Full GOST
Itai Dinur, Orr Dunkelman, Adi Shamir
Itai Dinur, Orr Dunkelman, Adi Shamir
An Improved Trace Driven Instruction Cache Timing Attack on RSA
Chen Cai-Sen, Wang Tao, Chen Xiao-Cen, Zhou Ping
Chen Cai-Sen, Wang Tao, Chen Xiao-Cen, Zhou Ping
GF(2^n) redundant representation using matrix embedding
Yongjia Wang, Xi Xiong, Haining Fan
Yongjia Wang, Xi Xiong, Haining Fan
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
Michelle Kendall, Keith Martin
Michelle Kendall, Keith Martin
On the security models for certificateless signature schemes achieving level 3 security
Yu-Chi Chen, Gwoboa Horng
Yu-Chi Chen, Gwoboa Horng
Publicly Verifiable Proofs of Sequential Work
Mohammad Mahmoody, Tal Moran, Salil Vadhan
Mohammad Mahmoody, Tal Moran, Salil Vadhan
Recyclable PUFs: Logically Reconfigurable PUFs
Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
Security Evaluation against Differential Cryptanalysis for Block Cipher Structures
Shengbao Wu, Mingsheng Wang
Shengbao Wu, Mingsheng Wang
A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions
Javad Alizadeh, Abdolrasoul Mirghadri
Javad Alizadeh, Abdolrasoul Mirghadri
1-Resilient Boolean Function with Optimal Algebraic Immunity
Qingfang Jin, Zhuojun Liu, Baofeng Wu
Qingfang Jin, Zhuojun Liu, Baofeng Wu
On the security of MQ_DRBG
V. O. Drelikhov, G. B. Marshalko, A. V. Pokrovskiy
V. O. Drelikhov, G. B. Marshalko, A. V. Pokrovskiy
The Single Cycle T-functions
Zhaopeng Dai, Zhuojun Liu
Zhaopeng Dai, Zhuojun Liu
Hidden Vector Encryption Fully Secure Against Unrestricted Queries
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0
Masao Kasahara
Masao Kasahara
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers
Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy, David Irwin
Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy, David Irwin
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Tatsuaki Okamoto, Katsuyuki Takashima
Tatsuaki Okamoto, Katsuyuki Takashima
Certificate-Based Signcryption: Security Model and Efficient Construction
Yang Lu, Jiguo Li
Yang Lu, Jiguo Li
Minimalism in Cryptography: The Even-Mansour Scheme Revisited
Orr Dunkelman, Nathan Keller, Adi Shamir
Orr Dunkelman, Nathan Keller, Adi Shamir
Efficient Implementation of the $\eta_T$ Pairing on GPU
Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
Sign Modules in Secure Arithmetic Circuits
Ching-Hua Yu
Ching-Hua Yu
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
Jia Xu, Ee-Chien Chang, Jianying Zhou
Jia Xu, Ee-Chien Chang, Jianying Zhou
Lattice Signatures Without Trapdoors
Vadim Lyubashevsky
Vadim Lyubashevsky
Revisiting Lower and Upper Bounds for Selective Decommitments
Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti
Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti
Multiparty Computation from Somewhat Homomorphic Encryption
I. Damgard, V. Pastro, N. P. Smart, S. Zakarias
I. Damgard, V. Pastro, N. P. Smart, S. Zakarias
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
Maxime Nassar, Sylvain Guilley, Jean-Luc Danger
Maxime Nassar, Sylvain Guilley, Jean-Luc Danger
Two-Output Secure Computation with Malicious Adversaries
abhi shelat, Chih-hao Shen
abhi shelat, Chih-hao Shen
Hash Functions Based on Three Permutations: A Generic Security Analysis
Bart Mennink, Bart Preneel
Bart Mennink, Bart Preneel
Static Fault Attacks on Hardware DES Registers
Philippe Loubet-Moundi, David Vigilant, Francis Olivier
Philippe Loubet-Moundi, David Vigilant, Francis Olivier
Key-Evolution Schemes Resilient to Space-Bounded Leakage
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Secure and Efficient Proof of Storage with Deduplication
Qingji Zheng, Shouhuai Xu
Qingji Zheng, Shouhuai Xu
Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy
Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou
Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou
Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography
Mohsen Toorani, Maryam Saeed
Mohsen Toorani, Maryam Saeed
Universally Composable Security Analysis of OAuth v2.0
Suresh Chari, Charanjit Jutla, Arnab Roy
Suresh Chari, Charanjit Jutla, Arnab Roy
A Note on the Density of the Multiple Subset Sum Problems
Yanbin Pan, Feng Zhang
Yanbin Pan, Feng Zhang
Security of Reduced-Round Camellia against Impossible Differential Attack
Leibo Li, Jiazhe Chen, Xiaoyun Wang
Leibo Li, Jiazhe Chen, Xiaoyun Wang
Security analysis of a fuzzy identity-based encryption scheme
Miaomiao Tian, Liusheng Huang, Wei Yang
Miaomiao Tian, Liusheng Huang, Wei Yang
A Compact S-Box Design for SMS4 Block Cipher
Imran Abbasi, Mehreen Afzal
Imran Abbasi, Mehreen Afzal
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions
Daniele Micciancio, Petros Mol
Daniele Micciancio, Petros Mol
Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean-Luc Danger
Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger
Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger
Leakage-Resilient Cryptography From the Inner-Product Extractor
Stefan Dziembowski, Sebastian Faust
Stefan Dziembowski, Sebastian Faust
Two 1-Round Protocols for Delegation of Computation
Ran Canetti, Ben Riva, Guy N. Rothblum
Ran Canetti, Ben Riva, Guy N. Rothblum
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Protecting AES with Shamir's Secret Sharing Scheme
Louis Goubin, Ange Martinelli
Louis Goubin, Ange Martinelli
A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity
Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang
Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols
Mohammad Sadeq Dousti, Rasool Jalili
Mohammad Sadeq Dousti, Rasool Jalili
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
Abhishek Jain, Omkant Pandey
Abhishek Jain, Omkant Pandey
A Dichotomy for Local Small-Bias Generators
Benny Applebaum, Andrej Bogdanov, Alon Rosen
Benny Applebaum, Andrej Bogdanov, Alon Rosen
The Cryptographic Power of Random Selection
Matthias Krause, Matthias Hamann
Matthias Krause, Matthias Hamann
On the Security of the Free-XOR Technique
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Emil Stefanov, Elaine Shi, Dawn Song
Emil Stefanov, Elaine Shi, Dawn Song
Secure Two-Party Computation with Low Communication
Ivan Damgård, Sebastian Faust, Carmit Hazay
Ivan Damgård, Sebastian Faust, Carmit Hazay
Relatively-Sound NIZKs and Password-Based Key-Exchange
Charanjit Jutla, Arnab Roy
Charanjit Jutla, Arnab Roy
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Luca De Feo, David Jao, Jérôme Plût
Luca De Feo, David Jao, Jérôme Plût
A New Second Order Side Channel Attack Based on Linear Regression
Julien Doget, Guillaume Dabosville, Emmanuel Prouff
Julien Doget, Guillaume Dabosville, Emmanuel Prouff
From Non-Adaptive to Adaptive Pseudorandom Functions
Iftach Haitner, Itay Berman
Iftach Haitner, Itay Berman
On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$
Christina Boura, Anne Canteaut
Christina Boura, Anne Canteaut
Wild McEliece Incognito
Daniel J. Bernstein, Tanja Lange, Christiane Peters
Daniel J. Bernstein, Tanja Lange, Christiane Peters
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
Daniele Micciancio, Chris Peikert
Daniele Micciancio, Chris Peikert
Biclique Cryptanalysis of the Block Cipher SQUARE
Hamid Mala
Hamid Mala
Duplexing the sponge: single-pass authenticated encryption and other applications
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
An Efficient Secure Anonymous Proxy Signature Scheme
Jue-Sam Chou, Shih-Che Hung, Yalin Chen
Jue-Sam Chou, Shih-Che Hung, Yalin Chen
Can a Program Reverse-Engineer Itself?
Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion
Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
Avradip Mandal, Jacques Patarin, Yannick Seurin
Avradip Mandal, Jacques Patarin, Yannick Seurin
Vector Commitments and their Applications
Dario Catalano, Dario Fiore
Dario Catalano, Dario Fiore
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi
Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi
From Point Obfuscation To 3-round Zero-Knowledge
Nir Bitansky, Omer Paneth
Nir Bitansky, Omer Paneth
Rational distance-bounding protocols over noisy channels
Long H. Nguyen
Long H. Nguyen
Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid
Qi Jiang, Jianfeng Ma, Guangsong Li, Xiang Lu
Qi Jiang, Jianfeng Ma, Guangsong Li, Xiang Lu
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
Allison Lewko
Allison Lewko
Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis
A. N. Alekseychuk, L. V. Kovalchuk
A. N. Alekseychuk, L. V. Kovalchuk
A Survey of Cryptography Based on Physically Unclonable Objects
Kai-Yuen Cheong
Kai-Yuen Cheong
Noiseless Database Privacy
Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
On the Joint Security of Encryption and Signature, Revisited
Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
Another Look at Automated Theorem-Proving. II
Neal Koblitz
Neal Koblitz
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
Johannes Buchmann, Erik Dahmen, Andreas Hülsing
Johannes Buchmann, Erik Dahmen, Andreas Hülsing
Adaption of Pollard's kangaroo algorithm to the FACTOR problem
Mario Romsy
Mario Romsy
Secure Computation with Sublinear Amortized Work
Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis
Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis
Close to Uniform Prime Number Generation With Fewer Random Bits
Pierre-Alain Fouque, Mehdi Tibouchi
Pierre-Alain Fouque, Mehdi Tibouchi
Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis
Sanjay Bhattacherjee, Palash Sarkar
Sanjay Bhattacherjee, Palash Sarkar
Identity-Based (Lossy) Trapdoor Functions and Applications
Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters
Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters
An efficient certificateless authenticated key agreement scheme
Debiao He, Sahadeo Padhye, Jianhua Chen
Debiao He, Sahadeo Padhye, Jianhua Chen
Cryptanalysis of NTRU with two public keys
Abderrahmane Nitaj
Abderrahmane Nitaj
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis
Nicolas T. Courtois, Daniel Hulme, Theodosis Mourouzis
Nicolas T. Courtois, Daniel Hulme, Theodosis Mourouzis
Improved Generic Algorithms for Hard Knapsacks
Anja Becker, Jean-Sébastien Coron, Antoine Joux
Anja Becker, Jean-Sébastien Coron, Antoine Joux
Practically Efficient Verifiable Delegation of Polynomial and its Applications
Jia XU
Jia XU
Forward Secure Ring Signature without Random Oracles
Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme
P. Scholl, N. P. Smart
P. Scholl, N. P. Smart
Non-malleable public key encryption in BRSIM/UC
István Vajda
István Vajda
Cryptanalysis of INCrypt32 in HID's iCLASS Systems
ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, Daewan Han
ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, Daewan Han
Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three
Hongfeng Wu, Chang-An Zhao
Hongfeng Wu, Chang-An Zhao
A !ew Efficient Asymmetric Cryptosystem for large data sets
M. R. K. Ariffin, M. A. Asbullah, N. A. Abu
M. R. K. Ariffin, M. A. Asbullah, N. A. Abu
Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher
Keting Jia, Christian Rechberger, Xiaoyun Wang
Keting Jia, Christian Rechberger, Xiaoyun Wang
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
Craig Costello, Kristin Lauter, Michael Naehrig
Craig Costello, Kristin Lauter, Michael Naehrig
Private and Oblivious Set and Multiset Operations
Marina Blanton, Everaldo Aguiar
Marina Blanton, Everaldo Aguiar
Decentralized Dynamic Broadcast Encryption
Duong Hieu Phan, David Pointcheval, Mario Strefler
Duong Hieu Phan, David Pointcheval, Mario Strefler
Secure Outsourced Computation of Iris Matching
Marina Blanton, Mehrdad Aliasgari
Marina Blanton, Mehrdad Aliasgari
Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving
Fangguo Zhang, Ping Wang
Fangguo Zhang, Ping Wang
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings
Zijian Zhang, Liehuang Zhu, Lejian Liao
Zijian Zhang, Liehuang Zhu, Lejian Liao
Sufficient conditions for sound hashing using a truncated permutation
Joan Daemen, Tony Dusenge, Gilles Van Assche
Joan Daemen, Tony Dusenge, Gilles Van Assche
Sieving for Shortest Vectors in Ideal Lattices
Michael Schneider
Michael Schneider
Resettable Statistical Zero Knowledge
Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs
Shafi Goldwasser, Huijia Lin, Aviad Rubinstein
Shafi Goldwasser, Huijia Lin, Aviad Rubinstein
The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers, Mona Sergi, abhi shelat
Steven Myers, Mona Sergi, abhi shelat
Practical Complexity Differential Cryptanalysis and Fault Analysis of AES
Michael Tunstall
Michael Tunstall
The Good lower bound of Second-order nonlinearity of a class of Boolean function
Manish Garg, Sugata Gangopadhyay
Manish Garg, Sugata Gangopadhyay
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won
Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won
R-hash : Hash Function Using Random Quadratic Polynomials Over GF (2)
Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta
Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta
Biclique Cryptanalysis of the Full AES
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher
Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
On Verifying Dynamic Multiple Data Copies over Cloud Servers
Ayad F. Barsoum, M. Anwar Hasan
Ayad F. Barsoum, M. Anwar Hasan
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin, Yuguang Fang, Zhenfu Cao
Huang Lin, Yuguang Fang, Zhenfu Cao
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin, Sherman S. M. Chow, Dongsheng Xing, Yuguang Fang, Zhenfu Cao
Huang Lin, Sherman S. M. Chow, Dongsheng Xing, Yuguang Fang, Zhenfu Cao
Generalised Mersenne Numbers Revisited
Robert Granger, Andrew Moss
Robert Granger, Andrew Moss
From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
Another Look at Tightness
Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
Jean-Sebastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
Jean-Sebastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
Optimal Data Authentication from Directed Transitive Signatures
Philippe Camacho
Philippe Camacho
Short Transitive Signatures for Directed Trees
Philippe Camacho, Alejandro Hevia
Philippe Camacho, Alejandro Hevia
Approximate common divisors via lattices
Henry Cohn, Nadia Heninger
Henry Cohn, Nadia Heninger
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
Yuanmi Chen, Phong Q. Nguyen
Yuanmi Chen, Phong Q. Nguyen
The IPS Compiler: Optimizations, Variants and Concrete Efficiency
Yehuda Lindell, Benny Pinkas, Eli Oxman
Yehuda Lindell, Benny Pinkas, Eli Oxman
An Efficient Protocol for Oblivious DFA Evaluation and Applications
Payman Mohassel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan
Payman Mohassel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan
Collusion-Preserving Computation
Joel Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas
Joel Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas
Ciphers that Securely Encipher their own Keys
Mihir Bellare, David Cash, Sriram Keelveedhi
Mihir Bellare, David Cash, Sriram Keelveedhi
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Enrico Thomae, Christopher Wolf
Enrico Thomae, Christopher Wolf
Analogues of Velu's Formulas for Isogenies on Alternate Models of Elliptic Curves
Dustin Moody, Daniel Shumow
Dustin Moody, Daniel Shumow
Round-efficient Oblivious Database Manipulation
Sven Laur, Jan Willemson, Bingsheng Zhang
Sven Laur, Jan Willemson, Bingsheng Zhang
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
Tatsuya TAKEHISA, Hiroki NOGAWA, Masakatu MORII
Tatsuya TAKEHISA, Hiroki NOGAWA, Masakatu MORII
A new attack on the KMOVcryptosystem
Abderrahmane Nitaj
Abderrahmane Nitaj
Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi
Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings
Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Linear Cryptanalysis of PRINTcipher --- Trails and Samples Everywhere
Martin Ågren, Thomas Johansson
Martin Ågren, Thomas Johansson
Improved Analysis of ECHO-256
Jérémy Jean, María Naya-Plasencia, Martin Schläffer
Jérémy Jean, María Naya-Plasencia, Martin Schläffer
Superposition Attacks on Cryptographic Protocols
Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail
Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail
Unaligned Rebound Attack - Application to Keccak
Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
On the security of a certificateless short signature scheme
Miaomiao Tian, Liusheng Huang, Wei Yang
Miaomiao Tian, Liusheng Huang, Wei Yang
An efficient RFID mutual authentication scheme based on ECC
Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin
Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin
New Data-Efficient Attacks on Reduced-Round IDEA
Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir
Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir
Efficient Parallelization of Lanczos Type Algorithms
Ilya Popovyan
Ilya Popovyan
On the Access Structures of Hyperelliptic Secret Sharing
Lei Li, Siman Yang
Lei Li, Siman Yang
Fuzzy Identity Based Encryption from Lattices
Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols - Extended Version
Thomas Roche, Emmanuel Prouff
Thomas Roche, Emmanuel Prouff
Automatic Insertion of DPA Countermeasures
Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
Comments on a password authentication and update scheme based on elliptic curve cryptography
Debiao He
Debiao He
Functional Encryption for Inner Product Predicates from Learning with Errors
Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
--Withdrawn--
Xiaoyuan Yang, Weiyi Cai, Xu An Wang
Xiaoyuan Yang, Weiyi Cai, Xu An Wang
Resettable Cryptography in Constant Rounds -- the Case of Zero Knowledge
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung
Oblivious RAM with O((log N)^3) Worst-Case Cost
Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li
Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li
Composition Theorems Without Pre-Established Session Identifiers
Ralf Kuesters, Max Tuengerthal
Ralf Kuesters, Max Tuengerthal
Can Homomorphic Encryption be Practical?
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanathan
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanathan
A constant-round resettably-sound resettable zero-knowledge argument in the BPK model
Seiko Arita
Seiko Arita
A Fair Evaluation Framework for Comparing Side-Channel Distinguishers
Carolyn Whitnall, Elisabeth Oswald
Carolyn Whitnall, Elisabeth Oswald
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles
Essam Ghadafi
Essam Ghadafi
Pseudorandom Functions and Lattices
Abhishek Banerjee, Chris Peikert, Alon Rosen
Abhishek Banerjee, Chris Peikert, Alon Rosen
On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$
Gérard Cohen, Jean-Pierre Flori
Gérard Cohen, Jean-Pierre Flori
Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic
Luk Bettale, Jean-Charles Faugère, Ludovic Perret
Luk Bettale, Jean-Charles Faugère, Ludovic Perret
Hardness of Learning Problems over Burnside Groups of Exponent 3
Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III
Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III
The n-Diffie-Hellman Problem and its Applications
Liqun Chen, Yu Chen
Liqun Chen, Yu Chen
Fair Computation with Rational Players
Amos Beimel, Adam Groce, Jonathan Katz, Ilan Orlov
Amos Beimel, Adam Groce, Jonathan Katz, Ilan Orlov
Improved Anonymity for Key-Trees
Michael Beye, Thijs Veugen
Michael Beye, Thijs Veugen
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument
Helger Lipmaa, Bingsheng Zhang
Helger Lipmaa, Bingsheng Zhang
Analysis and Improvement of Thing's Time-Memory Trade-Off Attack
Zhenqi Li, Dongdai Lin, Wenhao Wang
Zhenqi Li, Dongdai Lin, Wenhao Wang
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)
Yun Zhang, Christophe Tartary, Huaxiong Wang
Yun Zhang, Christophe Tartary, Huaxiong Wang
On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism
Amir Moradi, Markus Kasper, Christof Paar
Amir Moradi, Markus Kasper, Christof Paar
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs
Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
Spatial Encryption
Mike Hamburg
Mike Hamburg
Modulus Fault Attacks Against RSA-CRT Signatures
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi
Analysis of the Parallel Distinguished Point Tradeoff
Jin Hong, Ga Won Lee, Daegun Ma
Jin Hong, Ga Won Lee, Daegun Ma
How to share secrets simultaneously
Laszlo Csirmaz
Laszlo Csirmaz
Efficient Implementation of Grand Cru with TI C6x+ Processor
Azhar Ali Khan, Ghulam Murtaza
Azhar Ali Khan, Ghulam Murtaza
Distributed Oblivious RAM for Secure Two-Party Computation
Steve Lu, Rafail Ostrovsky
Steve Lu, Rafail Ostrovsky
A representation of the $p$-sylow subgroup of $\perm(\F_p^n)$ and a cryptographic application
Stefan Maubach
Stefan Maubach
Generic Fully Simulatable Adaptive Oblivious Transfer
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu
Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis
Carolyn Whitnall, Elisabeth Oswald, Luke Mather
Carolyn Whitnall, Elisabeth Oswald, Luke Mather
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Miaomiao Tian, Wei Yang, Liusheng Huang
Miaomiao Tian, Wei Yang, Liusheng Huang
A generalization of the Lucas addition chains
Amadou TALL
Amadou TALL
Improved Generalized Birthday Attack
Paul Kirchner
Paul Kirchner
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check
Julien Bringer, Alain Patey
Julien Bringer, Alain Patey
Complexity of universal access structures
Laszlo Csirmaz
Laszlo Csirmaz
Restoring the Differential Resistance of MD6
Ethan Heilman
Ethan Heilman
An efficient characterization of a family of hyperbent functions with multiple trace terms
Jean-Pierre Flori, Sihem Mesnager
Jean-Pierre Flori, Sihem Mesnager
Identity based signcryption schemes without random oracles
Prashant Kushwah, Sunder Lal
Prashant Kushwah, Sunder Lal
Monoidic Codes in Cryptography
Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
Socio-Rational Secret Sharing as a New Direction in Rational Cryptography
Mehrdad Nojoumian, Douglas R. Stinson
Mehrdad Nojoumian, Douglas R. Stinson
Storing Secrets on Continually Leaky Devices
Yevgeniy Dodis, Allison Lewko, Brent Waters, Daniel Wichs
Yevgeniy Dodis, Allison Lewko, Brent Waters, Daniel Wichs
High-speed high-security signatures
Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang
Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang
Decoding One Out of Many
Nicolas Sendrier
Nicolas Sendrier
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
Deng Tang, Claude Carlet, Xiaohu Tang
Deng Tang, Claude Carlet, Xiaohu Tang
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Debiao He
Debiao He
The Value $4$ of Binary Kloosterman Sums
Jean-Pierre Flori, Sihem Mesnager, Gérard Cohen
Jean-Pierre Flori, Sihem Mesnager, Gérard Cohen
Dynamic Group Blind Signatures
Essam Ghadafi
Essam Ghadafi
Practically Efficient Proof of Retrievability in Cloud Storage
Jia XU, Ee-Chien CHANG
Jia XU, Ee-Chien CHANG
The Exact Security of a Stateful IBE and New Compact Stateful PKE Schemes
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
Certificateless Aggregate Signcryption Schemes
Ziba Eslami, Nasrollah Pakniat
Ziba Eslami, Nasrollah Pakniat
High-Entropy Visual Identification for Touch Screen Devices
Nathaniel Wesley Filardo, Giuseppe Ateniese
Nathaniel Wesley Filardo, Giuseppe Ateniese
Constructing a Ternary FCSR with a Given Connection Integer
Lin Zhiqiang, Pei Dingyi
Lin Zhiqiang, Pei Dingyi
Generalized Learning Problems and Applications to Non-Commutative Cryptography
Gilbert Baumslag, Nelly Fazio, Antonio R. Nicolosi, Vladimir Shpilrain, William E. Skeith III
Gilbert Baumslag, Nelly Fazio, Antonio R. Nicolosi, Vladimir Shpilrain, William E. Skeith III
An Efficient Attack on All Concrete KKS Proposals
Ayoub Otmani, Jean-Pierre Tillich
Ayoub Otmani, Jean-Pierre Tillich
On the (Non-)Equivalence of UC Security Notions
Oana Ciobotaru
Oana Ciobotaru
A coprocessor for secure and high speed modular arithmetic
Nicolas Guillermin
Nicolas Guillermin
Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi, Shigeo Tsujii
Masahito Gotaishi, Shigeo Tsujii
Bi-Deniable Public-Key Encryption
Adam O'Neill, Chris Peikert, Brent Waters
Adam O'Neill, Chris Peikert, Brent Waters
Cryptanalysis of the $AA_{\beta}$ Cryptosystem based on Linear Diophantine Equation Discrete Log Problem
Yanbin Pan, Yingpu Deng
Yanbin Pan, Yingpu Deng
$HB^N$: An HB-like protocol secure against man-in-the-middle attacks
Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi
Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi
Efficient Methods for Exploiting Faults Induced at AES Middle Rounds
Chong Hee Kim
Chong Hee Kim
Extractors Against Side-Channel Attacks: Weak or Strong?
Marcel Medwed, Francois-Xavier Standaert
Marcel Medwed, Francois-Xavier Standaert
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Debiao He
Debiao He
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
Hai Huang
Hai Huang
LBlock: A Lightweight Block Cipher *
Wenling Wu, Lei Zhang
Wenling Wu, Lei Zhang
Efficient Fully Homomorphic Encryption from (Standard) LWE
Zvika Brakerski, Vinod Vaikuntanathan
Zvika Brakerski, Vinod Vaikuntanathan
Another Look at Security Definitions
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
A Domain Transformation for Structure-Preserving Signatures on Group Elements
Melissa Chase, Markulf Kohlweiss
Melissa Chase, Markulf Kohlweiss
An Improved Internet Voting Protocol
Mehmet Sabir Kiraz, Süleyman Kardaş, Muhammed Ali Bingöl, Fatih Birinci
Mehmet Sabir Kiraz, Süleyman Kardaş, Muhammed Ali Bingöl, Fatih Birinci
Encrypting More Information in Visual Cryptography Scheme
Feng Liu, Peng Li, ChuanKun Wu
Feng Liu, Peng Li, ChuanKun Wu
Careful with Composition: Limitations of Indifferentiability and Universal Composability
Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton
Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton
Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves
Matthieu Rivain
Matthieu Rivain
Functional Re-encryption and Collusion-Resistant Obfuscation
Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan
Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan
Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
Debiao He
Debiao He
New look at impossibility result on Dolev-Yao models with hashes
István Vajda
István Vajda
On the Efficient Implementation of Pairing-Based Protocols
Michael Scott
Michael Scott
Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He
Debiao He
A depth-16 circuit for the AES S-box
Joan Boyar, Rene Peralta
Joan Boyar, Rene Peralta
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Nasour Bagheri, Majid Naderi
Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Nasour Bagheri, Majid Naderi
Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme
Ashish Choudhury
Ashish Choudhury
Hardness of Computing Individual Bits for One-way Functions on Elliptic Curves
Alexandre Duc, Dimitar Jetchev
Alexandre Duc, Dimitar Jetchev
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption
Gu Chunsheng
Gu Chunsheng
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
SGCM: The Sophie Germain Counter Mode
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm
Aram Jivanyan, Gurgen Khachatryan
Aram Jivanyan, Gurgen Khachatryan
On the Efficiency of Bit Commitment Reductions
Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger
Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
Shusheng Liu, Libin Wang, Zheng Gong
Shusheng Liu, Libin Wang, Zheng Gong
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
Carolyn Whitnall, Elisabeth Oswald
Carolyn Whitnall, Elisabeth Oswald
A Formal Approach to Distance-Bounding RFID Protocols
Ulrich Duerholz, Marc Fischlin, Michael Kasper, Cristina Onete
Ulrich Duerholz, Marc Fischlin, Michael Kasper, Cristina Onete
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
Manan Nayak, Shashank Agrawal, Kannan Srinathan
Manan Nayak, Shashank Agrawal, Kannan Srinathan
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
Scalar Multiplication on Koblitz Curves using $\tau^2-$NAF
Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga
Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga
Two Simple Code-Verification Voting Protocols
Helger Lipmaa
Helger Lipmaa
Security of Blind Signatures Revisited
Dominique Schröder, Dominique Unruh
Dominique Schröder, Dominique Unruh
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0
Zhi Hu, Patrick Longa, Maozhi Xu
Zhi Hu, Patrick Longa, Maozhi Xu
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi
Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi
Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity
Arpita Patra
Arpita Patra
Differential Cryptanalysis of GOST
Nicolas T. Courtois, Michal Misztal
Nicolas T. Courtois, Michal Misztal
Targeted Malleability: Homomorphic Encryption for Restricted Computations
Dan Boneh, Gil Segev, Brent Waters
Dan Boneh, Gil Segev, Brent Waters
Universally Composable Synchronous Computation
Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
On Constructing Homomorphic Encryption Schemes from Coding Theory
Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi
Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi
Provably Secure and Practical Onion Routing
Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
Ways to restrict the differential path
ZiJie Xu, Ke Xu
ZiJie Xu, Ke Xu
Group Law Computations on Jacobians of Hyperelliptic Curves
Craig Costello, Kristin Lauter
Craig Costello, Kristin Lauter
A new attack on Jakobsson Hybrid Mix-Net
Seyyed Amir Mortazavi
Seyyed Amir Mortazavi
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
Jia XU
Jia XU
GNUC: A New Universal Composability Framework
Dennis Hofheinz, Victor Shoup
Dennis Hofheinz, Victor Shoup
Univariate Side Channel Attacks and Leakage Modeling
Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
Ronald Cramer, Ivan Damgard, Valerio Pastro
Ronald Cramer, Ivan Damgard, Valerio Pastro
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
Cas Cremers, Michele Feltz
Cas Cremers, Michele Feltz
Modes of Operations for Encryption and Authentication Using Stream Ciphers Supporting an Initialisation Vector
Palash Sarkar
Palash Sarkar
Local limit theorem for large deviations and statistical box-tests
Igor Semaev
Igor Semaev
NEW STATISTICAL BOX-TEST AND ITS POWER
Igor Semaev, Mehdi M. Hassanzadeh
Igor Semaev, Mehdi M. Hassanzadeh
Short Signatures From Weaker Assumptions
Dennis Hofheinz, Tibor Jager, Eike Kiltz
Dennis Hofheinz, Tibor Jager, Eike Kiltz
Counting Points on Genus 2 Curves with Real Multiplication
P. Gaudry, D. Kohel, B. Smith
P. Gaudry, D. Kohel, B. Smith
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf
Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han
W. Han
On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve
Namhun Koo, Gooc Hwa Jo, Soonhak Kwon
Namhun Koo, Gooc Hwa Jo, Soonhak Kwon
Leakage-Resilient Coin Tossing
Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai
Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai
Some Results Concerning Generalized Bent Functions
Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh
Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh
Polly Cracker, Revisited
Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret
Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks
Ashish Choudhury, Arpita Patra
Ashish Choudhury, Arpita Patra
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
Stanislav Bulygin
Stanislav Bulygin
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
Exploiting Linear Hull in Matsui’s Algorithm 1 (extended version)
Andrea Röck, Kaisa Nyberg
Andrea Röck, Kaisa Nyberg
On the Security of PPPoE Network
Fanbao Liu, Yumeng Feng, Yuan Cao
Fanbao Liu, Yumeng Feng, Yuan Cao
The Fault Attack ECDLP Revisited
Mingqiang Wang, Xiaoyun Wang, Tao Zhan
Mingqiang Wang, Xiaoyun Wang, Tao Zhan
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
Computational Verifiable Secret Sharing Revisited
Michael Backes, Aniket Kate, Arpita Patra
Michael Backes, Aniket Kate, Arpita Patra
DDH-like Assumptions Based on Extension Rings
Ronald Cramer, Ivan Damgaard, Eike Kiltz, Sarah Zakarias, Angela Zottarel
Ronald Cramer, Ivan Damgaard, Eike Kiltz, Sarah Zakarias, Angela Zottarel
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
Craig Gentry, Shai Halevi
Craig Gentry, Shai Halevi
Comparing Different Definitions of Secure Session
Can Zhang
Can Zhang
Fully Homomorphic Encryption without Bootstrapping
Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan
Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan
Analysis of the SSH Key Exchange Protocol
Stephen C. Williams
Stephen C. Williams
Inverting the Square systems is exponential
Jintai Ding
Jintai Ding
A Splice-and-Cut Cryptanalysis of the AES
Dmitry Khovratovich, Christian Rechberger
Dmitry Khovratovich, Christian Rechberger
Memory Delegation
Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
Outsourcing Multi-Party Computation
Seny Kamara, Payman Mohassel, Mariana Raykova
Seny Kamara, Payman Mohassel, Mariana Raykova
Practical Key-recovery For All Possible Parameters of SFLASH
Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat
Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat
Programmable Hash Functions and Their Applications
Dennis Hofheinz, Eike Kiltz
Dennis Hofheinz, Eike Kiltz
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare, Sriram Keelveedhi
Mihir Bellare, Sriram Keelveedhi
Birthday Forgery Attack on 128-EIA3 Version 1.5
Raja Zeshan Haider
Raja Zeshan Haider
Mutual Private Set Intersection with Linear Complexity
Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
Identity-Based Decryption
Daniel R. L. Brown
Daniel R. L. Brown
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol
Qiushi Yang, Yvo Desmedt
Qiushi Yang, Yvo Desmedt
Round Optimal Blind Signatures
Dominique Schröder, Dominique Unruh
Dominique Schröder, Dominique Unruh
The Computational Square-Root Exponent Problem- Revisited
Fangguo Zhang
Fangguo Zhang
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner
Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
Danilo Gligoroski, Rune Steinsmo Ødeård, Rune Erlend Jensen
Danilo Gligoroski, Rune Steinsmo Ødeård, Rune Erlend Jensen
Security \& Indistinguishability in the Presence of Traffic Analysis
Cristina Onete, Daniele Venturi
Cristina Onete, Daniele Venturi
Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski
Douglas R. Stinson
Douglas R. Stinson
A High Speed Pairing Coprocessor Using RNS and Lazy Reduction
Gavin Xiaoxu Yao, Junfeng Fan, Ray C. C. Cheung, Ingrid Verbauwhede
Gavin Xiaoxu Yao, Junfeng Fan, Ray C. C. Cheung, Ingrid Verbauwhede
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein
Leakage Resilient Secure Two-Party Computation
Ivan Damgaard, Carmit Hazay, Arpita Patra
Ivan Damgaard, Carmit Hazay, Arpita Patra
Hiding the Policy in Cryptographic Access Control
Sascha Müller, Stefan Katzenbeisser
Sascha Müller, Stefan Katzenbeisser
Using the Cloud to Determine Key Strengths
T. Kleinjung, A. K. Lenstra, D. Page, N. P. Smart
T. Kleinjung, A. K. Lenstra, D. Page, N. P. Smart
Attack Cryptosystems Based on HCDLP
Mingqiang Wang, Xiaoyun Wang, Tao Zhan
Mingqiang Wang, Xiaoyun Wang, Tao Zhan
Cryptography Secure Against Related-Key Attacks and Tampering
Mihir Bellare, David Cash, Rachel Miller
Mihir Bellare, David Cash, Rachel Miller
Concurrently Secure Computation in Constant Rounds
Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
A Parallel Repetition Theorem for Leakage Resilience
Zvika Brakerski, Yael Tauman Kalai
Zvika Brakerski, Yael Tauman Kalai
Breaking a certificateless key agreement protocol withour bilinear pairing
W. Han
W. Han
Fast Password Recovery Attack: Application to APOP
Fanbao Liu, Yi Liu, Tao Xie, Yumeng Feng
Fanbao Liu, Yi Liu, Tao Xie, Yumeng Feng
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
Qi Chai, Xinxin Fan, Guang Gong
Qi Chai, Xinxin Fan, Guang Gong
A Framework for Secure Single Sign-On
Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli
Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli
On the Number of Carries Occuring in an Addition $\mod 2^k-1$
Jean-Pierre Flori, Hugues Randriam
Jean-Pierre Flori, Hugues Randriam
PRISM -- Privacy-Preserving Search in MapReduce
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Onen
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Onen
Affine Pairings on ARM
Tolga Acar, Kristin Lauter, Michael Naehrig, Daniel Shumow
Tolga Acar, Kristin Lauter, Michael Naehrig, Daniel Shumow
Cryptanalysis of KeeLoq code-hopping using a Single FPGA
Idan Sheetrit, Avishai Wool
Idan Sheetrit, Avishai Wool
A Novel Adaptive Proactive Secret Sharing without a Trusted Party
Xiuqun Wang
Xiuqun Wang
Universal Composability from Essentially Any Trusted Setup
Mike Rosulek
Mike Rosulek
Efficient Software Implementations of Modular Exponentiation
Shay Gueron
Shay Gueron
Attacks On a Double Length Blockcipher-based Hash Proposal
Yiyuan Luo, Xuejia Lai
Yiyuan Luo, Xuejia Lai
The block cipher NSABC (public domain)
Alice Nguyenova-Stepanikova, Tran Ngoc Duong
Alice Nguyenova-Stepanikova, Tran Ngoc Duong
Using Templates to Distinguish Multiplications from Squaring Operations
Neil Hanley, Michael Tunstall, William P. Marnane
Neil Hanley, Michael Tunstall, William P. Marnane
Computer-Aided Decision-Making with Trust Relations and Trust Domains (Cryptographic Applications)
Simon Kramer, Rajeev Goré, Eiji Okamoto
Simon Kramer, Rajeev Goré, Eiji Okamoto
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
Debiao He
Debiao He
Correlated-Input Secure Hash Functions
Vipul Goyal, Adam O'Neill, Vanishree Rao
Vipul Goyal, Adam O'Neill, Vanishree Rao
Remote Timing Attacks are Still Practical
Billy Bob Brumley, Nicola Tuveri
Billy Bob Brumley, Nicola Tuveri
History-Free Sequential Aggregate Signatures
Marc Fischlin, Anja Lehmann, Dominique Schröder
Marc Fischlin, Anja Lehmann, Dominique Schröder
All-But-Many Lossy Trapdoor Functions
Dennis Hofheinz
Dennis Hofheinz
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
Md. Golam Kaosar
Md. Golam Kaosar
A Framework for Practical Universally Composable Zero-Knowledge Protocols
Jan Camenisch, Stephan Krenn, Victor Shoup
Jan Camenisch, Stephan Krenn, Victor Shoup
Robust parent-identifying codes and combinatorial arrays
Alexander Barg, Grigory Kabatiansky
Alexander Barg, Grigory Kabatiansky
Substitution-permutation networks, pseudorandom functions, and Natural Proofs
Eric Miles, Emanuele Viola
Eric Miles, Emanuele Viola
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry
Shaohua Tang, Jintai Ding, Yujun Liang
Shaohua Tang, Jintai Ding, Yujun Liang
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme
Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang
Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang
A Perfectly Binding Commitment Scheme Against Quantum Attacks
Zeng Bing, Chen Liang, Tang Xueming
Zeng Bing, Chen Liang, Tang Xueming
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
Kyle Brogle, Sharon Goldberg, Leonid Reyzin
Kyle Brogle, Sharon Goldberg, Leonid Reyzin
Protecting Drive Encryption Systems Against Memory Attacks
Leo Dorrendorf
Leo Dorrendorf
Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks
István Vajda
István Vajda
On the Security of TLS-DHE in the Standard Model
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Cryptographic Analysis of All 4 x 4 - Bit S-Boxes
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Identity Based Deterministic Signature Scheme Without Forking-Lemma
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang, Lingling Xu, Niu Liu, Jintai Ding, Zhiming Yang
Shaohua Tang, Lingling Xu, Niu Liu, Jintai Ding, Zhiming Yang
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
M. Barbosa, P. Farshim
M. Barbosa, P. Farshim
On ``identities'', ``names'', ``NAMES'', ``ROLES'' and Security: A Manifesto
Charles Rackoff
Charles Rackoff
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
Maiorana-McFarland Functions with High Second-Order Nonlinearity
Nicholas Kolokotronis, Konstantinos Limniotis
Nicholas Kolokotronis, Konstantinos Limniotis
Security Evaluation of GOST 28147-89 In View Of International Standardisation
Nicolas T. Courtois
Nicolas T. Courtois
The preimage security of double-block-length compression functions
Jooyoung Lee, Martijn Stam, John Steinberger
Jooyoung Lee, Martijn Stam, John Steinberger
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Zvika Brakerski, Gil Segev
Zvika Brakerski, Gil Segev
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy
Jian Weng, Yunlei Zhao
Jian Weng, Yunlei Zhao
Proofs of Ownership in Remote Storage Systems
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
Isomorphism classes of Edwards curves over finite fields
R. Farashahi, D. Moody, H. Wu
R. Farashahi, D. Moody, H. Wu
Group-oriented ring signature
Chunbo Ma, Jun Ao
Chunbo Ma, Jun Ao
Leakage Tolerant Interactive Protocols
Nir Bitansky, Ran Canetti, Shai Halevi
Nir Bitansky, Ran Canetti, Shai Halevi
Key agreement based on homomorphisms of algebraic structures
Juha Partala
Juha Partala
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling
Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version)
Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
An efficient deterministic test for Kloosterman sum zeros
Omran Ahmadi, Robert Granger
Omran Ahmadi, Robert Granger
Terminating BKZ
Guillaume Hanrot, Xavier Pujol, Damien Stehlé
Guillaume Hanrot, Xavier Pujol, Damien Stehlé
Public Key Encryption for the Forgetful
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, S. M. Yiu
Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, S. M. Yiu
An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
Debiao He, Yitao Chen
Debiao He, Yitao Chen
Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
Security Analysis of $LMAP^{++}$, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya
Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya
Short and Efficient Certificate-Based Signature
Joseph K. Liu, Feng Bao, Jianying Zhou
Joseph K. Liu, Feng Bao, Jianying Zhou
On the Security of the Winternitz One-Time Signature Scheme
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS
Peng Xu, Hai Jin
Peng Xu, Hai Jin
SIMPL Systems as a Keyless Cryptographic and Security Primitive
Ulrich Rührmair
Ulrich Rührmair
Physical Turing Machines and the Formalization of Physical Cryptography
Ulrich Rührmair
Ulrich Rührmair
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
Hyung Tae Lee, Jung Hee Cheon, Jin Hong
Hyung Tae Lee, Jung Hee Cheon, Jin Hong
Some aspects of multi-variable secret sharing
Umadevi Ganugula, Prabal Paul
Umadevi Ganugula, Prabal Paul
Efficient and Secure Data Storage Operations for Mobile Cloud Computing
Zhibin Zhou, Dijiang Huang
Zhibin Zhou, Dijiang Huang
Fortification of AES with Dynamic Mix-Column Transformation
Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aqeel Farooqi
Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aqeel Farooqi
Elliptic Curve Point Multiplication Using MBNR and Point Halving
G. N. Purohit, Asmita SIngh Rawat
G. N. Purohit, Asmita SIngh Rawat
Designated Confirmer Signatures With Unified Verification
Guilin Wang, Fubiao Xia, Yunlei Zhao
Guilin Wang, Fubiao Xia, Yunlei Zhao
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack
Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
Yehuda Lindell
Yehuda Lindell
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
Edoardo Persichetti
Edoardo Persichetti
Differential Fault Analysis of AES: Toward Reducing Number of Faults
Chong Hee KIM
Chong Hee KIM
Dynamic MDS Matrices for Substantial Cryptographic Strength
Muhammad Yasir Malik, Jong-Seon No
Muhammad Yasir Malik, Jong-Seon No
A FPGA pairing implementation using the Residue Number System
Sylvain Duquesne, Nicolas Guillermin
Sylvain Duquesne, Nicolas Guillermin
Analysis of reduced-SHAvite-3-256 v2
Marine Minier, Maria Naya-Plasencia, Thomas Peyrin
Marine Minier, Maria Naya-Plasencia, Thomas Peyrin
On-line secret sharing
Laszlo Csirmaz, Gabor Tardos
Laszlo Csirmaz, Gabor Tardos
An efficient certificateless short signature scheme from pairings
Debiao He, Jianhua Chen
Debiao He, Jianhua Chen
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
T. V. Laptyeva, S. Flach, K. Kladko
T. V. Laptyeva, S. Flach, K. Kladko
On lower bounds on second--order nonliearities of bent functions obtained by using Niho power functions
Manish Garg, Sugata Gangopadhyay
Manish Garg, Sugata Gangopadhyay
Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication
Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López
Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López
Identity-Based Cryptography for Cloud Security
Hongwei Li, Yuanshun Dai, Bo Yang
Hongwei Li, Yuanshun Dai, Bo Yang
A Commitment-Consistent Proof of a Shuffle
Douglas Wikström
Douglas Wikström
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin
Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
Jeremy Clark, Urs Hengartner
Jeremy Clark, Urs Hengartner
Improved Side Channel Cube Attacks on PRESENT
XinJie Zhao, Tao Wang, ShiZe Guo
XinJie Zhao, Tao Wang, ShiZe Guo
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
Improved Integral Attacks on Reduced Round Camellia
Yanjun Li, Wenling Wu, Liting Zhang, Lei Zhang
Yanjun Li, Wenling Wu, Liting Zhang, Lei Zhang
Collision Timing Attack when Breaking 42 AES ASIC Cores
Amir Moradi, Oliver Mischke, Christof Paar
Amir Moradi, Oliver Mischke, Christof Paar
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Francisco Rodriguez-Henriquez, Palash Sarkar
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Francisco Rodriguez-Henriquez, Palash Sarkar
Cryptanalysis of ARMADILLO2
Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
The Block Cipher Thuca
Isaiah Makwakwa
Isaiah Makwakwa
Enhancing Data Privacy in the Cloud
Yanbin Lu, Gene Tsudik
Yanbin Lu, Gene Tsudik
Secure Computation on the Web: Computing without Simultaneous Interaction
Shai Halevi, Yehuda Lindell, Benny Pinkas
Shai Halevi, Yehuda Lindell, Benny Pinkas
Strong Forward Security in Identity-Based Signcryption
Madeline González Muñiz, Peeter Laud
Madeline González Muñiz, Peeter Laud
High-speed Hardware Implementation of Rainbow Signatures on FPGAs
Shaohua Tang, Haibo Yi, Huan Chen, Guomin Chen, Jintai Ding
Shaohua Tang, Haibo Yi, Huan Chen, Guomin Chen, Jintai Ding
The Block Cipher Vuna
Isaiah Makwakwa
Isaiah Makwakwa
Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices
Jingguo Bi, Qi Cheng
Jingguo Bi, Qi Cheng
A Practical Application of Differential Privacy to Personalized Online Advertising
Yehuda Lindell, Eran Omri
Yehuda Lindell, Eran Omri
Direct Exponent and Scalar Multiplication Classes of an MDS Matrix
G. Murtaza, N. Ikram
G. Murtaza, N. Ikram
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen
Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen
Generic Side-Channel Distinguishers: Improvements and Limitations
Nicolas Veyrat-Charvillon, François-Xavier Standaert
Nicolas Veyrat-Charvillon, François-Xavier Standaert
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Hongbo Yu, Jiazhe Chen, Keting jia, Xiaoyun Wang
Hongbo Yu, Jiazhe Chen, Keting jia, Xiaoyun Wang
The Optimal Linear Secret Sharing Scheme for Any Given Access Structure
Tang Chunming, Gao Shuhong, Zhang Chengli
Tang Chunming, Gao Shuhong, Zhang Chengli
ECDLP on GPU
Lei Xu, Dongdai Lin, Jing Zou
Lei Xu, Dongdai Lin, Jing Zou
Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA{\beta}-cryptosystem
M. R. K. Ariffin, N. A. Abu
M. R. K. Ariffin, N. A. Abu
Deniable Encryption from the McEliece Assumptions
Bernardo M. David, Anderson C. A. Nascimento
Bernardo M. David, Anderson C. A. Nascimento
Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus~$2$ curves
Romain Cosset, Damien Robert
Romain Cosset, Damien Robert
A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2^n)
Haibo Yi, Shaohua Tang, Huan Chen, Guomin Chen
Haibo Yi, Shaohua Tang, Huan Chen, Guomin Chen
Fast and Private Computation of Cardinality of Set Intersection and Union
Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
Martin Ågren
Martin Ågren
Shortest Lattice Vectors in the Presence of Gaps
Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng
Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng
Constant-Round Privacy Preserving Multiset Union
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
Towards a Game Theoretic View of Secure Computation
Gilad Asharov, Ran Canetti, Carmit Hazay
Gilad Asharov, Ran Canetti, Carmit Hazay
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
Gilad Asharov, Yehuda Lindell
Gilad Asharov, Yehuda Lindell
On isogeny classes of Edwards curves over finite fields
Omran Ahmadi, Robert Granger
Omran Ahmadi, Robert Granger
Differentially Private Billing with Rebates
George Danezis, Markulf Kohlweiss, Alfredo Rial
George Danezis, Markulf Kohlweiss, Alfredo Rial
Fully Homomorphic SIMD Operations
N. P. Smart, F. Vercauteren
N. P. Smart, F. Vercauteren
Verifiable Delegation of Computation over Large Datasets
Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis
Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis
Trapdoor oneway functions associated with exponentiation
Virendra Sule
Virendra Sule
Ergodic Theory Over ${\F}_2[[T]]$
Dongdai Lin, Tao Shi, Zifeng Yang
Dongdai Lin, Tao Shi, Zifeng Yang
Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, Srdjan Capkun
Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, Srdjan Capkun
The Ligo Block Cipher
Isaiah Makwakwa
Isaiah Makwakwa
Integer Arithmetic without Arithmetic Addition
Gideon Samid
Gideon Samid
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith
Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)$\Sigma$PKC
Masao KASAHARA
Masao KASAHARA
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I)
Masao KASAHARA
Masao KASAHARA
Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers
Andrey Bogdanov, Vincent Rijmen
Andrey Bogdanov, Vincent Rijmen
Secure Multi-Party Sorting and Applications
Kristjän Valur Jönsson, Gunnar Kreitz, Misbah Uddin
Kristjän Valur Jönsson, Gunnar Kreitz, Misbah Uddin
More Practical Fully Homomorphic Encryption
Gu Chunsheng
Gu Chunsheng
Faster 2-regular information-set decoding
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
Multiplicative Learning with Errors and Cryptosystems
Gu Chunsheng
Gu Chunsheng
New Fully Homomorphic Encryption over the Integers
Gu Chunsheng
Gu Chunsheng
Bounded Vector Signatures and their Applications
Lei Wei, Scott E. Coull, Michael K. Reiter
Lei Wei, Scott E. Coull, Michael K. Reiter
Short-output universal hash functions and their use in fast and secure message authentication
Long Hoang Nguyen, Andrew William Roscoe
Long Hoang Nguyen, Andrew William Roscoe
Multiple Differential Cryptanalysis: Theory and Practice (Corrected)
Céline Blondeau, Benoît Gérard
Céline Blondeau, Benoît Gérard
Fully Homomorphic Encryption, Approximate Lattice Problem and LWE
Gu Chunsheng
Gu Chunsheng
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
An efficient certificateless two-party authenticated key agreement scheme from pairings
Debiao He, Jin Hu
Debiao He, Jin Hu
Generalizations of Bent Functions. A Survey
Natalia Tokareva
Natalia Tokareva
Fully Homomorphic Encryption over the Binary Polynomials
Gu Chunsheng
Gu Chunsheng
Secure Blind Decryption
Matthew Green
Matthew Green
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation
Jannik Dreier, Florian Kerschbaum
Jannik Dreier, Florian Kerschbaum
Threshold Encryption into Multiple Ciphertexts
Martin Stanek
Martin Stanek
Common Randomness and Secret Key Capacities of Two-way Channels
Hadi Ahmadi, Reihaneh Safavi-Naini
Hadi Ahmadi, Reihaneh Safavi-Naini
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation
S. Erickson, M. J. Jacobson Jr., A. Stein
S. Erickson, M. J. Jacobson Jr., A. Stein
Unconditionally Secure Signature Schemes Revisited
Colleen M. Swanson, Douglas R. Stinson
Colleen M. Swanson, Douglas R. Stinson
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
István Vajda
István Vajda
Optimal and Parallel Online Memory Checking
Charalampos Papamanthou, Roberto Tamassia
Charalampos Papamanthou, Roberto Tamassia
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
A Novel Group Signature Scheme Based on MPKC
Guangdong Yang, Shaohua Tang, Li Yang
Guangdong Yang, Shaohua Tang, Li Yang
Can Code Polymorphism Limit Information Leakage?
Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall
Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall
Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields
M. D. Velichka, M. J. Jacobson Jr., A. Stein
M. D. Velichka, M. J. Jacobson Jr., A. Stein
Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture
Shi Pu, Pu Duan, Jyh-Charn Liu
Shi Pu, Pu Duan, Jyh-Charn Liu
Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
ALRED Blues: New Attacks on AES-Based MAC's
Orr Dunkelman, Nathan Keller, Adi Shamir
Orr Dunkelman, Nathan Keller, Adi Shamir
Graceful Degradation in Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
Linear Cryptanalysis Using Multiple Linear Approximations
Miia Hermelin, Kaisa Nyberg
Miia Hermelin, Kaisa Nyberg
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
Akinori Kawachi, Christopher Portmann, Keisuke Tanaka
Akinori Kawachi, Christopher Portmann, Keisuke Tanaka
A New Approach to Practical Active-Secure Two-Party Computation
Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra
Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
Yu Chen, Liqun Chen, Zhong Chen
Yu Chen, Liqun Chen, Zhong Chen
Octal Bent Generalized Boolean Functions
Pantelimon Stanica, Thor Martinsen
Pantelimon Stanica, Thor Martinsen
Leftover Hash Lemma, Revisited
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert, Yu Yu
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert, Yu Yu
On the Instantiability of Hash-and-Sign RSA Signatures
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher
Xin-jie Zhao, Tao Wang, Shi-ze Guo
Xin-jie Zhao, Tao Wang, Shi-ze Guo
Co-induction and Computational Semantics for Public-key Encryption with Key Cycles
Mohammad Hajiabadi, Bruce M. Kapron
Mohammad Hajiabadi, Bruce M. Kapron
Traitor Tracing against Public Collaboration (Full Version)
Xingwen Zhao, Fangguo Zhang
Xingwen Zhao, Fangguo Zhang
On the number of bent functions from iterative constructions: lower bounds and hypotheses
Natalia Tokareva
Natalia Tokareva
Does Pseudo-basis Extend to General Adversary?
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Secure Datastructures based on Multiparty Computation
Tomas Toft
Tomas Toft
Turbo Codes Can Be Asymptotically Information-Theoretically Secure
Xiao Ma
Xiao Ma
Identity-based Digital Signature Scheme Without Bilinear Pairings
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
DPA Leakage Evaluation and Countermeasure Plug-in
Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, Wu Qianhong
Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, Wu Qianhong
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
Maura B. Paterson, Douglas R. Stinson
Maura B. Paterson, Douglas R. Stinson
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Suleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingol, Huseyin Demirci
Suleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingol, Huseyin Demirci
Really fast syndrome-based hashing
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
Cryptanalysis of three matrix-based key establishment protocols
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
Information-theoretic Bounds for Differentially Private Mechanisms
Gilles Barthe, Boris Köpf
Gilles Barthe, Boris Köpf
Rational authentication protocols
Long H. Nguyen
Long H. Nguyen
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
Chao Ning, Qiuliang Xu
Chao Ning, Qiuliang Xu
Rational Secret Sharing with Honest Players over an Asynchronous Channel
William K. Moses Jr., C. Pandu Rangan
William K. Moses Jr., C. Pandu Rangan
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves
Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski
Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
Markus Duermuth, David Mandell Freeman
Markus Duermuth, David Mandell Freeman
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
Carolin Lunemann, Jesper Buus Nielsen
Carolin Lunemann, Jesper Buus Nielsen
Cryptographic Treatment of Private User Profiles
Felix Günther, Mark Manulis, Thorsten Strufe
Felix Günther, Mark Manulis, Thorsten Strufe
Secret Keys from Channel Noise
Hadi Ahmadi, Reihaneh Safavi-Naini
Hadi Ahmadi, Reihaneh Safavi-Naini
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
Swapnoneel Roy, Amlan K Das, Yu Li
Swapnoneel Roy, Amlan K Das, Yu Li
Cryptanalysis of Some Protocols for RFID Systems
Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya
Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya
A Group Signature Scheme from Lattice Assumptions
S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan
S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan
Extending Baby-step Giant-step algorithm for FACTOR problem
Martin Stanek
Martin Stanek
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
Another Look at RSA Signatures With Affine Padding
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
Spectral Coherence Analysis - First Experimental Results -
Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon
Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC
Dongdai Lin, Jean-Charles Faugere, Ludovic Perret, Tianze Wang
Dongdai Lin, Jean-Charles Faugere, Ludovic Perret, Tianze Wang
Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Adaptive Pseudo-Free Groups and Applications
Dario Catalano, Dario Fiore, Bogdan Warinschi
Dario Catalano, Dario Fiore, Bogdan Warinschi
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
Alex Escala, Javier Herranz, Paz Morillo
Alex Escala, Javier Herranz, Paz Morillo
Towards Strong Adaptive Corruption Security of Authenticated Key Exchange
Zheng Yang
Zheng Yang
Authenticated Key Exchange with Synchronized State
Zheng Yang
Zheng Yang
Unbounded HIBE and Attribute-Based Encryption
Allison Lewko, Brent Waters
Allison Lewko, Brent Waters
A non-Abelian factorization problem and an associated cryptosystem
Srinath Baba, Srinivas Kotyad, Raghu Teja
Srinath Baba, Srinivas Kotyad, Raghu Teja
Constructing differential 4-uniform permutations from know ones
Yuyin Yu, Mingsheng Wang, Yongqiang Li
Yuyin Yu, Mingsheng Wang, Yongqiang Li
Lower and Upper Bounds for Deniable Public-Key Encryption
Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Farshid Farhat, Somayeh Salimi, Ahmad Salahi
Farshid Farhat, Somayeh Salimi, Ahmad Salahi
Fast Scalar Multiplication in ECC using The Multi base Number System.
G. N. Purohit, Asmita Singh Rawat
G. N. Purohit, Asmita Singh Rawat
Proxy Blind Multi-signature Scheme using ECC for handheld devices
Jayaprakash Kar
Jayaprakash Kar
Computing endomorphism rings of elliptic curves under the GRH
Gaetan Bisson
Gaetan Bisson
Reclaiming Privacy for Smartphone Applications (Revised Version)
Emiliano De Cristofaro, Anthony Durussel, Imad Aad
Emiliano De Cristofaro, Anthony Durussel, Imad Aad
Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves
Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
Fast point quadrupling on elliptic curves
Duc-Phong Le, Binh P Nguyen
Duc-Phong Le, Binh P Nguyen
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
Martin Albrecht, Carlos Cid
Martin Albrecht, Carlos Cid
Higher-Order Differential Attack on Reduced SHA-256
Mario Lamberger, Florian Mendel
Mario Lamberger, Florian Mendel
The Complexity Analysis of the MutantXL Family
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
A New Family of Implicitly Authenticated Diffie-Hellman Protocols
Andrew C. Yao, Yunlei Zhao
Andrew C. Yao, Yunlei Zhao
Secure Authentication from a Weak Key, Without Leaking Information
Niek J. Bouman, Serge Fehr
Niek J. Bouman, Serge Fehr
The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations
Jean-Marc Couveignes, Jean-Gabriel Kammerer
Jean-Marc Couveignes, Jean-Gabriel Kammerer
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski, Janusz Szmidt
Piotr Mroczkowski, Janusz Szmidt
Efficient Unconditional Asynchronous Byzantine Agreement with Optimal Resilience
Ashish Choudhury, Arpita Patra
Ashish Choudhury, Arpita Patra
Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains
Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs
Benjamin Gittins
Benjamin Gittins
The Parazoa Family: Generalizing the Sponge Hash Functions
Elena Andreeva, Bart Mennink, Bart Preneel
Elena Andreeva, Bart Mennink, Bart Preneel
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Private Discovery of Common Social Contacts
Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
Mihaela Ion, Giovanni Russello, Bruno Crispo
Mihaela Ion, Giovanni Russello, Bruno Crispo
Secure evaluation of polynomial using privacy ring homomorphisms
Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov
Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov
Improved zero-sum distinguisher for full round Keccak-f permutation
Ming Duan, Xuajia Lai
Ming Duan, Xuajia Lai
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT
Farzaneh Abazari, Babak Sadeghian
Farzaneh Abazari, Babak Sadeghian
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Jae Hong Seo, Jung Hee Cheon
Jae Hong Seo, Jung Hee Cheon
Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$
Antoine Joux, Vanessa Vitse
Antoine Joux, Vanessa Vitse
Collision Resistance of the JH Hash Function
Jooyoung Lee, Deukjo Hong
Jooyoung Lee, Deukjo Hong
Homomorphic Signatures for Polynomial Functions
Dan Boneh, David Mandell Freeman
Dan Boneh, David Mandell Freeman
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang
Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang
An Anonymous Health Care System
Melissa Chase, Kristin Lauter
Melissa Chase, Kristin Lauter
Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey
Jean-Philippe Aumasson
Jean-Philippe Aumasson
Unconditionally Reliable Message Transmission in Directed Neighbour Networks
Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
Secure Message Transmission In Asynchronous Directed Networks
Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption
Jens Groth
Jens Groth
After-the-Fact Leakage in Public-Key Encryption
Shai Halevi, Huijia Lin
Shai Halevi, Huijia Lin
Structured Encryption and Controlled Disclosure
Melissa Chase, Seny Kamara
Melissa Chase, Seny Kamara
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
Helger Lipmaa
Helger Lipmaa
Computing Elliptic Curve Discrete Logarithms with the Negation Map
Ping Wang, Fangguo Zhang
Ping Wang, Fangguo Zhang
KISS: A Bit Too Simple
Greg Rose
Greg Rose
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek
Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek
Is privacy compatible with truthfulness?
David Xiao
David Xiao
A low-memory algorithm for finding short product representations in finite groups
Gaetan Bisson, Andrew V. Sutherland
Gaetan Bisson, Andrew V. Sutherland
On the correct use of the negation map in the Pollard rho method
Daniel J. Bernstein, Tanja Lange, Peter Schwabe
Daniel J. Bernstein, Tanja Lange, Peter Schwabe
A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)
Gunnar Kreitz
Gunnar Kreitz
Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries
Zeng Bing, Tang Xueming, Xu Peng, Jing Jiandu
Zeng Bing, Tang Xueming, Xu Peng, Jing Jiandu
Security Evaluation of MISTY Structure with SPN Round Function
Ruilin Li, Chao Li, Jinshu Su, Bing Sun
Ruilin Li, Chao Li, Jinshu Su, Bing Sun
Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches
Brian J. Matt
Brian J. Matt
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation
Mark Manulis, Bertram Poettering
Mark Manulis, Bertram Poettering
ABC - A New Framework for Block Ciphers
Uri Avraham, Eli Biham, Orr Dunkelman
Uri Avraham, Eli Biham, Orr Dunkelman
On small secret key attack against RSA with high bits known prime factor
Yasufumi Hashimoto
Yasufumi Hashimoto
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
Yehuda Lindell
Yehuda Lindell
On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings
İsa Sertkaya, Ali Doğanaksoy
İsa Sertkaya, Ali Doğanaksoy
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)
Daniel Kraschewski, Jörn Müller-Quade
Daniel Kraschewski, Jörn Müller-Quade
Cubic groups
M. A. Popov
M. A. Popov
Active Domain Expansion for Normal Narrow-pipe Hash Functions
Xigen Yao
Xigen Yao
On the Impossibility of Instantiating PSS in the Standard Model
Rishiraj Bhattacharyya, Avradip Mandal
Rishiraj Bhattacharyya, Avradip Mandal
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
Jean-Sebastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
Jean-Sebastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Gonzalez Nieto
Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Gonzalez Nieto
Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
Dario Fiore, Dominique Schröder
Dario Fiore, Dominique Schröder
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi
Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi
Statistical Analysis of Second Order Differential Power Analysis
Emmanuel Prouff, Matthieu Rivain, Régis Bévan
Emmanuel Prouff, Matthieu Rivain, Régis Bévan
A Timed Logic for Modeling and Reasoning about Security Protocols
Xinfeng Lei, Rui Xue, Ting Yu
Xinfeng Lei, Rui Xue, Ting Yu
A Practical Platform for Cube-Attack-like Cryptanalyses
Bo Zhu, Wenye Yu, Tao Wang
Bo Zhu, Wenye Yu, Tao Wang
Construct MD5 Collisions Using Just A Single Block Of Message
Tao Xie, Dengguo Feng
Tao Xie, Dengguo Feng
More Insights on Blockcipher-Based Hash Functions
Yiyuan Luo, Xuejia Lai
Yiyuan Luo, Xuejia Lai
A new algorithm for computing Groebner bases
Shuhong Gao, Frank Volny IV, Mingsheng Wang
Shuhong Gao, Frank Volny IV, Mingsheng Wang
Short collusion-secure fingerprint codes against three pirates
Koji Nuida
Koji Nuida
Enumerating Results of Homogeneous Rotation over $GF(p)$
Guang-Pu Go, Xi-Yong Zhang, Wen-Fen Liu
Guang-Pu Go, Xi-Yong Zhang, Wen-Fen Liu
One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi, Hugo Krawczyk
Shai Halevi, Hugo Krawczyk
Breaking An Identity-Based Encryption Scheme based on DHIES
Martin R. Albrecht, Kenneth G. Paterson
Martin R. Albrecht, Kenneth G. Paterson
Differential Fault Analysis of AES using a Single Multiple-Byte Fault
Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials
Zhang Yun, Christophe Tartary
Zhang Yun, Christophe Tartary
ROTIV: RFID Ownership Transfer with Issuer Verification
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
Low Data Complexity Attacks on AES
Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque
Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque
Efficient and provably-secure certificateless signature scheme without bilinear pairings
He Debiao, Chen Jianhua, Zhang Rui
He Debiao, Chen Jianhua, Zhang Rui
Black-box property of Cryptographic Hash Functions
Michal Rjaško
Michal Rjaško
Divison Polynomials for Alternate Models of Elliptic Curves
Dustin Moody
Dustin Moody
On the Security of Hash Functions Employing Blockcipher Postprocessing
Donghoon Chang, Mridul Nandi, Moti Yung
Donghoon Chang, Mridul Nandi, Moti Yung
State convergence and keyspace reduction of the Mixer stream cipher
Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson
Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson
Secure and Efficient Protocols for Iris and Fingerprint Identification
Marina Blanton, Paolo Gasti
Marina Blanton, Paolo Gasti
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
Peng Xu, Hai Jin
Peng Xu, Hai Jin
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier, Ben Smyth
Veronique Cortier, Ben Smyth
No-leak authentication by the Sherlock Holmes method
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
Cryptanalysis of Skein
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
A new result on the distinctness of primitive sequences over Z(pq) modulo 2
Qunxiong Zheng, Wenfeng Qi
Qunxiong Zheng, Wenfeng Qi
Generic Compilers for Authenticated Key Exchange (Full Version)
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Identity-based Digital Signature Scheme Without Bilinear Pairings
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
Yang Lu
Yang Lu
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3
Thomas Fuhr, Henri Gilbert, Jean-Renë Reinhard, Marion Videau
Thomas Fuhr, Henri Gilbert, Jean-Renë Reinhard, Marion Videau
Computing Discrete Logarithms in an Interval
Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
A non-uniform birthday problem with applications to discrete logarithms
Steven D. Galbraith, Mark Holmes
Steven D. Galbraith, Mark Holmes
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval
Steven D. Galbraith, Raminder S. Ruprai
Steven D. Galbraith, Raminder S. Ruprai
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Simon Hoerder, Marcin Wojcik, Stefan Tillich, Dan Page
Simon Hoerder, Marcin Wojcik, Stefan Tillich, Dan Page
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner, Chris Peikert
Richard Lindner, Chris Peikert
Cryptanalysis of Hummingbird-1
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates
Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
Craig Gentry, Daniel Wichs
Craig Gentry, Daniel Wichs
The Round Complexity of General VSS
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
A New Model of Binary Elliptic Curves with Fast Arithmetic
Hongfeng Wu, Chunming Tang, Rongquan Feng
Hongfeng Wu, Chunming Tang, Rongquan Feng
How to Improve Rebound Attacks
María Naya-Plasencia
María Naya-Plasencia
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
Tzipora Halevi, Nitesh Saxena
Tzipora Halevi, Nitesh Saxena
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
Shangwei Zhao, Ruyong Feng, Xiao-Shan Gao
Shangwei Zhao, Ruyong Feng, Xiao-Shan Gao
Cryptanalysis of Dual CRT-RSA
Santanu Sarkar, Subhamoy Maitra
Santanu Sarkar, Subhamoy Maitra
An Improved Algebraic Attack on Hamsi-256
Itai Dinur, Adi Shamir
Itai Dinur, Adi Shamir
Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic
Lei Li, Siman Yang
Lei Li, Siman Yang
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Anne Broadbent, Stacey Jeffery, Alain Tapp
Anne Broadbent, Stacey Jeffery, Alain Tapp
Secure Multiparty Computation with Partial Fairness
Amos Beimel, Eran Omri, Ilan Orlov
Amos Beimel, Eran Omri, Ilan Orlov
A Broadcast Attack against NTRU Using Ding's Algorithm
Yanbin Pan, Yingpu Deng
Yanbin Pan, Yingpu Deng
A New Class of Bent--Negabent Boolean Functions
Sugata Gangopadhyay, Ankita Chaturvedi
Sugata Gangopadhyay, Ankita Chaturvedi
Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL
Enrico Thomae, Christopher Wolf
Enrico Thomae, Christopher Wolf
Attribute-Based Signatures
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Cache Games - Bringing Access Based Cache Attacks on AES to Practice
Endre Bangerter, David Gullasch, Stephan Krenn
Endre Bangerter, David Gullasch, Stephan Krenn
Differential Attack on Five Rounds of the SC2000 Block Cipher
Jiqiang Lu
Jiqiang Lu
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner, Chris Peikert
Richard Lindner, Chris Peikert
Bonsai Trees, or How to Delegate a Lattice Basis
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
Andrey Bogdanov, Ilya Kizhvatov
Andrey Bogdanov, Ilya Kizhvatov
Higher-order differential properties of Keccak and Luffa
Christina Boura, Anne Canteaut, Christophe De Cannière
Christina Boura, Anne Canteaut, Christophe De Cannière
Improved Collisions for Reduced ECHO-256
Martin Schläffer
Martin Schläffer
Group Message Authentication
Bartosz Przydatek, Douglas Wikström
Bartosz Przydatek, Douglas Wikström
Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm
İsmail San, Nuray At
İsmail San, Nuray At
Smaller decoding exponents: ball-collision decoding
Daniel J. Bernstein, Tanja Lange, Christiane Peters
Daniel J. Bernstein, Tanja Lange, Christiane Peters
VMCrypt - Modular Software Architecture for Scalable Secure Computation
Lior Malka, Jonathan Katz
Lior Malka, Jonathan Katz
Improved Preimage Attack on One-block MD4
Jinmin Zhong, Xuejia Lai
Jinmin Zhong, Xuejia Lai
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm
Jintai Ding
Jintai Ding
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski, Janusz Szmidt
Piotr Mroczkowski, Janusz Szmidt
Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion
WeiGuo Zhang, GuoZhen Xiao
WeiGuo Zhang, GuoZhen Xiao
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
Axel Schroepfer, Florian Kerschbaum, Guenter Mueller
Axel Schroepfer, Florian Kerschbaum, Guenter Mueller
Discrete Logarithms, Diffie-Hellman, and Reductions
Neal Koblitz, Alfred Menezes, Igor Shparlinski
Neal Koblitz, Alfred Menezes, Igor Shparlinski
Efficient Hashing using the AES Instruction Set
Joppe W. Bos, Onur Ozen, Martijn Stam
Joppe W. Bos, Onur Ozen, Martijn Stam
A Discrete Logarithm Attack on Elliptic Curves
Otto Johnston
Otto Johnston
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Julia Borghoff, Lars R. Knudsen, Gregor Leander, Soeren S. Thomsen
Julia Borghoff, Lars R. Knudsen, Gregor Leander, Soeren S. Thomsen
On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$
Yongqiang Li, Mingsheng Wang
Yongqiang Li, Mingsheng Wang
Cryptanalysis of splay tree based encryption
Jean-Philippe Aumasson
Jean-Philippe Aumasson
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform
Mohamed El Hadedy, Danilo Gligoroski, Svein J. Knapskog
Mohamed El Hadedy, Danilo Gligoroski, Svein J. Knapskog
Breaking Grain-128 with Dynamic Cube Attacks
Itai Dinur, Adi Shamir
Itai Dinur, Adi Shamir
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Jérémy Jean, Pierre-Alain Fouque
Jérémy Jean, Pierre-Alain Fouque
Efficient Two-Move Blind Signatures in the Common Reference String Model
E. Ghadafi, N. P. Smart
E. Ghadafi, N. P. Smart
ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS
Claude Carlet, Sihem Mesnager
Claude Carlet, Sihem Mesnager
Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles
Yusuke Naito
Yusuke Naito
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption
Joseph A. Akinyele, Christoph U. Lehmann, Matthew D. Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin
Joseph A. Akinyele, Christoph U. Lehmann, Matthew D. Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin
Cryptographic Randomness Testing of Block Ciphers and Hash Functions
Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
Tatsuaki Okamoto, Katsuyuki Takashima
Tatsuaki Okamoto, Katsuyuki Takashima
How to Leak on Key Updates
Allison Lewko, Mark Lewko, Brent Waters
Allison Lewko, Mark Lewko, Brent Waters
Password-Protected Secret Sharing
Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu
Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu
On CCA-Secure Fully Homomorphic Encryption
J. Loftus, A. May, N. P. Smart, F. Vercauteren
J. Loftus, A. May, N. P. Smart, F. Vercauteren
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
Solving LWE problem with bounded errors in polynomial time
Jintai Ding
Jintai Ding
A Digital Signature Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
Masahiro Yagisawa
Definitional Issues in Functional Encryption
Adam O'Neill
Adam O'Neill
RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation
S. Duquesne
S. Duquesne
Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant
Stéphane Jacob
Stéphane Jacob
Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth
Yang Lu
Yang Lu
A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality
Carmit Hazay, Yehuda Lindell
Carmit Hazay, Yehuda Lindell
A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries
Carmit Hazay, Yehuda Lindell
Carmit Hazay, Yehuda Lindell
Isogenies and Cryptography
RAZA ALI KAZMI
RAZA ALI KAZMI
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
Yalin Chen, Jue-Sam Chou, Chi-Fong Lin
Yalin Chen, Jue-Sam Chou, Chi-Fong Lin
SHA-512/256
Shay Gueron, Simon Johnson, Jesse Walker
Shay Gueron, Simon Johnson, Jesse Walker
Symmetric-key Searchable keyword Concealment (SSC)
Yacov Yacobi
Yacov Yacobi
Timed Encryption and Its Application
Shaoquan Jiang
Shaoquan Jiang
Optimal XOR based (2,n)-Visual Cryptography Schemes
Feng Liu, Chuankun Wu
Feng Liu, Chuankun Wu
Semantic Security Under Related-Key Attacks and Applications
Benny Applebaum, Danny Harnik, Yuval Ishai
Benny Applebaum, Danny Harnik, Yuval Ishai
Functional Encryption: Definitions and Challenges
Dan Boneh, Amit Sahai, Brent Waters
Dan Boneh, Amit Sahai, Brent Waters
Squaring in cyclotomic subgroups
Koray Karabina
Koray Karabina
One-time Computable and Uncomputable Functions
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption
Anna Lysyanskaya, Aaron Segal
Anna Lysyanskaya, Aaron Segal
Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves
Reza R. Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, J. Felipe Voloch
Reza R. Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, J. Felipe Voloch
Rotational Rebound Attacks on Reduced Skein
Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger
Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
Xu Guo, Sinan Huang, Leyla Nazhandali, Patrick Schaumont
Xu Guo, Sinan Huang, Leyla Nazhandali, Patrick Schaumont
Linear Analysis of Reduced-Round CubeHash
Tomer Ashur, Orr Dunkelman
Tomer Ashur, Orr Dunkelman
Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity
Xiangyong Zeng, Claude Carlet, Jinyong Shan, Lei Hu
Xiangyong Zeng, Claude Carlet, Jinyong Shan, Lei Hu
Deterministic Public-Key Encryption Revisited
Adam O'Neill
Adam O'Neill
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Andrey Bogdanov, Christian Rechberger
Andrey Bogdanov, Christian Rechberger
Comparison of seven SHA-3 candidates software implementations on smart cards.
Mourad Gouicem
Mourad Gouicem
How to Read a Signature?
Vanessa Gratzer, David Naccache
Vanessa Gratzer, David Naccache
Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields
Kristin Lauter, Ning Shang
Kristin Lauter, Ning Shang
Constant-Round Private Function Evaluation with Linear Complexity
Jonathan Katz, Lior Malka
Jonathan Katz, Lior Malka
The Digital Signature Scheme MQQ-SIG
Danilo Gligoroski, Rune Steinsmo \O deg\aa rd, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski
Danilo Gligoroski, Rune Steinsmo \O deg\aa rd, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
Torus-based compression by factor 4 and 6
Koray Karabina
Koray Karabina
Combining properties of cryptographic hash functions
Michal Rjaško
Michal Rjaško
Affine Masking against Higher-Order Side Channel Analysis
Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
Signatures Resilient to Continual Leakage on Memory and Computation
Tal Malkin, Isamu Teranishiy, Yevgeniy Vahlis, Moti Yung
Tal Malkin, Isamu Teranishiy, Yevgeniy Vahlis, Moti Yung
Linear Approximations of Addition Modulo $2^n$-1
Xiutao Feng, Chunfang Zhou, Chuankun Wu
Xiutao Feng, Chunfang Zhou, Chuankun Wu
Implementing Gentry's Fully-Homomorphic Encryption Scheme
Craig Gentry, Shai Halevi
Craig Gentry, Shai Halevi
Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
Matthias Krause, Frederik Armknecht, Ewan Fleischmann
Matthias Krause, Frederik Armknecht, Ewan Fleischmann
Boolean functions with all main cryptographic properties
Ziran Tu, Yingpu Deng
Ziran Tu, Yingpu Deng
Cryptanalysis of block EnRUPT
Elias Yarrkov
Elias Yarrkov
Key Agreement Protocols Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
Masahiro Yagisawa
--Withdrawn--
Xu An Wang, Xiaoyuan Yang, Yiliang Han
Xu An Wang, Xiaoyuan Yang, Yiliang Han
Semi-Homomorphic Encryption and Multiparty Computation
Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
Key-Dependent Message Security: Generic Amplification and Completeness
Benny Applebaum
Benny Applebaum
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo
Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo
On the complexity of Decomposition Attack
Koh-ichi Nagao
Koh-ichi Nagao
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
Maria Dubovitskaya, Alessandra Scafuro, Ivan Visconti
Maria Dubovitskaya, Alessandra Scafuro, Ivan Visconti
A Fault Analytic Method against HB+
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan, Tor Helleseth
Lilya Budaghyan, Tor Helleseth
Quantum Preimage and Collision Attacks on CubeHash
Gaëtan Leurent
Gaëtan Leurent
Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
Dominique Unruh
Dominique Unruh
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
BiTR: Built-in Tamper Resilience
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
Proving Coercion-Resistance of Scantegrity II
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
ATTACKS ON THE AKACP PROTOCOL
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides
Secure Computations on Non-Integer Values
M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schroeder
M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schroeder
Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields
Vladislav Kovtun, Sergey Kavun
Vladislav Kovtun, Sergey Kavun
Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function
Tao Shi, Dongdai Lin
Tao Shi, Dongdai Lin
Efficient Attributes for Anonymous Credentials (Extended Version)
Jan Camenisch, Thomas Groß
Jan Camenisch, Thomas Groß
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
Mahabir Prasad Jhanwar
Mahabir Prasad Jhanwar
Stronger Security Model of Group Key Agreement
Jianjie Zhao, Dawu Gu, M. Choudary Gorantla
Jianjie Zhao, Dawu Gu, M. Choudary Gorantla
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
A Collaborative Framework for Privacy Protection in Online Social Networks
Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn
Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn
Strong designated verifier signature scheme: new definition and construction
Zuhua Shao
Zuhua Shao
Loiss: A Byte-Oriented Stream Cipher
Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
Fully Leakage-Resilient Signatures
Elette Boyle, Gil Segev, Daniel Wichs
Elette Boyle, Gil Segev, Daniel Wichs
Constant Round Non-Malleable Protocols using One Way Functions
Vipul Goyal
Vipul Goyal
A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS
Claude Carlet, Sihem Mesnager
Claude Carlet, Sihem Mesnager
Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba
Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba
Automata Evaluation and Text Search Protocols with Simulation Based Security
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
Constant-round Non-Malleable Commitments from Any One-Way Function
Huijia Lin, Rafael Pass
Huijia Lin, Rafael Pass
On Instantiation of the Random Oracle
He Ge
He Ge
A secure email login system using virtual password
Bhavin Tanti, Nishant doshi
Bhavin Tanti, Nishant doshi
Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--
Shigeo Tsujii, Masahito Gotaishi
Shigeo Tsujii, Masahito Gotaishi
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
R. M. Avanzi, S. Hoerder, D. Page, M. Tunstall
R. M. Avanzi, S. Hoerder, D. Page, M. Tunstall
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
On Compression of Data Encrypted with Block Ciphers
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
Predicate Encryption with Partial Public Keys
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
Pairing Computation on Elliptic Curves of Jacobi Quartic Form
Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li
Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman
Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman
Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
Hui Zhang, Chunxiang Xu, Abdur Rashid Sangi
Hui Zhang, Chunxiang Xu, Abdur Rashid Sangi
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought
A. Simone, B. Skoric
A. Simone, B. Skoric
Privacy-preserving Sharing of Sensitive Information
Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
Two identification protocols based on Cayley graphs of Coxeter groups
Feliú Sagols, Guillermo Morales-Luna
Feliú Sagols, Guillermo Morales-Luna
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
Goichiro Hanaoka, Jian Weng
Goichiro Hanaoka, Jian Weng
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
Xinfeng Lei, Rui Xue, Ting Yu
Xinfeng Lei, Rui Xue, Ting Yu
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
Benwen Zhu, Bo Zhu, Kui Ren
Benwen Zhu, Bo Zhu, Kui Ren
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
Falko Strenzke
Weaknesses of SIP Authentication Scheme for Converged VoIP Networks
Q. Pu
Q. Pu
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
Mohammad Reza Sohizadeh Abyaneh
Mohammad Reza Sohizadeh Abyaneh
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
Zhifang Zhang
Zhifang Zhang
Identity Based Partial Aggregate Signature Scheme Without Pairing
S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan
On extended algebraic immunity
Gaofei Wu, Yuqing Zhang, Weiguo Zhang
Gaofei Wu, Yuqing Zhang, Weiguo Zhang
CCA2 Secure Certificateless Encryption Schemes Based on RSA
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
Masahiro Yagisawa
Masahiro Yagisawa
Improving the performance of Luffa Hash Algorithm
Thomaz Oliveira, Julio López
Thomaz Oliveira, Julio López
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith
Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith
Optimal Verification of Operations on Dynamic Sets
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
Jesse Walker, Jiangtao Li
Jesse Walker, Jiangtao Li
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
Dan Boneh, David Mandell Freeman
Dan Boneh, David Mandell Freeman
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Feng Hao, Matthew Nicolas Kreeger
Feng Hao, Matthew Nicolas Kreeger
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
Subidh Ali, Debdeep Mukhopadhyay
Subidh Ali, Debdeep Mukhopadhyay
Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
Kaoru Kurosawa
Kaoru Kurosawa
Oblivious and Fair Server-Aided Two-Party Computation
Amir Herzberg, Haya Shulman
Amir Herzberg, Haya Shulman
Sequential Rationality in Cryptographic Protocols
Ronen Gradwohl, Noam Livne, Alon Rosen
Ronen Gradwohl, Noam Livne, Alon Rosen
Side-channel Analysis of Six SHA-3 Candidates
Olivier Benoit, Thomas Peyrin
Olivier Benoit, Thomas Peyrin
Short One-Time Signatures
G. M. Zaverucha, D. R. Stinson
G. M. Zaverucha, D. R. Stinson
Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj
Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj
New Construction of Identity-based Proxy Re-encryption
Song Luo, Jianbin Hu, Zhong Chen
Song Luo, Jianbin Hu, Zhong Chen
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu
Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
Dan Boneh, Hart Montgomery, Ananth Raghunathan
Dan Boneh, Hart Montgomery, Ananth Raghunathan
Provably Secure Higher-Order Masking of AES
Matthieu Rivain, Emmanuel Prouff
Matthieu Rivain, Emmanuel Prouff
Piret and Quisquater's DFA on AES Revisited
Christophe Giraud, Adrian Thillard
Christophe Giraud, Adrian Thillard
Embedded Extended Visual Cryptography Schemes
Feng Liu, Chuankun Wu
Feng Liu, Chuankun Wu
Achieving Leakage Resilience Through Dual System Encryption
Allison Lewko, Yannis Rouselakis, Brent Waters
Allison Lewko, Yannis Rouselakis, Brent Waters
Selecting Parameters for the Rainbow Signature Scheme - Extended Version -
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
Arithmetic of Supersingular Koblitz Curves in Characteristic Three
Roberto Avanzi, Clemens Heuberger, Helmut Prodinger
Roberto Avanzi, Clemens Heuberger, Helmut Prodinger
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
Cihangir Tezcan
Cihangir Tezcan
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Takanori Isobe, Taizo Shirai
Takanori Isobe, Taizo Shirai
The PASSERINE Public Key Encryption and Authentication Mechanism
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS
K. Atighehchi, A. Enache, T. Muntean, G. Risterucci
K. Atighehchi, A. Enache, T. Muntean, G. Risterucci
Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees
Jing Liu, Bo Yang
Jing Liu, Bo Yang
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
Vlastimil Klima, Danilo Gligoroski
Vlastimil Klima, Danilo Gligoroski
A Family of Implementation-Friendly BN Elliptic Curves
Geovandro C. C. F. Pereira, Marcos A. Simplício Jr, Michael Naehrig, Paulo S. L. M. Barreto
Geovandro C. C. F. Pereira, Marcos A. Simplício Jr, Michael Naehrig, Paulo S. L. M. Barreto
Random Oracles in a Quantum World
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
Security Improvement on a Password-Authenticated Group Key Exchange Protocol
Junghyun Nam
Junghyun Nam
Parallelizing the Camellia and SMS4 Block Ciphers - Extended version
Huihui Yap, Khoongming Khoo, Axel Poschmann
Huihui Yap, Khoongming Khoo, Axel Poschmann
KIST: A new encryption algorithm based on splay
R. Wei, Z. Zeng
R. Wei, Z. Zeng
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm
LI Yun-qiang, Wang Ai-lan
LI Yun-qiang, Wang Ai-lan
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
Binomial Sieve Series -- a Prospective Cryptographic Tool
Gideon Samid
Gideon Samid
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks
Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
White-Box Cryptography and SPN ciphers. LRC method.
Dmitry Schelkunov
Dmitry Schelkunov
Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function
Jue-Sam Chou, Hsien-ching Chen, Chun-Yun Chen
Jue-Sam Chou, Hsien-ching Chen, Chun-Yun Chen
Distinguishing Properties of Higher Order Derivatives of Boolean Functions
Ming Duan, Xuejia Lai, Mohan Yang, Xiaorui Sun, Bo Zhu
Ming Duan, Xuejia Lai, Mohan Yang, Xiaorui Sun, Bo Zhu
Computationally Sound Verification of Source Code
Michael Backes, Matteo Maffei, Dominique Unruh
Michael Backes, Matteo Maffei, Dominique Unruh
Perfectly Balanced Boolean Functions and Golić Conjecture
Stanislav Smyshlyaev
Stanislav Smyshlyaev
On Strong Simulation and Composable Point Obfuscation
Nir Bitansky, Ran Canetti
Nir Bitansky, Ran Canetti
Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
E. A. Grechnikov
E. A. Grechnikov
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Margus Niitsoo
Margus Niitsoo
Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials.
Vivien Dubois, Jean-Gabriel Kammerer
Vivien Dubois, Jean-Gabriel Kammerer
Wild McEliece
Daniel J. Bernstein, Tanja Lange, Christiane Peters
Daniel J. Bernstein, Tanja Lange, Christiane Peters
The collision security of Tandem-DM in the ideal cipher model
Jooyoung Lee, Martijn Stam, John Steinberger
Jooyoung Lee, Martijn Stam, John Steinberger
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
Flaws in Differential Cryptanalysis of Reduced Round PRESENT
Manoj Kumar, Pratibha Yadav, Meena Kumari
Manoj Kumar, Pratibha Yadav, Meena Kumari
Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf
Julien Francq, Céline Thuillet
Julien Francq, Céline Thuillet
Privacy-Preserving RFID Systems: Model and Constructions
Sébastien Canard, Iwen Coisel, Jonathan Etrog, Marc Girault
Sébastien Canard, Iwen Coisel, Jonathan Etrog, Marc Girault
On the Insecurity of Parallel Repetition for Leakage Resilience
Allison Lewko, Brent Waters
Allison Lewko, Brent Waters
Linear Secret Sharing for Hierarchical Access Structures
Ali Aydın Selçuk, Ramazan Yılmaz
Ali Aydın Selçuk, Ramazan Yılmaz
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
Mohammad Reza Sohizadeh Abyaneh
Mohammad Reza Sohizadeh Abyaneh
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl
Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl
Security Analysis of a Threshold Proxy Signature Scheme
Kitae Kim, Dahun Nyang
Kitae Kim, Dahun Nyang
Faster Computation of Self-pairings
Chang-An Zhao, Fangguo Zhang, Dongqing Xie
Chang-An Zhao, Fangguo Zhang, Dongqing Xie
Distinguisher for Shabal's Permutation Function
Peter Novotney
Peter Novotney
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
Mihir Bellare, David Cash
Mihir Bellare, David Cash
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
Noémie Floissac, Yann L'Hyver
Noémie Floissac, Yann L'Hyver
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
Zhibin Zhou, Dijiang Huang
Zhibin Zhou, Dijiang Huang
Horizontal Correlation Analysis on Exponentiation
Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
Jue-Sam Chou, Yalin Chen, Chun-Hui Huang
Jue-Sam Chou, Yalin Chen, Chun-Hui Huang
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
Daniel Z. Zanger
Daniel Z. Zanger
Elliptic curves in Huff's model
Hongfeng Wu, Rongquan Feng
Hongfeng Wu, Rongquan Feng
The impossibility of computationally sound XOR
Dominique Unruh
Dominique Unruh
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Sanjit Chatterjee, Darrel Hankerson, Alfred Menezes
Sanjit Chatterjee, Darrel Hankerson, Alfred Menezes
A Combinatorial Analysis of HC-128
Goutam Paul, Subhamoy Maitra, Shashwat Raizada
Goutam Paul, Subhamoy Maitra, Shashwat Raizada
BoostReduce - A Framework For Strong Lattice Basis Reduction
Werner Backes, Susanne Wetzel
Werner Backes, Susanne Wetzel
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–
Emmanuel Prouff, Robert McEvoy
Emmanuel Prouff, Robert McEvoy
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
Danilo Gligoroski, Vlastimil Klima
Danilo Gligoroski, Vlastimil Klima
Huff's Model for Elliptic Curves
Marc Joye, Mehdi Tibouchi, Damien Vergnaud
Marc Joye, Mehdi Tibouchi, Damien Vergnaud
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pierre-Alain Fouque, Mehdi Tibouchi
Pierre-Alain Fouque, Mehdi Tibouchi
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva, Bart Mennink, Bart Preneel
Elena Andreeva, Bart Mennink, Bart Preneel
Analysis of an internet voting protocol
Kristian Gjøsteen
Kristian Gjøsteen
Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree
Sorina Ionica, Antoine Joux
Sorina Ionica, Antoine Joux
Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
Jin Wang
Jin Wang
Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
Masahiro Yagisawa
Masahiro Yagisawa
Identity Based Online/Offline Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function
Kota Ideguchi, Elmar Tischhauser, Bart Preneel
Kota Ideguchi, Elmar Tischhauser, Bart Preneel
Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees
Zhen Liu, Zhenfu Cao, Duncan S. Wong
Zhen Liu, Zhenfu Cao, Duncan S. Wong
Hashing into Hessian Curves
Reza Rezaeian Farashahi
Reza Rezaeian Farashahi
Decoding square-free Goppa codes over $\F_p$
Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves
Nicolas Estibals
Nicolas Estibals
Finding discrete logarithms with a set orbit distinguisher
Robert P. Gallant
Robert P. Gallant
Double Ciphertext Mode : A Proposal for Secure Backup
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez
Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez
Round-Optimal Password-Based Authenticated Key Exchange
Jonathan Katz, Vinod Vaikuntanathan
Jonathan Katz, Vinod Vaikuntanathan
Starfish on Strike
Daniel J. Bernstein, Peter Birkner, Tanja Lange
Daniel J. Bernstein, Peter Birkner, Tanja Lange
Oblivious RAM Revisited
Benny Pinkas, Tzachy Reinman
Benny Pinkas, Tzachy Reinman
TASTY: Tool for Automating Secure Two-partY computations
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
A Compact FPGA Implementation of the SHA-3 Candidate ECHO
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
An Analysis of Affine Coordinates for Pairing Computation
Kristin Lauter, Peter L. Montgomery, Michael Naehrig
Kristin Lauter, Peter L. Montgomery, Michael Naehrig
Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties
Deng Tang, Weiguo Zhang, Xiaohu Tang
Deng Tang, Weiguo Zhang, Xiaohu Tang
On the Use of Financial Data as a Random Beacon
Jeremy Clark, Urs Hengartner
Jeremy Clark, Urs Hengartner
On the Security of Identity Based Threshold Unsigncryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan
Identity Based Self Delegated Signature - Self Proxy Signatures
S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopinath, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopinath, C. Pandu Rangan
The Fiat--Shamir Transform for Group and Ring Signature Schemes
M. -F. Lee, N. P. Smart, B. Warinschi
M. -F. Lee, N. P. Smart, B. Warinschi
CCA-Secure PRE Scheme without Public Verifiability
Jun Shao, Peng liu, Jian Weng
Jun Shao, Peng liu, Jian Weng
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
Pinaki Sarkar, Amrita Saha, Morshed Udan Chowdhury
Pinaki Sarkar, Amrita Saha, Morshed Udan Chowdhury
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
Jean-Luc Beuchat, Jorge Enrique González Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, Tadanori Teruya
Jean-Luc Beuchat, Jorge Enrique González Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, Tadanori Teruya
Cryptographic Pairings Based on Elliptic Nets
Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
A Digital Signature Using Multivariate Functions on Quaternion Ring
Masahiro Yagisawa
Masahiro Yagisawa
Decentralizing Attribute-Based Encryption
Allison Lewko, Brent Waters
Allison Lewko, Brent Waters
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
Vladimir Kolesnikov
Vladimir Kolesnikov
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
Kenneth Koon-Ho Wong, Gregory V. Bard
Kenneth Koon-Ho Wong, Gregory V. Bard
Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids
A. N. Alekseychuk
A. N. Alekseychuk
Time-Specific Encryption
Kenneth G. Paterson, Elizabeth A. Quaglia
Kenneth G. Paterson, Elizabeth A. Quaglia
Efficient Generalized Signcryption Schemes
Prashant Kushwah, Sunder Lal
Prashant Kushwah, Sunder Lal
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta
Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta
Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.
Ezekiel J Kachisa
Ezekiel J Kachisa
Identity Based Public Verifiable Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Fixed Argument Pairings
Craig Costello, Douglas Stebila
Craig Costello, Douglas Stebila
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
Masao Kasahara
Masao Kasahara
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
Jayaprakash Kar, Banshidhar Majhi
Jayaprakash Kar, Banshidhar Majhi
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
Jose Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
Jose Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
Efficient SIMD arithmetic modulo a Mersenne number
Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
Practical-Titled Attack on AES-128 Using Chosen-Text Relations
Vincent Rijmen
Vincent Rijmen
Efficient Differential Fault Analysis for AES
Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors
Patrick Longa, Catherine Gebotys
Patrick Longa, Catherine Gebotys
Security Proof of AugPAKE
SeongHan Shin, Kazukuni Kobara, Hideki Imai
SeongHan Shin, Kazukuni Kobara, Hideki Imai
Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme
Zhengjun Cao
Zhengjun Cao
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Aurelien Francillon, Boris Danev, Srdjan Capkun
Aurelien Francillon, Boris Danev, Srdjan Capkun
A Distinguisher for High Rate McEliece Cryptosystems
Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
Distributed Rational Consensus
Amjed Shareef
Amjed Shareef
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
Koji Nuida, Goichiro Hanaoka
Koji Nuida, Goichiro Hanaoka
Signatures for Multi-source Network Coding
László Czap, István Vajda
László Czap, István Vajda
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
Privacy-Preserving Multi-Objective Evolutionary Algorithms
Daniel Funke, Florian Kerschbaum
Daniel Funke, Florian Kerschbaum
Effect of the Dependent Paths in Linear Hull
Zhenli Dai, Meiqin Wang, Yue Sun
Zhenli Dai, Meiqin Wang, Yue Sun
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Abdel Alim Kamal, Amr M. Youssef
Abdel Alim Kamal, Amr M. Youssef
Security Analysis of SIMD
Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
Improved Single-Key Attacks on 8-round AES
Orr Dunkelman, Nathan Keller, Adi Shamir
Orr Dunkelman, Nathan Keller, Adi Shamir
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
Martin Schläffer
Martin Schläffer
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan, Tor Helleseth
Lilya Budaghyan, Tor Helleseth
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
Jian Weng, Yunlei Zhao
Jian Weng, Yunlei Zhao
Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
Ivan Damgård, Claudio Orlandi
Ivan Damgård, Claudio Orlandi
A Note On Gottesman-Chuang Quantum Signature Scheme
Zhengjun Cao
Zhengjun Cao
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
Efficient Techniques for High-Speed Elliptic Curve Cryptography
Patrick Longa, Catherine Gebotys
Patrick Longa, Catherine Gebotys
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
Fast Exhaustive Search for Polynomial Systems in $F_2$
Charles Bouillaguet, Chen-Mou Cheng, Tony (Tung) Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang
Charles Bouillaguet, Chen-Mou Cheng, Tony (Tung) Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang
Security weakness of two authenticated key exchange protocols from pairings
Qingfeng Cheng, Chuangui Ma
Qingfeng Cheng, Chuangui Ma
Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation
J. C. Bajard, S. Duquesne, M. Ercegovac
J. C. Bajard, S. Duquesne, M. Ercegovac
The analytical property for $\zeta(s)$
Sheng-Ping Wu
Sheng-Ping Wu
Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
Raveen R. Goundar, Marc Joye, Atsuko Miyaji
Raveen R. Goundar, Marc Joye, Atsuko Miyaji
Attacking M&M Collective Signature Scheme
Michal Rjaško, Martin Stanek
Michal Rjaško, Martin Stanek
Impossible Differential Cryptanalysis of SPN Ciphers
Ruilin Li, Bing Sun, Chao Li
Ruilin Li, Bing Sun, Chao Li
On security of a remote user authentication scheme without using smart cards
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
Marten van Dijk, Ari Juels
Marten van Dijk, Ari Juels
Cryptanalysis of the Compression Function of SIMD
Hongbo Yu, Xiaoyun Wang
Hongbo Yu, Xiaoyun Wang
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
Ran Canetti, Sebastian Gajek
Ran Canetti, Sebastian Gajek
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design
Frederik Armknecht, Carsten Elsner, Martin Schmidt
Frederik Armknecht, Carsten Elsner, Martin Schmidt
On generalized Feistel networks
Viet Tung Hoang, Phillip Rogaway
Viet Tung Hoang, Phillip Rogaway
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
Faster Fully Homomorphic Encryption
Damien Stehle, Ron Steinfeld
Damien Stehle, Ron Steinfeld
On the Indifferentiability of the Grøstl Hash Function
Elena Andreeva, Bart Mennink, Bart Preneel
Elena Andreeva, Bart Mennink, Bart Preneel
Correlation-Enhanced Power Analysis Collision Attack
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
Hash-based Multivariate Public Key Cryptosystems
WANG Hou-Zhen, ZHANG Huan-Guo
WANG Hou-Zhen, ZHANG Huan-Guo
Ideal Key Derivation and Encryption in Simulation-based Security
Ralf Kuesters, Max Tuengerthal
Ralf Kuesters, Max Tuengerthal
Computing genus 2 curves from invariants on the Hilbert moduli space
Kristin Lauter, Tonghai Yang
Kristin Lauter, Tonghai Yang
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
Jacques Patarin
Jacques Patarin
A Low-Area yet Performant FPGA Implementation of Shabal
Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah
Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
Intractable Problems in Cryptography
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento
Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento
Lattice-based Identity-Based Broadcast Encryption Scheme
Jin Wang, Jingguo Bi
Jin Wang, Jingguo Bi
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
Jacques Patarin
Jacques Patarin
On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
Sugata Gangopadhyay, Brajesh Kumar Singh
Sugata Gangopadhyay, Brajesh Kumar Singh
A SAT-based preimage analysis of reduced KECCAK hash functions
Pawel Morawiecki, Marian Srebrny
Pawel Morawiecki, Marian Srebrny
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell, Benny Pinkas
Yehuda Lindell, Benny Pinkas
Recursive Information Hiding in Visual Cryptography
Sandeep Katta
Sandeep Katta
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
Kerry A. McKay, Poorvi L. Vora
Kerry A. McKay, Poorvi L. Vora
Protocols for Reliable and Secure Message Transmission
Ashish Choudhury
Ashish Choudhury
Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
Arpita Patra
Arpita Patra
On the Round Complexity of Covert Computation
Vipul Goyal, Abhishek Jain
Vipul Goyal, Abhishek Jain
Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan
Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan
Adaptively Secure Broadcast Encryption with Short Ciphertexts
Behzad Malek, Ali Miri
Behzad Malek, Ali Miri
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Position-Based Quantum Cryptography: Impossibility and Constructions
Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
Online/Offline Identity-Based Signcryption Revisited
Joseph K. Liu, Joonsang Baek, Jianying Zhou
Joseph K. Liu, Joonsang Baek, Jianying Zhou
Symmetric States and their Structure: Improved Analysis of CubeHash
Niels Ferguson, Stefan Lucks, Kerry A. McKay
Niels Ferguson, Stefan Lucks, Kerry A. McKay
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
Zhimin Chen, Patrick Schaumont
Zhimin Chen, Patrick Schaumont
Selecting Parameters for Secure McEliece-based Cryptosystems
Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, Johannes Buchmann
Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, Johannes Buchmann
Factorization of RSA-180
S. A. Danilov, I. A. Popovyan
S. A. Danilov, I. A. Popovyan
LAB Form for Iterated Hash Functions
Xigen Yao
Xigen Yao
Key-Controlled Order-Preserving Encryption
HU Mengke, GAO Juntao
HU Mengke, GAO Juntao
Two improved authenticated multiple key exchange protocols
Feng LIU
Feng LIU
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning, Qiuliang Xu
Chao Ning, Qiuliang Xu
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Jian Weng, Minrong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao
Jian Weng, Minrong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao
Cryptographic Extraction and Key Derivation: The HKDF Scheme
Hugo Krawczyk
Hugo Krawczyk
Lattice Reduction and Polynomial Solving
Raphaël Marinier
Raphaël Marinier
Cube Test Analysis of the Statistical Behavior of CubeHash and Skein
Alan Kaminsky
Alan Kaminsky
Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT
Céline Blondeau, Benoît Gérard
Céline Blondeau, Benoît Gérard
On FPGA-based implementations of Gr\{o}stl
Bernhard Jungk, Steffen Reith
Bernhard Jungk, Steffen Reith
Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA
Andrey V. Pavlov
Andrey V. Pavlov
On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions
Ruchi Gode, Sugata Gangopadhyay
Ruchi Gode, Sugata Gangopadhyay
Feasible Attack on the 13-round AES-256
Alex Biryukov, Dmitry Khovratovich
Alex Biryukov, Dmitry Khovratovich
On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature
Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
Automorphism group of the set of all bent functions
Natalia Tokareva
Natalia Tokareva
Cryptanalysis of XXTEA
Elias Yarrkov
Elias Yarrkov
Separable Hash Functions
Sarang Aravamuthan
Sarang Aravamuthan
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model
Zhengping Jin, Qiaoyan Wen, Hua Zhang
Zhengping Jin, Qiaoyan Wen, Hua Zhang
Modeling Attacks on Physical Unclonable Functions
Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber
Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber
Collusion Free Protocol for Rational Secret Sharing
Amjed Shareef
Amjed Shareef
Rational Secret Sharing without Broadcast
Amjed Shareef
Amjed Shareef
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
Alex Biryukov, Ivica Nikolić
Alex Biryukov, Ivica Nikolić
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
Jia XU
Jia XU
Quantifying Trust
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
Towards a Theory of Trust Based Collaborative Search
Yacov Yacobi
Yacov Yacobi
Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset
Jia XU
Jia XU
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Senshan Pan, Xiaotong Fu, Weiguo Zhang
Senshan Pan, Xiaotong Fu, Weiguo Zhang
Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
Yang ZHANG, Jun-Liang CHEN
Yang ZHANG, Jun-Liang CHEN
Improved Delegation of Computation using Fully Homomorphic Encryption
Kai-Min Chung, Yael Kalai, Salil Vadhan
Kai-Min Chung, Yael Kalai, Salil Vadhan
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
One-round and authenticated three-party multiple key exchange protocol from parings
Feng LIU
Feng LIU
Collusion Free Protocol for Correlated Element Selection Problem
Amjed Shareef, Akshay Agrawal, C. Pandu Rangan
Amjed Shareef, Akshay Agrawal, C. Pandu Rangan
A New Security Model for Authenticated Key Agreement
Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
Accountability: Definition and Relationship to Verifiability
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Attribute-based group key establishment
Rainer Steinwandt, Adriana Suárez Corona
Rainer Steinwandt, Adriana Suárez Corona
Efficient provable data possession for hybrid clouds
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
Georg Fuchsbauer
Georg Fuchsbauer
On Representable Matroids and Ideal Secret Sharing
Ching-Fang Hsu, Qi Cheng
Ching-Fang Hsu, Qi Cheng
Throughput-Optimal Routing in Unreliable Networks
Paul Bunn, Rafail Ostrovsky
Paul Bunn, Rafail Ostrovsky
A calculus for game-based security proofs
David Nowak, Yu Zhang
David Nowak, Yu Zhang
Concurrent composition in the bounded quantum storage model
Dominique Unruh
Dominique Unruh
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones
Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$
Neal Koblitz
Neal Koblitz
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
Zvika Brakerski, Shafi Goldwasser
Zvika Brakerski, Shafi Goldwasser
A Security Weakness in a Generic Construction of a Group Key Exchange Protocol
Junghyun Nam
Junghyun Nam
Efficient Implementation of the Orlandi Protocol Extended Version
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
Improved Differential Attacks for ECHO and Grostl
Thomas Peyrin
Thomas Peyrin
Some Observations on Indifferentiability
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Solving Generalized Small Inverse Problems
Noboru Kunihiro
Noboru Kunihiro
(If) Size Matters: Size-Hiding Private Set Intersection
Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
Tracker: Security and Privacy for RFID-based Supply Chains
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)
Zhen Wang, Shuqin Fan
Zhen Wang, Shuqin Fan
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Daniele Perito, Gene Tsudik
Daniele Perito, Gene Tsudik
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework
Zheng Yuan, Xiaoqiu Ren
Zheng Yuan, Xiaoqiu Ren
On the q-Strong Diffie-Hellman Problem
Naoki Tanaka, Taiichi Saito
Naoki Tanaka, Taiichi Saito
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
Composable Security Analysis of OS Services
Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema
Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema
Quantum Proofs of Knowledge
Dominique Unruh
Dominique Unruh
Practical-time Attack on the Full MMB Block Cipher
Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE
Yu Chen
Yu Chen
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves
Richard Moloney, Aidan O'Mahony, Pierre Laurent
Richard Moloney, Aidan O'Mahony, Pierre Laurent
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Koen Simoens, Roel Peeters, Bart Preneel
Koen Simoens, Roel Peeters, Bart Preneel
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
Long Hoang Nguyen, Andrew William Roscoe
Long Hoang Nguyen, Andrew William Roscoe
On Protecting Cryptographic Keys Against Continual Leakage
Ali Juma, Yevgeniy Vahlis
Ali Juma, Yevgeniy Vahlis
Certificateless generalized signcryption
Ji Huifang, Han Wenbao, Zhao Long
Ji Huifang, Han Wenbao, Zhao Long
Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure
Bernard Colbert, Anthony H. Dekker, Lynn Margaret Batten
Bernard Colbert, Anthony H. Dekker, Lynn Margaret Batten
Robust Combiner for Obfuscators
Amir Herzberg, Haya Shulman
Amir Herzberg, Haya Shulman
Impossible Differential Cryptanalysis on E2
Yuechuan Wei, Ruilin Li, Ping Li, Chao Li
Yuechuan Wei, Ruilin Li, Ping Li, Chao Li
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Markus Rückert, Michael Schneider, Dominique Schröder
Markus Rückert, Michael Schneider, Dominique Schröder
A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer
Bing Zeng, Christophe Tartary, Chingfang Hsu
Bing Zeng, Christophe Tartary, Chingfang Hsu
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
Cryptography Against Continuous Memory Attacks
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
On E-Vote Integrity in the Case of Malicious Voter Computers
Sven Heiberg, Helger Lipmaa, Filip Van Laenen
Sven Heiberg, Helger Lipmaa, Filip Van Laenen
Identity-Based Online/Offline Key Encapsulation and Encryption
Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou
Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou
Speeding Up The Widepipe: Secure and Fast Hashing
Mridul Nandi, Souradyuti Paul
Mridul Nandi, Souradyuti Paul
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
On Designated Verifier Signature Schemes
Michal Rjaško, Martin Stanek
Michal Rjaško, Martin Stanek
J-PAKE: Authenticated Key Exchange Without PKI
Feng Hao, Peter Ryan
Feng Hao, Peter Ryan
New generic algorithms for hard knapsacks
Nick Howgrave-Graham, Antoine Joux
Nick Howgrave-Graham, Antoine Joux
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
Certificateless Signcryption without Pairing
Wenjian Xie, Zhang Zhang
Wenjian Xie, Zhang Zhang
New software speed records for cryptographic pairings
Michael Naehrig, Ruben Niederhagen, Peter Schwabe
Michael Naehrig, Ruben Niederhagen, Peter Schwabe
New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation
Wenping Ma, Chen Yang, Shaohui Sun
Wenping Ma, Chen Yang, Shaohui Sun
Rational Secret Sharing AS Extensive Games
Zhifang Zhang
Zhifang Zhang
Preventing Pollution Attacks in Multi-Source Network Coding
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman
A Simple BGN-type Cryptosystem from LWE
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
Cryptanalysis of a DoS-resistant ID-based password authentication
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
The World is Not Enough: Another Look on Second-Order DPA
Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity
Ziran Tu, Yingpu Deng
Ziran Tu, Yingpu Deng
Identity Based Online/Offline Encryption Scheme
Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
Robert Granger
Robert Granger
A Comparison of Cryptanalytic Tradeoff Algorithms
Jin Hong, Sunghwan Moon
Jin Hong, Sunghwan Moon
Sanitizable signatures with strong transparency in the standard model
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
A Reflection on the Security of Two-Party Key Establishment Protocols
Qiang Tang
Qiang Tang
Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup
Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
On Foundation and Construction of Physical Unclonable Functions
Jiang Wu, Maire O'Neill
Jiang Wu, Maire O'Neill
On a conjecture about binary strings distribution
Jean-Pierre Flori, Hugues Randriambololona, Gérard Cohen, Sihem Mesnager
Jean-Pierre Flori, Hugues Randriambololona, Gérard Cohen, Sihem Mesnager
Dismantling SecureMemory, CryptoMemory and CryptoRF
Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
A Meet-in-the-Middle Attack on ARIA
Xuehai Tang, Bing Sun, Ruilin Li, Chao Li
Xuehai Tang, Bing Sun, Ruilin Li, Chao Li
Evolutionary Cipher against Differential Power Attack
Tang ming, Meng Qinshu, Zhang Huanguo, Gao Si, Dou Qin, Shen Fei, Li Du
Tang ming, Meng Qinshu, Zhang Huanguo, Gao Si, Dou Qin, Shen Fei, Li Du
Fault Analysis Study of the Block Cipher FOX64
Ruilin Li, Jianxiong You, Bing Sun, Chao Li
Ruilin Li, Jianxiong You, Bing Sun, Chao Li
Comment on four two-party authentication protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
Black-Box Constructions of Protocols for Secure Computation
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
Golay Complementary Sequences Over the QAM Constellation
Wenping Ma, Chen Yang, Shaohui Sun
Wenping Ma, Chen Yang, Shaohui Sun
1024XKS - A High Security Software Oriented Block Cipher Revisited
Dieter Schmidt
Dieter Schmidt
Stange's Elliptic Nets and Coxeter Group F4
Daniel R. L. Brown
Daniel R. L. Brown
A Flaw in The Internal State Recovery Attack on ALPHA-MAC
Shengbao Wu, Mingsheng Wang, Zheng Yuan
Shengbao Wu, Mingsheng Wang, Zheng Yuan
Identity-Based Encryption Secure against Selective Opening Attack
Mihir Bellare, Brent Waters, Scott Yilek
Mihir Bellare, Brent Waters, Scott Yilek
A variant of the F4 algorithm
Antoine Joux, Vanessa Vitse
Antoine Joux, Vanessa Vitse
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$
Antoine Joux, Vanessa Vitse
Antoine Joux, Vanessa Vitse
Genus 2 Curves with Complex Multiplication
Eyal Z. Goren, Kristin E. Lauter
Eyal Z. Goren, Kristin E. Lauter
the upper bounds on differntial characteristics in block cipher SMS4
Zhang MeiLing, Liu JingMei, Wang XinMei
Zhang MeiLing, Liu JingMei, Wang XinMei
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
Founding Cryptography on Tamper-Proof Hardware Tokens
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
Secure and Fast Implementations of Two Involution Ciphers
Billy Bob Brumley
Billy Bob Brumley
Ring signature with divided private key
Stelian Flonta, Liviu-Cristian Miclea
Stelian Flonta, Liviu-Cristian Miclea
Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm
Mohammad Sadeq Dousti
Mohammad Sadeq Dousti
On Small Subgroup Non-confinement Attack
Feng Hao
Feng Hao
Comments on five smart card based password authentication protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
A New Framework for Password-Based Authenticated Key Exchange
Adam Groce, Jonathan Katz
Adam Groce, Jonathan Katz
Some Applications of Lattice Based Root Finding Techniques
Santanu Sarkar, Subhamoy Maitra
Santanu Sarkar, Subhamoy Maitra
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
New Definitions and Separations for Circular Security
David Cash, Matthew Green, Susan Hohenberger
David Cash, Matthew Green, Susan Hohenberger
Small Scale Variants Of The Block Cipher PRESENT
Gregor Leander
Gregor Leander
Mean value formulas for twisted Edwards curves
Dustin Moody
Dustin Moody
A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
Yu Chen
Yu Chen
Improved Agreeing-Gluing Algorithm
Igor Semaev
Igor Semaev
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
Masao Kasahara
Masao Kasahara
On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
Manoj Kumar
Manoj Kumar
Estimating the Security of Lattice-based Cryptosystems
Markus Rückert, Michael Schneider
Markus Rückert, Michael Schneider
On Robust Key Agreement Based on Public Key Authentication
Feng Hao
Feng Hao
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption
Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
Masaaki Shirase
Masaaki Shirase
Signing on Elements in Bilinear Groups for Modular Protocol Design
Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
On the claimed privacy of EC-RAC III
Junfeng Fan, Jens Hermans, Frederik Vercauteren
Junfeng Fan, Jens Hermans, Frederik Vercauteren
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
Jooyoung Lee, John Steinberger
Jooyoung Lee, John Steinberger
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
Relation for Algebraic Attack on E0 combiner
N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
Update-Optimal Authenticated Structures Based on Lattices
Charalampos Papamanthou, Roberto Tamassia
Charalampos Papamanthou, Roberto Tamassia
CCA-Secure Cryptosystem from Lattice
Chen Huiyan
Chen Huiyan
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
Jian-zhu Lu, Jipeng Zhou
Jian-zhu Lu, Jipeng Zhou
Cryptographic Aspects of Real Hyperelliptic Curves
M. J. Jacobson Jr., R. Scheidler, A. Stein
M. J. Jacobson Jr., R. Scheidler, A. Stein
A Hardware Wrapper for the SHA-3 Hash Algorithms
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire O'Neill, William P. Marnane
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire O'Neill, William P. Marnane
Delaying Mismatched Field Multiplications in Pairing Computations
Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
Security of Encryption Schemes in Weakened Random Oracle Models
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Chen Huiyan, Li Zichen
Chen Huiyan, Li Zichen
Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy
Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee
Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee
How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
Huang Lin, Zhenfu Cao, Muxin Zhou, Haojin Zhu
Huang Lin, Zhenfu Cao, Muxin Zhou, Haojin Zhu
Proposal of a Signature Scheme based on STS Trapdoor
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita
Cryptographic Agility and its Relation to Circular Encryption
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
M. Abdelaziz Elaabid, Sylvain Guilley
M. Abdelaziz Elaabid, Sylvain Guilley
A Security Evaluation of DNSSEC with NSEC3
Jason Bau, John C Mitchell
Jason Bau, John C Mitchell
The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem
Simon R. Blackburn
Simon R. Blackburn
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Xu An Wang, Xiaoyuan Yang
Xu An Wang, Xiaoyuan Yang
CCA-Secure PRE Scheme without Random Oracles
Jun Shao, Zhenfu Cao, Peng Liu
Jun Shao, Zhenfu Cao, Peng Liu
On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”"
Vladimir Rudskoy
Vladimir Rudskoy
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
Practical Adaptive Oblivious Transfer from Simple Assumptions
Matthew Green, Susan Hohenberger
Matthew Green, Susan Hohenberger
Perfectly Secure Oblivious RAM Without Random Oracles
Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
Adaptive Concurrent Non-Malleability with Bare Public-Keys
Andrew C. Yao, Moti Yung, Yunlei Zhao
Andrew C. Yao, Moti Yung, Yunlei Zhao
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
Bias in the nonlinear filter generator output sequence
Sui-Guan Teo, Leonie Simpson, Ed Dawson
Sui-Guan Teo, Leonie Simpson, Ed Dawson
Avoiding Full Extension Field Arithmetic in Pairing Computations
Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
The Extended Access Control for Machine Readable Travel Documents
Rafik Chaabouni, Serge Vaudenay
Rafik Chaabouni, Serge Vaudenay
Constructing Verifiable Random Functions with Large Input Spaces
Susan Hohenberger, Brent Waters
Susan Hohenberger, Brent Waters
Fair Blind Signatures without Random Oracles
Georg Fuchsbauer, Damien Vergnaud
Georg Fuchsbauer, Damien Vergnaud
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security
Brett Hemenway, Steve Lu, Rafail Ostrovsky
Brett Hemenway, Steve Lu, Rafail Ostrovsky
On Homomorphic Encryption and Chosen-Ciphertext Security
Brett Hemenway, Rafail Ostrovsky
Brett Hemenway, Rafail Ostrovsky
A Zero-One Law for Deterministic 2-Party Secure Computation
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Parallel Enumeration of Shortest Lattice Vectors
Özgür Dagdelen, Michael Schneider
Özgür Dagdelen, Michael Schneider
Secret Sharing Extensions based on the Chinese Remainder Theorem
Kamer Kaya, Ali Aydın Selçuk
Kamer Kaya, Ali Aydın Selçuk
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
Kenneth G. Paterson, Gaven J. Watson
Kenneth G. Paterson, Gaven J. Watson
A Random Number Generator Based on Isogenies Operations
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
New Impossible Differential Attacks on AES
Zheng Yuan
Zheng Yuan
Security Weaknesses in Two Certificateless Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Odegaard, Thomas Peyrin, Martin Schläffer
Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Odegaard, Thomas Peyrin, Martin Schläffer
Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
An Efficient and Parallel Gaussian Sampler for Lattices
Chris Peikert
Chris Peikert
MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions
Christopher Wolf, Bart Preneel
Christopher Wolf, Bart Preneel
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model
Zvika Brakerski, Yael Tauman Kalai
Zvika Brakerski, Yael Tauman Kalai
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah, Eiji Okamoto
Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah, Eiji Okamoto
Attribute-based Authenticated Key Exchange
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
One Round Group Key Exchange with Forward Security in the Standard Model
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
Predicate-Based Key Exchange
James Birkett, Douglas Stebila
James Birkett, Douglas Stebila
The Eris hybrid cipher
Sandy Harris
Sandy Harris
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Multiple Bytes Differential Fault Analysis on CLEFIA
Xin-jie ZHAO, Tao WANG, Jing-zhe GAO
Xin-jie ZHAO, Tao WANG, Jing-zhe GAO
ECC2K-130 on Cell CPUs
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe
Private and Continual Release of Statistics
T-H. Hubert Chan, Elaine Shi, Dawn Song
T-H. Hubert Chan, Elaine Shi, Dawn Song
A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
Mehdi Vasef
Mehdi Vasef
Concurrent Knowledge Extraction in the Public-Key Model
Andrew C. Yao, Moti Yung, Yunlei Zhao
Andrew C. Yao, Moti Yung, Yunlei Zhao
Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook Koo, Yongjin Yeom, Junghwan Song
Bonwook Koo, Yongjin Yeom, Junghwan Song
Approximating Addition by XOR: how to go all the way
Didier Alquié
Didier Alquié
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
Didier Alquié
Didier Alquié
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles
Markus Rückert
Markus Rückert
Type-II Optimal Polynomial Bases
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Ernie Brickell, Jiangtao Li
Ernie Brickell, Jiangtao Li
Some Observations on TWIS Block Cipher
Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
An Anonymous ID-based Encryption Revisited
Zhengjun Cao
Zhengjun Cao
New Advances on Privacy-Preserving Policy Reconciliation
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
Differential Fault Analysis on SMS4 Using a Single Fault
Ruilin Li, Bing Sun, Chao Li, Jianxiong You
Ruilin Li, Bing Sun, Chao Li, Jianxiong You
Differential Cryptanalysis of SMS4 Block Cipher
Bozhan Su, Wenling Wu, Wentao Zhang
Bozhan Su, Wenling Wu, Wentao Zhang
Privacy-Preserving Matching Protocols for Attributes and Strings
Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu
Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu
Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding
Yongge Wang
Yongge Wang
A New Framework for RFID Privacy
Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao
Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao
Solinas primes of small weight for fixed sizes
José de Jesús Angel Angel, Guillermo Morales-Luna
José de Jesús Angel Angel, Guillermo Morales-Luna
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Cagdas Calik, Meltem Sonmez Turan
Cagdas Calik, Meltem Sonmez Turan
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Xin-jie ZHAO, Tao WANG
Xin-jie ZHAO, Tao WANG
Credential Authenticated Identification and Key Exchange
Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
An Improved Timing Attack with Error Detection on RSA-CRT
Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
Logical cryptoanalysis on the example of the cryptosystem DES
A. D. Plotnikov
A. D. Plotnikov
Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
FuShan Wei, QingFeng Cheng, ChuanGui Ma
FuShan Wei, QingFeng Cheng, ChuanGui Ma
A Principle for Cryptographic Protocols Beyond Security, Less Parameters
Zhengjun Cao
Zhengjun Cao
Authenticating Aggregate Range Queries over Multidimensional Dataset
Jia XU, Ee-Chien CHANG
Jia XU, Ee-Chien CHANG
On Symmetric Encryption and Point Obfuscation
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
He Debiao, Chen Jianhua, Hu Jin
He Debiao, Chen Jianhua, Hu Jin
Lower Bounds for Straight Line Factoring
Daniel R. L. Brown
Daniel R. L. Brown
A New Chaos-Based Cryptosystem for Secure Transmitted Images
Abir AWAD
Abir AWAD
Efficient chaotic permutations for image encryption algorithms
Abir AWAD
Abir AWAD
A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
Abir AWAD
Abir AWAD
Differential and invertibility properties of BLAKE (full version)
Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
A modified eCK model with stronger security for tripartite authenticated key exchange
Qingfeng Cheng, Chuangui Ma, Fushan Wei
Qingfeng Cheng, Chuangui Ma, Fushan Wei
The Effects of the Omission of Last Round's MixColumns on AES
Orr Dunkelman, Nathan Keller
Orr Dunkelman, Nathan Keller
Batch Groth-Sahai
Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields
Xiwang Cao, Lei Hu
Xiwang Cao, Lei Hu
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions
Arnaud Boscher, Helena Handschuh, Elena Trichina
Arnaud Boscher, Helena Handschuh, Elena Trichina
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Pierre-Alain Fouque, Mehdi Tibouchi
Pierre-Alain Fouque, Mehdi Tibouchi
An Enhanced Remote User Authentication Scheme
Keerti Srivastava, Amit K Awasthi, R. C. Mittal
Keerti Srivastava, Amit K Awasthi, R. C. Mittal
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro Hanaoka, Kaoru Kurosawa
Goichiro Hanaoka, Kaoru Kurosawa
On the order of the polynomial $x^p-x-a$
Xiwang Cao
Xiwang Cao
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
An Information Theoretic Perspective on the Differential Fault Analysis against AES
Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta
Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta
Class Invariants by the CRT Method
Andreas Enge, Andrew V. Sutherland
Andreas Enge, Andrew V. Sutherland
On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay
Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
Yuval Ishai, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
Yuval Ishai, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
A secure anonymous communication scheme in vehicular ad hoc networks from pairings
Jue-Sam Chou, Yalin Chen
Jue-Sam Chou, Yalin Chen
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings
Yalin Chen, Jue-Sam Chou, Xian-Wu Hou
Yalin Chen, Jue-Sam Chou, Xian-Wu Hou
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth
Xin-jie Zhao, Tao Wang
Xin-jie Zhao, Tao Wang
New Methodologies for Differential-Linear Cryptanalysis and Its Extensions
Jiqiang Lu
Jiqiang Lu
Authentication schemes from actions on graphs, groups, or rings
Dima Grigoriev, Vladimir Shpilrain
Dima Grigoriev, Vladimir Shpilrain
Differential Fault Analysis on AES with 192 and 256-Bit Keys
Junko Takahashi, Toshinori Fukunaga
Junko Takahashi, Toshinori Fukunaga
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
Number of Jacobi quartic curves over finite fields
Rongquan Feng, Hongfeng Wu
Rongquan Feng, Hongfeng Wu
Related-Key Boomerang and Rectangle Attacks
Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller
Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller
Scalability and Security Conflict for RFID Authentication Protocols
Imran Erguler, Emin Anarim
Imran Erguler, Emin Anarim
A new one-time signature scheme from syndrome decoding
Paulo S. L. M. Barreto, Rafael Misoczki
Paulo S. L. M. Barreto, Rafael Misoczki
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang
Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
Jorge Guajardo, Bart Mennink
Jorge Guajardo, Bart Mennink
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs
Mridul Nandi
Mridul Nandi
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
Orr Dunkelman, Nathan Keller, Adi Shamir
Orr Dunkelman, Nathan Keller, Adi Shamir
Differential Cache Trace Attack Against CLEFIA
Chester Rebeiro, Debdeep Mukhopadhyay
Chester Rebeiro, Debdeep Mukhopadhyay
Related Key Cryptanalysis of the LEX Stream Cipher
Mainack Mondal, Debdeep Mukhopadhyay
Mainack Mondal, Debdeep Mukhopadhyay
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
Xuelian Li, Yupu Hu, Juntao Gao
Xuelian Li, Yupu Hu, Juntao Gao
A DAA Scheme Requiring Less TPM Resources
Liqun Chen
Liqun Chen
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Factorization of a 768-bit RSA modulus
Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Alexander Kruppa, Peter Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, Paul Zimmermann
Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Alexander Kruppa, Peter Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, Paul Zimmermann
Skew-Frobenius map on twisted Edwards curve
Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng
Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng
Halving on Binary Edwards Curves
Qiping Lin, Fangguo Zhang
Qiping Lin, Fangguo Zhang
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
Practical ID-based Encryption for Wireless Sensor Network
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
Transfinite Cryptography
Jacques Patarin
Jacques Patarin
Reducing Elliptic Curve Logarithm to Logarithm in a Finite Field $\mathbb{F}_q$ for Some Orders
Wei Yu, Kunpeng Wang, Bao Li
Wei Yu, Kunpeng Wang, Bao Li
Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers
Xiao-shan Gao, Zhenyu Huang
Xiao-shan Gao, Zhenyu Huang
Obtaining More Karatsuba-Like Formulae over The Binary Field
Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam
Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam
Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature
Kazukuni Kobara
Kazukuni Kobara
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512}
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
Traitor-Tracing on Binary Strings
Michael J. Collins
Michael J. Collins
Cryptanalysis of Secure Message Transmission Protocols with Feedback
Qiushi Yang, Yvo Desmedt
Qiushi Yang, Yvo Desmedt
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang, Mun-Kyu Lee
DaeHun Nyang, Mun-Kyu Lee
Information-Theoretically Secure Protocols and Security Under Composition
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
A Comparative Analysis of Delay Based PUF Implementations on FPGA
Sergey Morozov, Abhranil Maiti, Patrick Schaumont
Sergey Morozov, Abhranil Maiti, Patrick Schaumont
Using Sphinx to Improve Onion Routing Circuit Construction
Aniket Kate, Ian Goldberg
Aniket Kate, Ian Goldberg
A Unified Method for Finding Impossible Differentials of Block Cipher Structures
Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong
Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong
Approximate Integer Common Divisor Problem relates to Implicit Factorization
Santanu Sarkar, Subhamoy Maitra
Santanu Sarkar, Subhamoy Maitra
Cryptographic Accumulators for Authenticated Hash Tables
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, Dennis Kuegler
Jens Bender, Marc Fischlin, Dennis Kuegler
Universally Constructing 12-th Degree Extension Field for Ate Pairing
Masaaki Shirase
Masaaki Shirase
A Strong Blind Signature Scheme over Braid Groups
WEI Yun, XIONG Guo-Hua, BAO Wan-Su, ZHANG Xing-Kai
WEI Yun, XIONG Guo-Hua, BAO Wan-Su, ZHANG Xing-Kai
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
Tibor Jager, Jörg Schwenk
Tibor Jager, Jörg Schwenk
Security of ECQV-Certified ECDSA Against Passive Adversaries
Daniel R. L. Brown, Matthew J. Campagna, Scott A. Vanstone
Daniel R. L. Brown, Matthew J. Campagna, Scott A. Vanstone
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger
Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger
Data-Depend Hash Algorithm
ZiJie Xu, Ke Xu
ZiJie Xu, Ke Xu
An efficient ID- based directed signature scheme from bilinear pairings
B. Umaprasada Rao, P. Vasudeva Reddy, T. Gowri
B. Umaprasada Rao, P. Vasudeva Reddy, T. Gowri
Fully Homomorphic Encryption over the Integers
Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
Faster Pairing Computations on Curves with High-Degree Twists
Craig Costello, Tanja Lange, Michael Naehrig
Craig Costello, Tanja Lange, Michael Naehrig
Secure Multiparty AES (full paper)
Ivan Damgård, Marcel Keller
Ivan Damgård, Marcel Keller
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
On the Impossibility of Batch Update for Cryptographic Accumulators
Philippe Camacho, Alejandro Hevia
Philippe Camacho, Alejandro Hevia
Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules
Lan Luo, QiongHai Dai, ZhiGuang Qin, ChunXiang Xu
Lan Luo, QiongHai Dai, ZhiGuang Qin, ChunXiang Xu
Security Analysis of A Remote User Authentication Protocol by Liao and Wang
Dang Nguyen Duc, Kwangjo Kim
Dang Nguyen Duc, Kwangjo Kim
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
Dang Nguyen Duc, Kwangjo Kim
Dang Nguyen Duc, Kwangjo Kim
Non-Malleable Codes
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Efficient Client Puzzles based on Repeated-Squaring
Ghassan O. Karame, Srdjan Capkun
Ghassan O. Karame, Srdjan Capkun
On a weakness of the Tu-Deng function and its repair
Claude Carlet
Claude Carlet
Solving the Shortest Lattice Vector Problem in Time 2^2.465n
Xavier Pujol, Damien Stehle
Xavier Pujol, Damien Stehle
Composition of Zero-Knowledge Proofs with Efficient Provers
Eleanor Birrell, Salil Vadhan
Eleanor Birrell, Salil Vadhan
An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations
Brian Baldwin, William P. Marnane
Brian Baldwin, William P. Marnane
Secure Ranging With Message Temporal Integrity
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Čapkun
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Čapkun
Parallel Shortest Lattice Vector Enumeration on Graphics Cards
Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
D. Fiore, R. Gennaro, N. P. Smart
D. Fiore, R. Gennaro, N. P. Smart
Groth--Sahai proofs revisited
E. Ghadafi, N. P. Smart, B. Warinschi
E. Ghadafi, N. P. Smart, B. Warinschi
On the Design and Implementation of an Efficient DAA Scheme
L. Chen, D. Page, N. P. Smart
L. Chen, D. Page, N. P. Smart
Twisted Jacobi Intersections Curves
Rongquan Feng, Menglong Nie, Hongfeng Wu
Rongquan Feng, Menglong Nie, Hongfeng Wu
Could SFLASH be repaired?
Jintai Ding, Vivien Dubois, Bo-Yin Yang, Owen Chia-Hsin Chen, Chen-Mou Cheng
Jintai Ding, Vivien Dubois, Bo-Yin Yang, Owen Chia-Hsin Chen, Chen-Mou Cheng
Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms
Endre Bangerter, Jan Camenisch, Stephan Krenn
Endre Bangerter, Jan Camenisch, Stephan Krenn
Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay, Kobbi Nissim
Carmit Hazay, Kobbi Nissim
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
From Passive to Covert Security at Low Cost
Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
Embedded SFE: Offloading Server and Network using Hardware Tokens
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
Information-set decoding for linear codes over Fq
Christiane Peters
Christiane Peters
Confidential Signatures and Deterministic Signcryption
Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schroder
Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schroder
Poly-Dragon: An efficient Multivariate Public Key Cryptosystem
Rajesh P. Singh, A. Saikia, B. K. Sarma
Rajesh P. Singh, A. Saikia, B. K. Sarma
A mean value formula for elliptic curves
Rongquan Feng, Hongfeng Wu
Rongquan Feng, Hongfeng Wu
An Improved Differential Fault Attack on Camellia
ZHAO Xin-jie, WANG Tao
ZHAO Xin-jie, WANG Tao
Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers
Yu Liu, Kaijie Wu, Ramesh Karri
Yu Liu, Kaijie Wu, Ramesh Karri
Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem
Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
A Game-Based Definition of Coercion-Resistance and its Applications
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
Ralf Kuesters, Tomasz Truderung, Andreas Vogt
A Diagonal Fault Attack on the Advanced Encryption Standard
Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
A complete set of addition laws\\for incomplete Edwards curves
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang, Sherman S. -M. Chow, Qian Wang, Kui Ren, Wenjing Lou
Cong Wang, Sherman S. -M. Chow, Qian Wang, Kui Ren, Wenjing Lou
Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps
Wenjian Xie, Zhang Zhang
Wenjian Xie, Zhang Zhang
On the nonlinearity profile of the Dillon function
Claude Carlet
Claude Carlet
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
Michael Tunstall, Debdeep Mukhopadhyay
Michael Tunstall, Debdeep Mukhopadhyay
Voting with unconditional privacy: CFSY for booth voting
Jeroen van de Graaf
Jeroen van de Graaf
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields
Leibo Li, Mingqiang Wang, Zhanjiang Xia
Leibo Li, Mingqiang Wang, Zhanjiang Xia
On the Equivalence of Two Models for Key-Dependent-Message Encryption
Alexander W. Dent
Alexander W. Dent
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
N. P. Smart, F. Vercauteren
N. P. Smart, F. Vercauteren
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
Secure Network Coding Over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
Ephemeral key compromise attack on the IB-KA protocol
Qingfeng Cheng, Chuangui Ma
Qingfeng Cheng, Chuangui Ma
Properties of the Discrete Differential with Cryptographic Applications
Daniel Smith-Tone
Daniel Smith-Tone
New Cryptosystems From CSP-Based Self-Distributive Systems
Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
Robert Granger, Michael Scott
Robert Granger, Michael Scott
Optimal pairing revisited
Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng
Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng
A Family of $p$-ary Binomial Bent Functions
Dabin Zheng, Xiangyong Zeng, Lei Hu
Dabin Zheng, Xiangyong Zeng, Lei Hu
How to pair with a human
Stefan Dziembowski
Stefan Dziembowski
Improvements on two password-based authentication protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
Manoj Kumar
Manoj Kumar
New Integral Distinguisher for Rijndael-256
Yuechuan Wei, Bing Sun, Chao Li
Yuechuan Wei, Bing Sun, Chao Li
Quantifying Trust
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
Towards a Theory of Trust Based Collaborative Search
Yacov Yacobi
Yacov Yacobi
Constructing Tower Extensions for the implementation of Pairing-Based Cryptography
Naomi Benger, Michael Scott
Naomi Benger, Michael Scott
An enhanced password authenticated key agreement protocol for wireless mobile network
Zhigang Gao, Dengguo Feng
Zhigang Gao, Dengguo Feng
ON A COMBINATORIAL CONJECTURE
T. W. CUSICK, YUAN LI, PANTELIMON STANICA
T. W. CUSICK, YUAN LI, PANTELIMON STANICA
Cryptanalysis of a key exchange scheme based on block matrices
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Pedro Taborda Duarte
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Pedro Taborda Duarte
Preimage Attacks on Reduced DHA-256
Jinmin Zhong, Xuejia Lai
Jinmin Zhong, Xuejia Lai
A Novel Design Method of Stream Ciphers Based on Table-Element Permutation
Hongbo Zou
Hongbo Zou
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito, Lei Wang, Kazuo Ohta
Yusuke Naito, Lei Wang, Kazuo Ohta
Making Collusion-Secure Codes (More) Robust against Bit Erasure
Koji Nuida
Koji Nuida
A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS
Stéphane BALLET, Robert ROLLAND
Stéphane BALLET, Robert ROLLAND
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Rosario Gennaro, Craig Gentry, Bryan Parno
Rosario Gennaro, Craig Gentry, Bryan Parno
Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC
Masao Kasahara
Masao Kasahara
Fuzzy extractors for continuous distributions
Ileana Buhan, Jeroen Doumen, Pieter Hartel
Ileana Buhan, Jeroen Doumen, Pieter Hartel
Connections between Quaternary and Binary Bent Functions
Patrick Solé, Natalia Tokareva
Patrick Solé, Natalia Tokareva
A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
Gildas Avoine, Muhammed Ali Bingol, Suleyman Kardas, Cedric Lauradoux, Benjamin Martin
Gildas Avoine, Muhammed Ali Bingol, Suleyman Kardas, Cedric Lauradoux, Benjamin Martin
Analysis of Intermediate Field Systems
Olivier Billet, Jacques Patarin, Yannick Seurin
Olivier Billet, Jacques Patarin, Yannick Seurin
Breaking ECC2K-130
Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang
Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
David Mandell Freeman
David Mandell Freeman
Covering Radius of Two-dimensional Lattices
Yupeng Jiang, Yingpu Deng, Yanbin Pan
Yupeng Jiang, Yingpu Deng, Yanbin Pan
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
Cryptanalysis of two knapsack public-key cryptosystems
Jingguo Bi, Xianmeng Meng, Lidong Han
Jingguo Bi, Xianmeng Meng, Lidong Han
Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
S. Wu
S. Wu
Weakness of a three-party password-based authenticated key exchange protocol
S. Wu
S. Wu
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
S. Wu
S. Wu
Finding composite order ordinary elliptic curves using the Cocks-Pinch method
D. Boneh, K. Rubin, A. Silverberg
D. Boneh, K. Rubin, A. Silverberg
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters
Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations
Henri Gilbert, Thomas Peyrin
Henri Gilbert, Thomas Peyrin
A New Proposal Against the Main of Generic Attacks
Xigen. Yao
Xigen. Yao
Oblivious Transfer with Access Control
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
New Fault Attack on Elliptic Curve Scalar Multiplication
Alexey Chilikov, Oleg Taraskin
Alexey Chilikov, Oleg Taraskin
An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
Seiko Arita
Seiko Arita
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
Jiazhe Chen, Keting Jia
Jiazhe Chen, Keting Jia
On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks
Somindu C. Ramanna, Palash Sarkar
Somindu C. Ramanna, Palash Sarkar
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
Petros Mol, Scott Yilek
Petros Mol, Scott Yilek
Differential Addition in generalized Edwards Coordinates
Benjamin Justus, Daniel Loebenberger
Benjamin Justus, Daniel Loebenberger
Isogenies of Elliptic Curves: A Computational Approach
Daniel Shumow
Daniel Shumow
An Efficient Secure Oblivious Transfer
Hung-Min Sun, Yalin Chen, Jue-Sam Chou
Hung-Min Sun, Yalin Chen, Jue-Sam Chou
Universally Composable Incoercibility
Dominique Unruh, Jörn Müller-Quade
Dominique Unruh, Jörn Müller-Quade
Secure Message Transmission with Small Public Discussion
Juan Garay, Clint Givens, Rafail Ostrovsky
Juan Garay, Clint Givens, Rafail Ostrovsky
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability
Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
New Constructions of Convertible Undeniable Signature Schemes without Random Oracles
Qiong Huang, Duncan S. Wong
Qiong Huang, Duncan S. Wong
Lightweight Cryptography - Cryptographic Engineering for a Pervasive World
Axel Poschmann
Axel Poschmann
Blake-Wilson, Johnson and Menezes Protocol Revisited
Hai Huang, Zhenfu Cao
Hai Huang, Zhenfu Cao
Generic One Round Group Key Exchange in the Standard Model
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzalez Nieto, Mark Manulis
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzalez Nieto, Mark Manulis
On the round complexity of black-box constructions of commitments secure against selective opening attacks
David Xiao
David Xiao
Public-Key Encryption in the Bounded-Retrieval Model
Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
Bounded Key-Dependent Message Security
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein
Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely
Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely
Practical Key Recovery Attacks On Two McEliece Variants
Valerie Gauthier Umana, Gregor Leander
Valerie Gauthier Umana, Gregor Leander
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Severin Winkler, Juerg Wullschleger
Severin Winkler, Juerg Wullschleger
Efficient Privacy-Preserving Face Recognition
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
Authenticated Key Exchange Protocols with Enhanced Freshness Properties
Hai Huang, Zhenfu Cao
Hai Huang, Zhenfu Cao
Insecure ``Provable Secure Network Coding''
Yongge Wang
Yongge Wang
Fault Attacks Against EMV Signatures
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
On second order nonlinearities of cubic monomial Boolean functions
Ruchi Gode, Sugata Gangopadhyay
Ruchi Gode, Sugata Gangopadhyay
Fast Implementations of AES on Various Platforms
Joppe W. Bos, Dag Arne Osvik, Deian Stefan
Joppe W. Bos, Dag Arne Osvik, Deian Stefan
Key Recovery Attack on QuiSci
Nils Reimers
Nils Reimers
Underlying Assumptions and Designated Verifier Signatures
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
NTRU based group oriented signature
Chunbo Ma, Jun Ao
Chunbo Ma, Jun Ao
Cube Attack on Courtois Toy Cipher
Piotr Mroczkowski, Janusz Szmidt
Piotr Mroczkowski, Janusz Szmidt
Anonymous Fuzzy Identity-based Encryption for Similarity Search
Ye Zhang, Nikos Mamoulis, David W. Cheung, S. M. Yiu, W. K. Wong
Ye Zhang, Nikos Mamoulis, David W. Cheung, S. M. Yiu, W. K. Wong
Security Weakness in Two Authenticated Key Exchange Protocols
Qingfeng Cheng, Chuangui Ma
Qingfeng Cheng, Chuangui Ma
A Framework for Universally Composable Non-Committing Blind Signatures
Masayuki Abe, Miyako Ohkubo
Masayuki Abe, Miyako Ohkubo
Remarks on Some Quantum Cryptographic Schemes
Zhengjun Cao
Zhengjun Cao
Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity
Emiliano De Cristofaro, Gene Tsudik
Emiliano De Cristofaro, Gene Tsudik
Cryptanalysis of Multiple-Server Password-Authenticated Key
Sang-Gon Lee
Sang-Gon Lee
Impossible Boomerang Attack for Block Cipher Structures
Jiali Choy, Huihui Yap
Jiali Choy, Huihui Yap
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh, A. Saikia, B. K. Sarma
Rajesh P Singh, A. Saikia, B. K. Sarma
Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
Allison Lewko, Brent Waters
Allison Lewko, Brent Waters
Black-Box Circular-Secure Encryption Beyond Affine Functions
Zvika Brakerski, Shafi Goldwasser, Yael Kalai
Zvika Brakerski, Shafi Goldwasser, Yael Kalai
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256
Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
On the Security of UOV
Jean-Charles Faugère, Ludovic Perret
Jean-Charles Faugère, Ludovic Perret
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
Allison Lewko, Brent Waters
Allison Lewko, Brent Waters
PPS: Privacy Preserving Statistics using RFID Tags
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited
Sanjit Chatterjee, Alfred Menezes
Sanjit Chatterjee, Alfred Menezes
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512
Yu Sasaki, Lei Wang, Kazumaro Aoki
Yu Sasaki, Lei Wang, Kazumaro Aoki
Pseudo-cryptanalysis of the Original Blue Midnight Wish
Søren S. Thomsen
Søren S. Thomsen
Preimages for Step-Reduced SHA-2
Jian Guo, Krystian Matusiewicz
Jian Guo, Krystian Matusiewicz
On the Security of PAS (Predicate-based Authentication Service)
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang
Double-Exponentiation in Factor-4 Groups and its Applications
Koray Karabina
Koray Karabina
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Scott Yilek
Scott Yilek
A Simple Power Analysis Attack on the Serpent Key Schedule
Kevin J. Compton, Brian Timm, Joel VanLaven
Kevin J. Compton, Brian Timm, Joel VanLaven
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
Madeline Gonzalez, Rainer Steinwandt
Madeline Gonzalez, Rainer Steinwandt
Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo, Liang Cui
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo, Liang Cui
On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, abhi shelat
Rafik Chaabouni, Helger Lipmaa, abhi shelat
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters
Julien Bringer, Herve Chabanne, Thomas Icart
Julien Bringer, Herve Chabanne, Thomas Icart
The LPN Problem with Auxiliary Input
Yu Yu
Yu Yu
The Certicom Challenges ECC2-X
Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
On Key Authentic Degree of Cryptosystem
WANG Yong, WANG Huangdeng
WANG Yong, WANG Huangdeng
On Linear Cryptanalysis with Many Linear Approximations
Benoit Gérard, Jean-Pierre Tillich
Benoit Gérard, Jean-Pierre Tillich
Certificateless KEM and Hybrid Signcryption Schemes Revisited
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC)
Bruce Kapron, Lior Malka, Venkatesh Srinivasan
Bruce Kapron, Lior Malka, Venkatesh Srinivasan
Asymptotic enumeration of correlation-immune boolean functions
E. Rodney Canfield, Zhicheng Gao, Catherine Greenhill, Brendan D. McKay, Robert W. Robinson
E. Rodney Canfield, Zhicheng Gao, Catherine Greenhill, Brendan D. McKay, Robert W. Robinson
Efficient Oblivious Polynomial Evaluation with Simulation-Based Security
Carmit Hazay, Yehuda Lindell
Carmit Hazay, Yehuda Lindell
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
Wei Yun, Xiong Guo-hua, Zhang Xing-kai, Bao Wan-su
Wei Yun, Xiong Guo-hua, Zhang Xing-kai, Bao Wan-su
A remark on the computation of cube roots in finite fields
Nozomu Nishihara, Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
Nozomu Nishihara, Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen
Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen
Identity-Based Hybrid Signcryption
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Jacob C. N. Schuldt, Kanta Matsuura
Jacob C. N. Schuldt, Kanta Matsuura
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Vlastimil Klima, Petr Susil
Vlastimil Klima, Petr Susil
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Christian Wieschebrink
Christian Wieschebrink
Efficient Certificateless KEM in the Standard Model
Georg Lippold, Colin Boyd, Juan González Nieto
Georg Lippold, Colin Boyd, Juan González Nieto
On Hierarchical Threshold Secret Sharing
Ali Aydin Selcuk, Kerem Kaskaloglu, Ferruh Ozbudak
Ali Aydin Selcuk, Kerem Kaskaloglu, Ferruh Ozbudak
One for All - All for One: Unifying Standard DPA Attacks
Stefan Mangard, Elisabeth Oswald, Francois-Xavier Standaert
Stefan Mangard, Elisabeth Oswald, Francois-Xavier Standaert
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds
Ning Ding, Dawu Gu, Bart Preneel
Ning Ding, Dawu Gu, Bart Preneel
ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS
Sunil Pandey, Praveen Kaushik, Dr. S. C. Shrivastava
Sunil Pandey, Praveen Kaushik, Dr. S. C. Shrivastava
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Ehsan Malekian, Ali Zakerolhosseini
Ehsan Malekian, Ali Zakerolhosseini
Computing Hilbert class polynomials with the Chinese Remainder Theorem
Andrew V. Sutherland
Andrew V. Sutherland
Secure and Efficient HB-CM Entity Authentication Protocol
Zhijun Li, Guang Gong, Zhiguang Qin
Zhijun Li, Guang Gong, Zhiguang Qin
Rebound Attack on the Full LANE Compression Function
Krystian Matusiewicz, Maria Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer
Krystian Matusiewicz, Maria Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer
Fuzzy Privacy Preserving Peer-to-Peer Reputation Management
Rishab Nithyanand, Karthik Raman
Rishab Nithyanand, Karthik Raman
An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP
Jayaprakash Kar, Banshidhar Majhi
Jayaprakash Kar, Banshidhar Majhi
A Multivariate Signature Scheme with an almost cyclic public key
Albrecht Petzoldt, Johannes Buchmann
Albrecht Petzoldt, Johannes Buchmann
A Fast Mental Poker Protocol
Tzer-jen Wei, Lih-Chung Wang
Tzer-jen Wei, Lih-Chung Wang
Improved Cryptanalysis of Skein
Jean-Philippe Aumasson, Cagdas Calik, Willi Meier, Onur Ozen, Raphael C. -W. Phan, Kerem Varici
Jean-Philippe Aumasson, Cagdas Calik, Willi Meier, Onur Ozen, Raphael C. -W. Phan, Kerem Varici
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
Shengbao Wang
Shengbao Wang
On the Connection between Signcryption and One-pass Key Establishment
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm
Laila El Aimani
Laila El Aimani
Tight Bounds for Protocols with Hybrid Security
Matthias Fitzi, Dominik Raub
Matthias Fitzi, Dominik Raub
Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra, C. Pandu Rangan
Arpita Patra, C. Pandu Rangan
Practical Distributed Key Generation Scheme
Chen Huiyan, Li Zichen, Fang Yong
Chen Huiyan, Li Zichen, Fang Yong
On the Design of Trivium
Yun Tian, Gongliang Chen, Jianhua Li
Yun Tian, Gongliang Chen, Jianhua Li
One-time-password-authenticated key exchange
Kenneth G. Paterson, Douglas Stebila
Kenneth G. Paterson, Douglas Stebila
Precise Time and Space Simulatable Zero-Knowledge
Ning Ding, Dawu Gu
Ning Ding, Dawu Gu
Efficiently from Semi-honest to Malicious OT via OLFE
Jürg Wullschleger
Jürg Wullschleger
Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware
Stephen R. Tate, Roopa Vishwanathan
Stephen R. Tate, Roopa Vishwanathan
Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes
Daniel Pasaila, Vlad Alexa, Sorin Iftene
Daniel Pasaila, Vlad Alexa, Sorin Iftene
Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol
Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu
Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu
Attacks on {RFID}-Based Electronic Voting Systems
Yossef Oren, Avishai Wool
Yossef Oren, Avishai Wool
How to Construct Identity-Based Signatures without the Key Escrow Problem
Tsz Hon Yuen, Willy Susilo, Yi Mu
Tsz Hon Yuen, Willy Susilo, Yi Mu
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers
Matthieu Rivain, Emmanuel Prouff, Julien Doget
Matthieu Rivain, Emmanuel Prouff, Julien Doget
An Efficient Method for Random Delay Generation in Embedded Software
Jean-Sébastien Coron, Ilya Kizhvatov
Jean-Sébastien Coron, Ilya Kizhvatov
Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?
Mihir Bellare, Dennis Hofheinz, Eike Kiltz
Mihir Bellare, Dennis Hofheinz, Eike Kiltz
More Differential Paths of TIB3
Harry Wiggins, Philip Hawkes, Gregory G. Rose, Cameron McDonald
Harry Wiggins, Philip Hawkes, Gregory G. Rose, Cameron McDonald
KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem
Carsten Elsner, Martin Schmidt
Carsten Elsner, Martin Schmidt
Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash
Ethan Heilman
Ethan Heilman
Security Bounds for the Design of Code-based Cryptosystems
Matthieu Finiasz, Nicolas Sendrier
Matthieu Finiasz, Nicolas Sendrier
Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
Jiang Wu, Douglas R. Stinson
Jiang Wu, Douglas R. Stinson
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
Nathan Keller, Stephen D. Miller
Nathan Keller, Stephen D. Miller
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich
A Tree Based Recursive Scheme for Space Efficient Secret Sharing
Abhishek Parakh, Subhash Kak
Abhishek Parakh, Subhash Kak
A Secure and Efficient Authenticated Diffie–Hellman Protocol
Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
Single Block Attacks and Statistical Tests on CubeHash
Benjamin Bloom, Alan Kaminsky
Benjamin Bloom, Alan Kaminsky
On-line Non-transferable Signatures Revisited
Jacob C. N. Schuldt, Kanta Matsuura
Jacob C. N. Schuldt, Kanta Matsuura
Generic Attacks on Misty Schemes -5 rounds is not enough-
Valerie Nachef, Jacques Patarin, Joana Treger
Valerie Nachef, Jacques Patarin, Joana Treger
Pairing-Friendly Elliptic Curves With Various Discriminants
Woo Sug Kang, Ki Taek Kim
Woo Sug Kang, Ki Taek Kim
On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)
Laila El Aimani
Laila El Aimani
AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time
Michael Vielhaber
Michael Vielhaber
Longest Common Subsequence as Private Search
Mark Gondree, Payman Mohassel
Mark Gondree, Payman Mohassel
Identity-Based Chameleon Hash Scheme Without Key Exposure
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim
Leakage-Resilient Storage
Francesco Davì, Stefan Dziembowski, Daniele Venturi
Francesco Davì, Stefan Dziembowski, Daniele Venturi
Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves
Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
Linear Cryptanalysis of Reduced-Round PRESENT
Joo Yeon Cho
Joo Yeon Cho
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
Ueli Maurer, Stefano Tessaro
Ueli Maurer, Stefano Tessaro
First CPIR Protocol with Data-Dependent Computation
Helger Lipmaa
Helger Lipmaa
Provably Secure Convertible Undeniable Signatures with Unambiguity
Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
Permutation Polynomials modulo $p^n$}
Rajesh P Singh, Soumen Maity
Rajesh P Singh, Soumen Maity
Computational Soundness for Key Exchange Protocols with Symmetric Encryption
Ralf Kuesters, Max Tuengerthal
Ralf Kuesters, Max Tuengerthal
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
Rikke Bendlin, Ivan Damgård
Rikke Bendlin, Ivan Damgård
Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments
Jens Groth
Jens Groth
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
A Simple Secret Sharing Scheme for Hierarchical Threshold Access Structures
Kerem Kaskaloglu, Ferruh Ozbudak
Kerem Kaskaloglu, Ferruh Ozbudak
Securing Plastic Money Using an RFID Based Protocol Stack
Rishab Nithyanand
Rishab Nithyanand
QTRU: A Lattice Attack Resistant Version of NTRU
Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan
Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
Brent Waters
Brent Waters
Practical Attacks on NESHA-256
Orr Dunkelman, Tor E. Bjørstad
Orr Dunkelman, Tor E. Bjørstad
A Registration Scheme to Allocate a Unique Identification Number
Manoj Kumar
Manoj Kumar
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
A short Note on Discrete Log Problem in $\mathbbF_p$
Habeeb Syed
Habeeb Syed
Untraceable Tags based on Mild Assumptions
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
Protecting Circuits from Computationally Bounded and Noisy Leakage
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
Detectable correlations in Edon-R
Peter Novotney, Niels Ferguson
Peter Novotney, Niels Ferguson
Chosen-Ciphertext Secure RSA-type Cryptosystems
Benoit Chevallier-Mames, Marc Joye
Benoit Chevallier-Mames, Marc Joye
Cryptanalysis of the Tillich-Zémor hash function
Markus Grassl, Ivana Ilic, Spyros Magliveras, Rainer Steinwandt
Markus Grassl, Ivana Ilic, Spyros Magliveras, Rainer Steinwandt
Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes
Masao KASAHARA
Masao KASAHARA
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
Utility Dependence in Correct and Fair Rational Secret Sharing
Gilad Asharov, Yehuda Lindell
Gilad Asharov, Yehuda Lindell
More on Key Wrapping
Rosario Gennaro, Shai Halevi
Rosario Gennaro, Shai Halevi
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran
Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran
A study of pairing computation for elliptic curves with embedding degree 15
Nadia El Mrabet, Nicolas Guillermin, Sorina Ionica
Nadia El Mrabet, Nicolas Guillermin, Sorina Ionica
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
Boris Skoric
Boris Skoric
A Simulation-Based Treatment of Authenticated Message Exchange
Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
Non-delegatable Identity-based Designated Verifier Signature
Qiong Huang, Willy Susilo, Duncan S. Wong
Qiong Huang, Willy Susilo, Duncan S. Wong
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
Yehuda Lindell, Hila Zarosim
Yehuda Lindell, Hila Zarosim
Space Efficient Secret Sharing: A Recursive Approach
Abhishek Parakh, Subhash Kak
Abhishek Parakh, Subhash Kak
Position Based Cryptography
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
Some Lattices Attacks on DSA and ECDSA
Dimitrios Poulakis
Dimitrios Poulakis
Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures
Laila El Aimani
Laila El Aimani
On the Security of a Proxy Blind Signature Scheme over Braid Groups
Manoj Kumar
Manoj Kumar
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography)
Chris Peikert
Chris Peikert
MAC Precomputation with Applications to Secure Memory
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
Impossible Differential Cryptanalysis of FOX
Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo
Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo
A Domain Extender for the Ideal Cipher
Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
Aniket Kate, Ian Goldberg
Aniket Kate, Ian Goldberg
Cache Timing Attacks on Camellia Block Cipher
ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan
ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
Berkant Ustaoglu
Berkant Ustaoglu
On the Duality of Probing and Fault Attacks
Berndt M. Gammel, Stefan Mangard
Berndt M. Gammel, Stefan Mangard
How to Delegate a Lattice Basis
David Cash, Dennis Hofheinz, Eike Kiltz
David Cash, Dennis Hofheinz, Eike Kiltz
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
Stefan Tillich, Martin Feldhofer, Wolfgang Issovits, Thomas Kern, Hermann Kureck, Michael Mühlberghuber, Georg Neubauer, Andreas Reiter, Armin Köfler, Mathias Mayrhofer
Stefan Tillich, Martin Feldhofer, Wolfgang Issovits, Thomas Kern, Hermann Kureck, Michael Mühlberghuber, Georg Neubauer, Andreas Reiter, Armin Köfler, Mathias Mayrhofer
A provably secure really source hiding designated verifier signature scheme based on random oracle model
Huang-Ta Huang, Jue-Sam Chou
Huang-Ta Huang, Jue-Sam Chou
An Efficient Concurrent Repetition Theorem
Douglas Wikström
Douglas Wikström
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
Anonymous ID Based Signcryption Scheme for Multiple Receivers
Sunder Lal, Prashant Kushwah
Sunder Lal, Prashant Kushwah
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
Xi Zhang, Min-Rong Chen, Xia Li
Xi Zhang, Min-Rong Chen, Xia Li
Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications
Kenneth Koon-Ho Wong, Gregory V. Bard, Robert H. Lewis
Kenneth Koon-Ho Wong, Gregory V. Bard, Robert H. Lewis
FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, L{\sc ane}, Shabal and Spectral Hash
Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane
Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane
Leakage Resilient Cryptography in Practice
Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Eric Brier, Jean-Sebastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
Eric Brier, Jean-Sebastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
A Novel ID-based Electronic Cash System from Pairings
Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun
Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun
Security weaknesses in two multi-server password based authentication protocols
Jue-Sam Chou, Chun-Hui Huang, Cheng-Chung Ding
Jue-Sam Chou, Chun-Hui Huang, Cheng-Chung Ding
A New Lattice-Based Cryptosystem Mixed with a Knapsack
Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
Partial Signatures and their Applications
Mihir Bellare, Shanshan Duan
Mihir Bellare, Shanshan Duan
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Attacking Reduced Rounds of the ARIA Block Cipher
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Hard Fault Analysis of Trivium
Yupu Hu, Fengrong Zhang, Yiwei Zhang
Yupu Hu, Fengrong Zhang, Yiwei Zhang
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
Ton van Deursen, Sasa Radomirovic
Ton van Deursen, Sasa Radomirovic
Security Notions and Generic Constructions for Client Puzzles
L. Chen, P. Morrissey, N. P. Smart, B. Warinschi
L. Chen, P. Morrissey, N. P. Smart, B. Warinschi
NTRU, quaternion algebra, public key cryptography
Ehsan Malekian, Ali Zakerolhosseini, Atefeh
Ehsan Malekian, Ali Zakerolhosseini, Atefeh
Efficient Approximation of Higher Order Boolean function in a Low Order Function
Mehreen Afzal, Ashraf Masood
Mehreen Afzal, Ashraf Masood
Flowchart description of security primitives for Controlled Physical Unclonable Functions
Boris Skoric, Marc X. Makkes
Boris Skoric, Marc X. Makkes
Simple Adaptive Oblivious Transfer Without Random Oracle
Kaoru Kurosawa, Ryo Nojima
Kaoru Kurosawa, Ryo Nojima
The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property
Gregory V. Bard
Gregory V. Bard
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
Mridul Nandi
Mridul Nandi
Group-Oriented Fair Exchange of Signatures
Qiong Huang, Duncan S. Wong, Willy Susilo
Qiong Huang, Duncan S. Wong, Willy Susilo
Factoring Unbalanced Moduli with Known Bits
Eric Brier, David Naccache, Mehdi Tibouchi
Eric Brier, David Naccache, Mehdi Tibouchi
Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS
Reynald Affeldt, David Nowak, Kiyoshi Yamada
Reynald Affeldt, David Nowak, Kiyoshi Yamada
Tweakable Enciphering Schemes From Stream Ciphers With IV
Palash Sarkar
Palash Sarkar
Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures
Georg Fuchsbauer
Georg Fuchsbauer
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring
Xiaofeng Chen, Haibo Tian, Fangguo Zhang
Xiaofeng Chen, Haibo Tian, Fangguo Zhang
The Fermat factorization method revisited
Robert ERRA, Christophe GRENIER
Robert ERRA, Christophe GRENIER
Related-key Cryptanalysis of the Full AES-192 and AES-256
Alex Biryukov, Dmitry Khovratovich
Alex Biryukov, Dmitry Khovratovich
An Efficient Password Security of Key Exchange Protocol based on ECDLP
Jayaprakash Kar, Banshidhar Majhi
Jayaprakash Kar, Banshidhar Majhi
Breaking RSA-based PIN Encryption with thirty ciphertext validity queries
N. P. Smart
N. P. Smart
Secure Two-Party Computation is Practical
B. Pinkas, T. Schneider, N. P. Smart, S. Williams
B. Pinkas, T. Schneider, N. P. Smart, S. Williams
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Nigel P. Smart, Bogdan Warinschi
Nigel P. Smart, Bogdan Warinschi
Jacobi Quartic Curves Revisited
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
RFID distance bounding protocol with mixed challenges to prevent relay attacks
Chong Hee Kim, Gildas Avoine
Chong Hee Kim, Gildas Avoine
Fault Attacks on RSA Signatures with Partially Unknown Messages
Jean-Sebastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier
Jean-Sebastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier
A note on the Certificateless Multi-receiver Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Anonymous Signatures Revisited
Vishal Saraswat, Aaram Yun
Vishal Saraswat, Aaram Yun
Authentic Time-Stamps for Archival Storage
Alina Oprea, Kevin D. Bowers
Alina Oprea, Kevin D. Bowers
Improved generic algorithms for 3-collisions
Antoine Joux, Stefan Lucks
Antoine Joux, Stefan Lucks
Factor-4 and 6 Compression of Cyclotomic Subgroups
Koray Karabina
Koray Karabina
Key extraction from general non-discrete signals
E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, B. Skoric
E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, B. Skoric
Cryptanalysis of ESSENCE
Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
Yuyin Yu, Mingsheng Wang
Yuyin Yu, Mingsheng Wang
Universally Composable Contributory Group Key Exchange
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzàlez Nieto
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzàlez Nieto
On the security of oscillator-based random number generators
Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux
Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
A New Improved Distinguisher for HC-128
Subhabrata Sen, Rudradev Sengupta, Subhamoy Maitra, Goutam Paul, Shashwat Raizada
Subhabrata Sen, Rudradev Sengupta, Subhamoy Maitra, Goutam Paul, Shashwat Raizada
Perfectly Balanced Functions in Symbolic Dynamics
O. A. Logachev, A. A. Salnikov, S. V. Smyshlyaev, V. V. Yashchenko
O. A. Logachev, A. A. Salnikov, S. V. Smyshlyaev, V. V. Yashchenko
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing
Roman Schlegel, Duncan S. Wong
Roman Schlegel, Duncan S. Wong
Enhancing Attribute-based Encryption with Attribute Hierarchy
Jin Li, Qian Wang, Cong Wang, Kui Ren
Jin Li, Qian Wang, Cong Wang, Kui Ren
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
Security Analysis of Aggregate signature and Batch verification signature schemes
S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan
Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
Erik Zenner
Erik Zenner
Efficient Key Exchange with Tight Security Reduction
Jiang Wu, Berkant Ustaoglu
Jiang Wu, Berkant Ustaoglu
Generic Attacks on Alternating Unbalanced Feistel Schemes
Valerie Nachef
Valerie Nachef
On Privacy Losses in the Trusted Agent Model (Abstract)
Paulo Mateus, Serge Vaudenay
Paulo Mateus, Serge Vaudenay
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
Privacy-aware Attribute-based Encryption with User Accountability
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
Short and Stateless Signatures from the RSA Assumption
Susan Hohenberger, Brent Waters
Susan Hohenberger, Brent Waters
Leakage-Resilient Signatures
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
Enabling Public Verifiability and Data Dynamics for Storage Security
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
Universally Anonymous IBE based on the Quadratic Residuosity Assumption
Giuseppe Ateniese, Paolo Gasti
Giuseppe Ateniese, Paolo Gasti
Algebraic Side-Channel Attacks
Mathieu Renauld, Francois-Xavier Standaert
Mathieu Renauld, Francois-Xavier Standaert
Towards Electrical, Integrated Implementations of SIMPL Systems
Ulrich Rührmair, Qingqing Chen, Paolo Lugli, Ulf Schlichtmann, Martin Stutzmann, György Csaba
Ulrich Rührmair, Qingqing Chen, Paolo Lugli, Ulf Schlichtmann, Martin Stutzmann, György Csaba
On the Foundations of Physical Unclonable Functions
Ulrich Rührmair, Jan Sölter, Frank Sehnke
Ulrich Rührmair, Jan Sölter, Frank Sehnke
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez
Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez
Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit)
Thomas Dullien
Thomas Dullien
A Collision-resistance Hash Function DIHA2
Xigen. Yao
Xigen. Yao
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
Ziran Tu, Yingpu Deng
Ziran Tu, Yingpu Deng
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems
Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model
Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento
Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento
Side-channel attacks based on linear approximations
Thomas Roche, Cédric Tavernier
Thomas Roche, Cédric Tavernier
Dealer-Free Dynamic Secret Sharing Schemes with Unconditional Security
Mehrdad Nojoumian, Douglas R. Stinson
Mehrdad Nojoumian, Douglas R. Stinson
Simulation based security in the applied pi calculus
Stéphanie Delaune, Steve Kremer, Olivier Pereira
Stéphanie Delaune, Steve Kremer, Olivier Pereira
Pseudorandomness Analysis of the Lai-Massey Scheme
Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu
Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu
Revisiting the Indifferentiability of PGV Hash Functions
Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai
Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai
Proposal of PPS Multivariate Public Key Cryptosystems
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita, Masao Kasahara
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita, Masao Kasahara
General Error Decodable Secret Sharing Scheme and Its Application
Kaoru Kurosawa
Kaoru Kurosawa
Computationally Secure Two-Round Authenticated Message Exchange
Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
Security of Cyclic Double Block Length Hash Functions including Abreast-DM
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Ewan Fleischmann, Michael Gorski, Stefan Lucks
A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs
Kota Ideguchi, Toru Owada, Hirotaka Yoshida
Kota Ideguchi, Toru Owada, Hirotaka Yoshida
Differential Path for SHA-1 with complexity $O(2^{52})$
Cameron McDonald, Philip Hawkes, Josef Pieprzyk
Cameron McDonald, Philip Hawkes, Josef Pieprzyk
FACTORIZATION WITH GENUS 2 CURVES
Romain COSSET
Romain COSSET
FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION
Ulf T. Mattsson
Ulf T. Mattsson
Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher
Zhiqiang Liu, Dawu Gu, Jing Zhang
Zhiqiang Liu, Dawu Gu, Jing Zhang
SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions
Ulrich Rührmair
Ulrich Rührmair
Improvement of One Quantum Encryption Scheme
Zhengjun Cao
Zhengjun Cao
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J. F. Cremers
Cas J. F. Cremers
Sparse Boolean equations and circuit lattices
Igor Semaev
Igor Semaev
Format-Preserving Encryption
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
Modifications in the Design of Trivium to Increase its Security Level
Mehreen Afzal, Ashraf Masood
Mehreen Afzal, Ashraf Masood
Symbolic Encryption with Pseudorandom Keys
Daniele Micciancio
Daniele Micciancio
Cryptanalysis of the MST_3 Public Key Cryptosystem
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
On the Necessary and Sufficient Assumptions for UC Computation
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions
György Csaba, Xueming Ju, Qingqing Chen, Wolfgang Porod, Jürgen Schmidhuber, Ulf Schlichtmann, Paolo Lugli, Ulrich Rührmair
György Csaba, Xueming Ju, Qingqing Chen, Wolfgang Porod, Jürgen Schmidhuber, Ulf Schlichtmann, Paolo Lugli, Ulrich Rührmair
Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring
Naoki Ogura, Shigenori Uchiyama
Naoki Ogura, Shigenori Uchiyama
Tardos Fingerprinting Codes in the Combined Digit Model
Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet U. Celik
Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet U. Celik
Faster Pairings on Special Weierstrass Curves
Craig Costello, Huseyin Hisil, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
Craig Costello, Huseyin Hisil, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
Examples of differential multicollisions for 13 and 14 rounds of AES-256
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
Group Testing and Batch Verification
Gregory M. Zaverucha, Douglas R. Stinson
Gregory M. Zaverucha, Douglas R. Stinson
Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations
Julien Bringer, Herve Chabanne, Jean-Luc Danger
Julien Bringer, Herve Chabanne, Jean-Luc Danger
Attacks on Round-Reduced BLAKE
LI Ji, XU Liangyu
LI Ji, XU Liangyu
Remarks on One Arbitrated Quantum-signature Scheme
Zhengjun Cao
Zhengjun Cao
Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics
Fumiyuki Momose, Jinhui Chao
Fumiyuki Momose, Jinhui Chao
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function
Rune Steinsmo Ødegård, Danilo Gligoroski
Rune Steinsmo Ødegård, Danilo Gligoroski
A strategy for recovering roots of bivariate polynomials modulo a prime
Paula Bustillo, Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
Paula Bustillo, Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
MeshHash2
Björn Fay
Björn Fay
Practical DPA Attacks on MDPL
Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
Adaptively Secure Broadcast
Martin Hirt, Vassilis Zikas
Martin Hirt, Vassilis Zikas
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater
Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater
Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis
Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
Computational soundness, co-induction, and encryption cycles
Daniele Micciancio
Daniele Micciancio
How to Hash into Elliptic Curves
Thomas Icart
Thomas Icart
The Security of Abreast-DM in the Ideal Cipher Model
Jooyoung Lee, Daesung Kwon
Jooyoung Lee, Daesung Kwon
Pseudo-Cryptanalysis of Luffa
Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie, Dengguo Feng
Tao Xie, Dengguo Feng
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt
Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt
Boneh-Boyen signatures and the Strong Diffie-Hellman problem
David Jao, Kayo Yoshida
David Jao, Kayo Yoshida
Signature Schemes with Bounded Leakage Resilience
Jonathan Katz
Jonathan Katz
Strongly Secure Certificateless Key Agreement
Georg Lippold, Colin Boyd, Juan González Nieto
Georg Lippold, Colin Boyd, Juan González Nieto
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128
Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
Palash Sarkar
Palash Sarkar
Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher
Palash Sarkar
Palash Sarkar
A Simple and Generic Construction of Authenticated Encryption With Associated Data
Palash Sarkar
Palash Sarkar
An Optimally Fair Coin Toss
Tal Moran, Moni Naor, Gil Segev
Tal Moran, Moni Naor, Gil Segev
Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion
Richard Moloney, Gary McGuire, Michael Markowitz
Richard Moloney, Gary McGuire, Michael Markowitz
A Flyweight RFID Authentication Protocol
Mike Burmester, Jorge Munilla
Mike Burmester, Jorge Munilla
Bringing Zero-Knowledge Proofs of Knowledge to Practice
Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
Sufficient conditions for sound tree and sequential hashing modes
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
On Directed Transitive Signature
Jia Xu, Ee-Chien Chang, Jianying Zhou
Jia Xu, Ee-Chien Chang, Jianying Zhou
PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS
Rajesh P Singh, B. K. Sarma, A. Saikia
Rajesh P Singh, B. K. Sarma, A. Saikia
Unconditionally Secure Social Secret Sharing Scheme
Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger
Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger
On Optimized FPGA Implementations of the SHA-3 Candidate Groestl
Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo
Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo
GUC-Secure Join Operator in Distributed Relational Database
TIAN Yuan
TIAN Yuan
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES
Alawi A. Al-Saggaf, Acharya H. S.
Alawi A. Al-Saggaf, Acharya H. S.
Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)
Mohamed Abo El-Fotouh, Klaus Diepold
Mohamed Abo El-Fotouh, Klaus Diepold
A Survey on the Evolution of Cryptographic Protocols in ePassports
Rishab Nithyanand
Rishab Nithyanand
Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers
Emmanuel Bresson, Anne Canteaut, Benoit Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-Francois Misarsky, Maria Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-Rene Reinhard, Celine Thuillet, Marion Videau
Emmanuel Bresson, Anne Canteaut, Benoit Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-Francois Misarsky, Maria Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-Rene Reinhard, Celine Thuillet, Marion Videau
DAA: Fixing the pairing based protocols
L Chen, P. Morrissey, N. P. Smart
L Chen, P. Morrissey, N. P. Smart
Practical pseudo-collisions for hash functions ARIRANG-224/384
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
Analysis of one quantum bit string commitment
Zhengjun Cao
Zhengjun Cao
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
Analysis and Enhance of Anonymous Signcryption Scheme
Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang
Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang
Generalization of Barreto et al ID based Signcryption Scheme
Sunder Lal, Prashant Kushwah
Sunder Lal, Prashant Kushwah
Linkability of Blind Signature Schemes over Braid Groups
Manoj Kumar
Manoj Kumar
New logic minimization techniques with applications to cryptology.
Joan Boyar, Rene Peralta
Joan Boyar, Rene Peralta
The discrete logarithm problem in the group of non-singular circulant matrices
Ayan Mahalanobis
Ayan Mahalanobis
Efficient Unidirectional Proxy Re-Encryption
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
Breaking and Building of Group Inside Signature
S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopinath, C. Pandu Rangan
S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopinath, C. Pandu Rangan
Compact McEliece Keys from Goppa Codes
Rafael Misoczki, Paulo S. L. M. Barreto
Rafael Misoczki, Paulo S. L. M. Barreto
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
Nicolas T. Courtois, Gregory V. Bard, Shaun V. Ault
Nicolas T. Courtois, Gregory V. Bard, Shaun V. Ault
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane
Cryptanalysis of Dynamic SHA(2)
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
Proactive Linear Integer Secret Sharing
Rune Thorbek
Rune Thorbek
Extended Substitution Cipher Chaining mode (ESCC)
Mohamed Abo El-Fotouh, Klaus Diepold
Mohamed Abo El-Fotouh, Klaus Diepold
PSP: Private and Secure Payment with RFID
Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe
Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe
Collaborative, Privacy-Preserving Data Aggregation at Scale
Haakon Ringberg, Benny Applebaum, Michael J. Freedman, Matthew Caesar, Jennifer Rexford
Haakon Ringberg, Benny Applebaum, Michael J. Freedman, Matthew Caesar, Jennifer Rexford
Near-Collision Attack on the Compression Function of Dynamic SHA2
Hongbo Yu, Xiaoyun Wang
Hongbo Yu, Xiaoyun Wang
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version)
Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
A novel multi-server authentication protocol
Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)
Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
Making the Diffie-Hellman Protocol Identity-Based
Dario Fiore, Rosario Gennaro
Dario Fiore, Rosario Gennaro
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
Patrick Longa, Catherine Gebotys
Patrick Longa, Catherine Gebotys
A new Protocol for 1-2 Oblivious Transfer
Bjoern Grohmann
Bjoern Grohmann
On the Theory and Practice of Personal Digital Signatures
Ivan Damgård, Gert Læssøe Mikkelsen
Ivan Damgård, Gert Læssøe Mikkelsen
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
Floating Fault analysis of Trivium under Weaker Assumptions
Hu Yupu, Gao Juntao, Liu Qing
Hu Yupu, Gao Juntao, Liu Qing
A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH)
Michael A. Halcrow, Niels Ferguson
Michael A. Halcrow, Niels Ferguson
A new approach for FCSRs
François Arnault, Thierry Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse
François Arnault, Thierry Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse
I shall love you up to the death
Valerie Nachef, Jacques Patarin
Valerie Nachef, Jacques Patarin
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Matthieu Rivain
Matthieu Rivain
CCA-Secure Proxy Re-Encryption without Pairings
Jun Shao, Zhenfu Cao
Jun Shao, Zhenfu Cao
A New Key-Agreement-Protocol
Bjoern Grohmann
Bjoern Grohmann
Certificateless Hybrid Signcryption
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
Built-in Determined Sub-key Correlation Power Analysis
Yuichi Komano, Hideo Shimizu, Shinichi Kawamura
Yuichi Komano, Hideo Shimizu, Shinichi Kawamura
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Joel Alwen, Yevgeniy Dodis, Daniel Wichs
Joel Alwen, Yevgeniy Dodis, Daniel Wichs
Hardware Implementation of the SHA-3 Candidate Skein
Stefan Tillich
Stefan Tillich
Security Analysis of a Proxy Signature Scheme over Braid Groups
Manoj Kumar
Manoj Kumar
Efficient Halving for Genus 3 Curves over Binary Fields
Peter Birkner, Nicolas Thériault
Peter Birkner, Nicolas Thériault
A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution
Anupam Pattanayak, B. Majhi
Anupam Pattanayak, B. Majhi
Faster Computation of the Tate Pairing
Christophe Arene, Tanja Lange, Michael Naehrig, Christophe Ritzenthaler
Christophe Arene, Tanja Lange, Michael Naehrig, Christophe Ritzenthaler
Algorithms to solve massively under-defined systems of multivariate quadratic equations
Yasufumi Hashimoto
Yasufumi Hashimoto
A new bound for t−wise almost universal hash functions
Long Hoang Nguyen, A. W. Roscoe
Long Hoang Nguyen, A. W. Roscoe
FaceTrust: Assessing the Credibility of Online Personas via Social Networks
Michael Sirivianos
Michael Sirivianos
Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm
Shaohua Zhang
Shaohua Zhang
Efficient group authentication protocols based on human interaction
Long Hoang Nguyen, A. W. Roscoe
Long Hoang Nguyen, A. W. Roscoe
Secure EPC Gen2 compliant Radio Frequency Identification
Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
Secret Handshake: Strong Anonymity Definition and Construction
Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
Preimage Attack on ARIRANG
Deukjo Hong, Woo-Hwan Kim, Bonwook Koo
Deukjo Hong, Woo-Hwan Kim, Bonwook Koo
Transferable Constant-Size Fair E-Cash
Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
Security of Permutation-based Compression Function lp 231
Jooyoung Lee, Daesung Kwon
Jooyoung Lee, Daesung Kwon
On the security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Multiple and Unlinkable Public Key Encryption without Certificates
Soyoung Park, Sang-Ho Lee, Joohan Lee
Soyoung Park, Sang-Ho Lee, Joohan Lee
Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems
Ronald Cramer, Dennis Hofheinz, Eike Kiltz
Ronald Cramer, Dennis Hofheinz, Eike Kiltz
Ideal Hierarchical Secret Sharing Schemes
Oriol Farras, Carles Padro
Oriol Farras, Carles Padro
The Analysis of Galois Substitution Counter Mode (GSCM)
Mohamed Abo El-Fotouh, Klaus Diepold
Mohamed Abo El-Fotouh, Klaus Diepold
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Chunbo Ma, Jun Ao
Chunbo Ma, Jun Ao
A Hybrid RFID Protocol against Tracking Attacks
Jen-Chun Chang, Hsin-Lung Wu
Jen-Chun Chang, Hsin-Lung Wu
The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime
Nicolas T. Courtois
Nicolas T. Courtois
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto
Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto
Practical Key Recovery Attack against Secret-prefix Edon-R
Gaëtan Leurent
Gaëtan Leurent
A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity
Yindong Chen, Peizhong Lu
Yindong Chen, Peizhong Lu
Signature Schemes with Bounded Leakage Resilience
Jonathan Katz
Jonathan Katz
A New Lattice for Implicit Factoring
Yanbin Pan, Yingpu Deng
Yanbin Pan, Yingpu Deng
Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited
Anupam Pattanayak, B. Majhi
Anupam Pattanayak, B. Majhi
Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity
Yindong Chen, Peizhong Lu
Yindong Chen, Peizhong Lu
Faster and Timing-Attack Resistant AES-GCM
Emilia Kasper, Peter Schwabe
Emilia Kasper, Peter Schwabe
Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator
Lu Xiao, Gregory G. Rose
Lu Xiao, Gregory G. Rose
Side Channel Cube Attacks on Block Ciphers
Itai Dinur, Adi Shamir
Itai Dinur, Adi Shamir
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak F Shahandashti, Reihaneh Safavi-Naini
Siamak F Shahandashti, Reihaneh Safavi-Naini
A Full Key Recovery Attack on HMAC-AURORA-512
Yu Sasaki
Yu Sasaki
Practical Secure Evaluation of Semi-Private Functions
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
On the Complexity of Integer Factorization
N. A. Carella
N. A. Carella
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
Optimized Public Key Infrastructure -- A PKI to Support Efficient Document's Signatures
Martín Augusto Gagliotti Vigil, Ricardo Felipe Custódio, Nelson da Silva, Ricardo Moraes
Martín Augusto Gagliotti Vigil, Ricardo Felipe Custódio, Nelson da Silva, Ricardo Moraes
On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R
Danilo Gligoroski, Rune Steinsmo Ødegård
Danilo Gligoroski, Rune Steinsmo Ødegård
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
Marcel Medwed
Marcel Medwed
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
Jin Li, Kui Ren, Kwangjo Kim
Jin Li, Kui Ren, Kwangjo Kim
Changing probabilities of differentials and linear sums via isomorphisms of ciphers
Alexander Rostovtsev
Alexander Rostovtsev
Information Theoretically Secure Multi Party Set Intersection Re-Visited
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Scalable Compilers for Group Key Establishment : Two/Three Party to Group
S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan
S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan
Weakness of Key Predistribution Scheme Proposed by J. Dong et al.
Anupam Pattanayak, B. Majhi
Anupam Pattanayak, B. Majhi
Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
Niels Ferguson, Stefan Lucks
Niels Ferguson, Stefan Lucks
A 2nd-Preimage Attack on AURORA-512
Yu Sasaki
Yu Sasaki
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
On the Security of Stream Cipher CryptMT v3
Haina Zhang, Xiaoyun Wang
Haina Zhang, Xiaoyun Wang
Cryptanalysis of Stream Cipher Grain Family
Haina Zhang, Xiaoyun Wang
Haina Zhang, Xiaoyun Wang
Further Results on Implicit Factoring in Polynomial Time
Santanu Sarkar, Subhamoy Maitra
Santanu Sarkar, Subhamoy Maitra
Compact E-Cash and Simulatable VRFs Revisited
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
A Collision Attack on AURORA-512
Yu Sasaki
Yu Sasaki
Public-Key Cryptosystems Resilient to Key Leakage
Moni Naor, Gil Segev
Moni Naor, Gil Segev
1024 - A High Security Software Oriented Block Cipher
Dieter Schmidt
Dieter Schmidt
Constructing pairing-friendly hyperelliptic curves using Weil restriction
David Mandell Freeman, Takakazu Satoh
David Mandell Freeman, Takakazu Satoh
A Step Towards QC Blind Signatures
Raphael Overbeck
Raphael Overbeck
Encryption Schemes Secure under Selective Opening Attack
Mihir Bellare, Scott Yilek
Mihir Bellare, Scott Yilek
Computing the endomorphism ring of an ordinary elliptic curve over a finite field
Gaetan Bisson, Andrew V. Sutherland
Gaetan Bisson, Andrew V. Sutherland
A Single Initialization Server for Multi-Party Cryptography
Hugue Blier, Alain Tapp
Hugue Blier, Alain Tapp
Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz
Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz
Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures
Brian J. Matt
Brian J. Matt
A note on the security of MST3
M. I. Gonzalez Vasco, A. L. Perez del Pozo, P. Taborda Duarte
M. I. Gonzalez Vasco, A. L. Perez del Pozo, P. Taborda Duarte
Enhanced Privacy ID from Bilinear Pairing
Ernie Brickell, Jiangtao Li
Ernie Brickell, Jiangtao Li
On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions
Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
Cascade Encryption Revisited
Peter Gazi, Ueli Maurer
Peter Gazi, Ueli Maurer
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
Jung Hee Cheon, Jeongdae Hong, Gene Tsudik
Jung Hee Cheon, Jeongdae Hong, Gene Tsudik
Knapsack Cryptosystem on Elliptic Curves
Koichiro Noro, Kunikatsu Kobayashi
Koichiro Noro, Kunikatsu Kobayashi
A Brief History of Provably-Secure Public-Key Encryption
Alexander W. Dent
Alexander W. Dent
A Provably Secure And Efficient Countermeasure Against Timing Attacks
Boris Köpf, Markus Dürmuth
Boris Köpf, Markus Dürmuth
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
Brett Hemenway, Benoit Libert, Rafail Ostrovsky, Damien Vergnaud
Brett Hemenway, Benoit Libert, Rafail Ostrovsky, Damien Vergnaud
Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication Per Multiplication Gate
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Point Compression for Koblitz Elliptic Curves
P. N. J. Eagle, Steven D. Galbraith, John Ong
P. N. J. Eagle, Steven D. Galbraith, John Ong
UC-Secure Source Routing Protocol
Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li
Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare, Thomas Ristenpart
Mihir Bellare, Thomas Ristenpart
Multi-authority attribute based encryption with honest-but-curious central authority
Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktoria I. Villanyi
Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktoria I. Villanyi
The Case for Quantum Key Distribution
Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
Ensuring Data Storage Security in Cloud Computing
Cong Wang, Qian Wang, Kui Ren, Wenjing Lou
Cong Wang, Qian Wang, Kui Ren, Wenjing Lou
CoSP: A General Framework For Computational Soundness Proofs
Michael Backes, Dennis Hofheinz, Dominique Unruh
Michael Backes, Dennis Hofheinz, Dominique Unruh
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin, Cas Cremers
David Basin, Cas Cremers
Attacks on the DECT authentication mechanisms
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions
Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Antoine Joux
Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Antoine Joux
Construction of large families of pseudorandom subsets using elliptic curves
Zhixiong Chen, Chenhuang Wu
Zhixiong Chen, Chenhuang Wu
Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
Computational Oblivious Transfer and Interactive Hashing
Kirill Morozov, George Savvides
Kirill Morozov, George Savvides
Automatic Approach of Provable Security and its Application for OAEP+
GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
Implementing cryptographic pairings: a magma tutorial
Luis J Dominguez Perez, Ezekiel J Kachisa, Michael Scott
Luis J Dominguez Perez, Ezekiel J Kachisa, Michael Scott
Secret sharing on trees: problem solved
Laszlo Csirmaz, Gabor Tardos
Laszlo Csirmaz, Gabor Tardos
Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis
Omran Ahmadi, Francisco Rodríguez-Henriquez
Omran Ahmadi, Francisco Rodríguez-Henriquez
Optimistic Fair Exchange with Multiple Arbiters
Alptekin Kupcu, Anna Lysyanskaya
Alptekin Kupcu, Anna Lysyanskaya
Overview of Turbo-Code Reconstruction Techniques
Johann Barbier, Eric Filiol
Johann Barbier, Eric Filiol
On fractional correlation immunity of majority functions
Chuan-Kun Wu
Chuan-Kun Wu
Adaptive Preimage Resistance and Permutation-based Hash Functions
Jooyoung Lee, Je Hong Park
Jooyoung Lee, Je Hong Park
Foundations of Non-Malleable Hash and One-Way Functions
Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
On the Data Complexity of Statistical Attacks Against Block Ciphers (full version)
Céline Blondeau, Benoît Gérard
Céline Blondeau, Benoît Gérard
CCZ-equivalence and Boolean functions
Lilya Budaghyan, Claude Carlet
Lilya Budaghyan, Claude Carlet
On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
Subhamoy Maitra, Santanu Sarkar
Subhamoy Maitra, Santanu Sarkar
Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko
Comparing Two Pairing-Based Aggregate Signature Schemes
Sanjit Chatterjee, Darrel Hankerson, Edward Knapp, Alfred Menezes
Sanjit Chatterjee, Darrel Hankerson, Edward Knapp, Alfred Menezes
On the impossibility of graph secret sharing
Laszlo Csirmaz
Laszlo Csirmaz
On Generalization of Cheon's Algorithm
Takakazu Satoh
Takakazu Satoh
Anonymity in Shared Symmetric Key Primitives
Gregory M. Zaverucha, Douglas R. Stinson
Gregory M. Zaverucha, Douglas R. Stinson
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rainer Leupers, Rudolf Mathar, Heinrich Meyr
David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rainer Leupers, Rudolf Mathar, Heinrich Meyr
Universally Composable Symmetric Encryption
Ralf Kuesters, Max Tuengerthal
Ralf Kuesters, Max Tuengerthal
On the Security of Tandem-DM
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Ewan Fleischmann, Michael Gorski, Stefan Lucks
New commutative semifields defined by PN multinomials
Lilya Budaghyan, Tor Helleseth
Lilya Budaghyan, Tor Helleseth
ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
Enhanced Target Collision Resistant Hash Functions Revisited
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
On the Portability of Generalized Schnorr Proofs
Jan Camenisch, Aggelos Kiayias, Moti Yung
Jan Camenisch, Aggelos Kiayias, Moti Yung
Extensions of the Cube Attack based on Low Degree Annihilators
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei, Josef Pieprzyk
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei, Josef Pieprzyk
A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials
Palash Sarkar
Palash Sarkar
On Approximating Addition by Exclusive OR
Palash Sarkar
Palash Sarkar
Traceability Codes
Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Carmit Hazay, Yehuda Lindell
Carmit Hazay, Yehuda Lindell
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
Dmitry Frumkin, Adi Shamir
Dmitry Frumkin, Adi Shamir
Image Encryption by Pixel Property Separation
Karthik Chandrashekar Iyer, Aravinda Subramanya
Karthik Chandrashekar Iyer, Aravinda Subramanya
On CCZ-equivalence and its use in secondary constructions of bent functions
Lilya Budaghyan, Claude Carlet
Lilya Budaghyan, Claude Carlet
Proofs of Retrievability via Hardness Amplification
Yevgeniy Dodis, Salil Vadhan, Daniel Wichs
Yevgeniy Dodis, Salil Vadhan, Daniel Wichs
How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
Key Insulation and Intrusion Resilience Over a Public Channel
Mihir Bellare, Shanshan Duan, Adriana Palacio
Mihir Bellare, Shanshan Duan, Adriana Palacio
On Algebraic Relations of Serpent S-Boxes
Bhupendra Singh, Lexy Alexander, Sanjay Burman
Bhupendra Singh, Lexy Alexander, Sanjay Burman
Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)
M. Jason Hinek, Charles C. Y. Lam
M. Jason Hinek, Charles C. Y. Lam
Constructions of Truly Practical Secure Protocols using Standard Smartcards
Carmit Hazay, Yehuda Lindell
Carmit Hazay, Yehuda Lindell
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim
On a Conditional Collision Attack on NaSHA-512
S. Markovski, A. Mileva, V. Dimitrova, D. Gligoroski
S. Markovski, A. Mileva, V. Dimitrova, D. Gligoroski
NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor
MITSUNARI Shigeo
MITSUNARI Shigeo
Adaptively Secure Two-Party Computation with Erasures
Yehuda Lindell
Yehuda Lindell
An efficient fuzzy extractor for limited noise
B. Skoric, P. Tuyls
B. Skoric, P. Tuyls
Nofish - A new stream cipher
Marius Oliver Gheorghita
Marius Oliver Gheorghita
Realizing Hash-and-Sign Signatures under Standard Assumptions
Susan Hohenberger, Brent Waters
Susan Hohenberger, Brent Waters
Security of Verifiably Encrypted Signatures
Markus Rückert, Dominique Schröder
Markus Rückert, Dominique Schröder
Collision Attacks on NaSHA-384/512
Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
Short Redactable Signatures Using Random Trees
Ee-Chien Chang, Chee Liang Lim, Jia Xu
Ee-Chien Chang, Chee Liang Lim, Jia Xu
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
Polynomial Runtime and Composability
Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade
Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade
Correctness of Li Generalization of RSA Cryptosystem
Roman Popovych
Roman Popovych
Comparing With RSA
Julien Cathalo, David Naccache, Jean-Jacques Quisquater
Julien Cathalo, David Naccache, Jean-Jacques Quisquater
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
Communication-Efficient Private Protocols for Longest Common Subsequence
Matthew Franklin, Mark Gondree, Payman Mohassel
Matthew Franklin, Mark Gondree, Payman Mohassel
Huge 2ndpreimages and collisions of khichidi-1
prasanth Kumar Thandra, S. A. V. Satya Murty
prasanth Kumar Thandra, S. A. V. Satya Murty
Anonymous signature scheme
Chunbo Ma, Jun Ao
Chunbo Ma, Jun Ao
Fast elliptic-curve cryptography on the Cell Broadband Engine
Neil Costigan, Peter Schwabe
Neil Costigan, Peter Schwabe
Cube Attacks on Trivium
S S Bedi, N Rajesh Pillai
S S Bedi, N Rajesh Pillai
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks
Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
Yehuda Lindell
Yehuda Lindell
Avoid Mask Re-use in Masked Galois Multipliers
D. Canright
D. Canright
A Very Compact "Perfectly Masked" S-Box for AES (corrected)
D. Canright, Lejla Batina
D. Canright, Lejla Batina
Optimal Multicast Group Communication
Zhibin Zhou, Dijiang Huang
Zhibin Zhou, Dijiang Huang
Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
Christoph Lucas, Dominik Raub, Ueli Maurer
Christoph Lucas, Dominik Raub, Ueli Maurer
A note on Agrawal conjecture
Roman Popovych
Roman Popovych
Homomorphic Trapdoor Commitments to Group Elements
Jens Groth
Jens Groth
Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
Vlastimil Klima
Vlastimil Klima
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
Wei Wang, Xiaoyun Wang, Guangwu Xu
Wei Wang, Xiaoyun Wang, Guangwu Xu
On Stateless Schemes for Message Authentication Using Pseudorandom Functions
Palash Sarkar
Palash Sarkar
Separating two roles of hashing in one-way message authentication
L. H. Nguyen, A. W. Roscoe
L. H. Nguyen, A. W. Roscoe
Thermocommunication
Julien Brouchier, Nora Dabbous, Tom Kean, Carol Marsh, David Naccache
Julien Brouchier, Nora Dabbous, Tom Kean, Carol Marsh, David Naccache
A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
Brian Baldwin, Richard Moloney, Andrew Byrne, Gary McGuire, William P. Marnane
Brian Baldwin, Richard Moloney, Andrew Byrne, Gary McGuire, William P. Marnane
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
Vipul Goyal, Amit Sahai
Vipul Goyal, Amit Sahai
Comments on two multi-server authentication protocols
Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
Odd-Char Multivariate Hidden Field Equations
Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang
Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
Resettably-Sound Resettable Zero Knowledge Arguments for NP
Yi Deng
Yi Deng
New Impossible Differential Attacks on AES
Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
Supporting Non-membership Proofs with Bilinear-map Accumulators
Ivan Damgård, Nikos Triandopoulos
Ivan Damgård, Nikos Triandopoulos
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara, Hideki Imai
SeongHan Shin, Kazukuni Kobara, Hideki Imai
Predicate Privacy in Encryption Systems
Emily Shen, Elaine Shi, Brent Waters
Emily Shen, Elaine Shi, Brent Waters
A Recursive Threshold Visual Cryptography Scheme
Abhishek Parakh, Subhash Kak
Abhishek Parakh, Subhash Kak
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
Collusion-Free Multiparty Computation in the Mediated Model
Jonathan Katz, Yehuda Lindell
Jonathan Katz, Yehuda Lindell
Semi-free start collision attack on Blender
Xu Liangyu, Li Ji
Xu Liangyu, Li Ji
Collision Attack on the Waterfall Hash Function
Scott Fluhrer
Scott Fluhrer
Fast hashing to G2 on pairing friendly curves
Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
A Hardware Interface for Hashing Algorithms
Zhimin Chen, Sergey Morozov, Patrick Schaumont
Zhimin Chen, Sergey Morozov, Patrick Schaumont
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures
Georg Fuchsbauer, David Pointcheval
Georg Fuchsbauer, David Pointcheval
Properties of Cryptographic Hash Functions
Michal Rjaško
Michal Rjaško
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
Patrick Longa, Catherine Gebotys
Patrick Longa, Catherine Gebotys
On The Diffie-Hellman Assumption
R. Bhaskar, K. Chandrasekaran, S. Lokam, P. L. Montgomery, R. Venkatesan, Y. Yacobi
R. Bhaskar, K. Chandrasekaran, S. Lokam, P. L. Montgomery, R. Venkatesan, Y. Yacobi
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP
Li Hongda, Feng dengguo, Li Bao, Xue Haixia
Li Hongda, Feng dengguo, Li Bao, Xue Haixia
Privacy Preserving Multiset Union with ElGamal Encryption
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
Twisted Edwards Curves Revisited
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
Generating Shorter Bases for Hard Random Lattices
Joel Alwen, Chris Peikert
Joel Alwen, Chris Peikert
Cryptanalysis of the Hash Function LUX-256
Shuang Wu, Dengguo Feng, Wenling Wu
Shuang Wu, Dengguo Feng, Wenling Wu
Collision attack on NaSHA-512
Li Ji, Xu Liangyu, Guan Xu
Li Ji, Xu Liangyu, Guan Xu
A NEW HASH ALGORITHM$:$ Khichidi$-$1
Natarajan Vijayarangan
Natarajan Vijayarangan
Improving the Rules of the DPA Contest
Francois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon
Francois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang
Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang
Cryptanalysis of RadioGatun
Thomas Fuhr, Thomas Peyrin
Thomas Fuhr, Thomas Peyrin
Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
Tapan Rai, Stanislav Bulygin
Tapan Rai, Stanislav Bulygin
Improved Cryptanalysis of SHAMATA-BC
Adem Atalay, Orhun Kara, Ferhat Karakoç
Adem Atalay, Orhun Kara, Ferhat Karakoç
A new class of Bent functions in Polynomial Forms
Sihem Mesnager
Sihem Mesnager
Classification of the SHA-3 Candidates
Ewan Fleischmann, Christian Forler, Michael Gorski
Ewan Fleischmann, Christian Forler, Michael Gorski
Reconstructing RSA Private Keys from Random Key Bits
Nadia Heninger, Hovav Shacham
Nadia Heninger, Hovav Shacham
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang
Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang
Some Formal Solutions in Side-channel Cryptanalysis - An Introduction
Fabrice J. P. R. Pautot
Fabrice J. P. R. Pautot
A non-delegatable identity-based strong designated verifier signature scheme
Bin Wang
Bin Wang
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary
Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
--Withdrawn--
removed
removed
The $n^c$-Unique Shortest Vector Problem is Hard
Vadim Lyubashevsky
Vadim Lyubashevsky
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
Yevgeniy Dodis, Daniel Wichs
Yevgeniy Dodis, Daniel Wichs
Extended Access Structures and Their Cryptographic Applications
Vanesa Daza, Javier Herranz, Paz Morillo, Carla Rafols
Vanesa Daza, Javier Herranz, Paz Morillo, Carla Rafols
Some Observations on SHAMATA
Ewan Fleischmann, Michael Gorski
Ewan Fleischmann, Michael Gorski
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
Hai Huang, Zhenfu Cao
Hai Huang, Zhenfu Cao
Some Observations on HC-128
Subhamoy Maitra, Goutam Paul, Shashwat Raizada
Subhamoy Maitra, Goutam Paul, Shashwat Raizada
Small Odd Prime Field Multivariate PKCs
Anna Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Kuo, Frost Li, Bo-Yin Yang
Anna Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Kuo, Frost Li, Bo-Yin Yang
On the Correctness of An Approach Against Side-channel attacks
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Debra L. Cook, Moti Yung, Angelos Keromytis
Debra L. Cook, Moti Yung, Angelos Keromytis
Non-Malleable Obfuscation
Ran Canetti, Mayank Varia
Ran Canetti, Mayank Varia
Key Agreement from Close Secrets over Unsecured Channels
Bhavana Kanukurthi, Leonid Reyzin
Bhavana Kanukurthi, Leonid Reyzin
Secure Parameters for SWIFFT
Johannes Buchmann, Richard Lindner
Johannes Buchmann, Richard Lindner
Modeling Computational Security in Long-Lived Systems, Version 2
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
A CM construction for curves of genus 2 with p-rank 1
Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, Marco Streng
Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, Marco Streng
On the final exponentiation for calculating pairings on ordinary elliptic curves
Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
HAIL: A High-Availability and Integrity Layer for Cloud Storage
Kevin D. Bowers, Ari Juels, Alina Oprea
Kevin D. Bowers, Ari Juels, Alina Oprea
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer, Jonathan Katz, David Naccache
Georg Fuchsbauer, Jonathan Katz, David Naccache
Secure Certificateless Public Key Encryption without Redundancy
Yinxia Sun, Futai Zhang
Yinxia Sun, Futai Zhang
Inside the Hypercube
Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form
Rongquan Feng, Zilong Wang, Hongfeng Wu
Rongquan Feng, Zilong Wang, Hongfeng Wu
Sharp lower bounds on the extractable randomness from non-uniform sources
Boris Skoric, Chibuzo Obi, Evgeny Verbitskiy, Berry Schoenmakers
Boris Skoric, Chibuzo Obi, Evgeny Verbitskiy, Berry Schoenmakers
Sharing DSS by the Chinese Remainder Theorem
Kamer Kaya, Ali Aydın Selçuk
Kamer Kaya, Ali Aydın Selçuk
The Generic Hardness of Subset Membership Problems under the Factoring Assumption
Tibor Jager, Jörg Schwenk
Tibor Jager, Jörg Schwenk
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
Chris Peikert
Chris Peikert
ECM on Graphics Cards
Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian
Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian
Attribute-Based Encryption with Key Cloning Protection
M. J. Hinek, S. Jiang, R. Safavi-Naini, S. F. Shahandashti
M. J. Hinek, S. Jiang, R. Safavi-Naini, S. F. Shahandashti
On a New Formal Proof Model for RFID Location Privacy (Extended Version)
Ton van Deursen, Sasa Radomirovic
Ton van Deursen, Sasa Radomirovic
The $F_f$-Family of Protocols for RFID-Privacy and Authentication
Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa
Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa
Sphinx: A Compact and Provably Secure Mix Format
George Danezis, Ian Goldberg
George Danezis, Ian Goldberg
Access Controls for Oblivious and Anonymous Systems
Scott Coull, Matthew Green, Susan Hohenberger
Scott Coull, Matthew Green, Susan Hohenberger
Exploring Cipherspace: Combining stream ciphers and block ciphers
Sandy Harris
Sandy Harris
Practical attacks against WEP and WPA
Martin Beck, Erik Tews
Martin Beck, Erik Tews
Automatic Generation of Sound Zero-Knowledge Protocols
Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol
Paolo D'Arco, Alfredo De Santis
Paolo D'Arco, Alfredo De Santis
Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
Stephane Manuel
Stephane Manuel
A CCA2 Secure Variant of the McEliece Cryptosystem
Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
Cryptanalysis of EnRUPT
Dmitry Khovratovich, Ivica Nikolic
Dmitry Khovratovich, Ivica Nikolic
Combined (identity-based) public key schemes
Maria Isabel Gonzalez Vasco, Florian Hess, Rainer Steinwandt
Maria Isabel Gonzalez Vasco, Florian Hess, Rainer Steinwandt
Secure Arithmetic Computation with No Honest Majority
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication
Michael Kounavis, Shay Gueron
Michael Kounavis, Shay Gueron
Key-Private Proxy Re-Encryption
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
Unconditionally Secure Multiparty Set Intersection Re-Visited
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks
Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
A variant of Wiener's attack on RSA
Andrej Dujella
Andrej Dujella
Complete Fairness in Multi-Party Computation Without an Honest Majority
S. Dov Gordon, Jonathan Katz
S. Dov Gordon, Jonathan Katz
On the Composability of Statistically Secure Bit Commitments
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
The Diffie-Hellman problem and generalization of Verheul's theorem
Dustin Moody
Dustin Moody
New hash function designs
Igor Semaev
Igor Semaev
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Ahmad-Reza Sadeghi, Thomas Schneider
Ahmad-Reza Sadeghi, Thomas Schneider
Injective Trapdoor Functions are Necessary and Sufficient for CCA2 Secure Public-Key Cryptosystems
Rui Xue, Dengguo Feng
Rui Xue, Dengguo Feng
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
On the Security of Fully Collusion Resistant Traitor Tracing Schemes
Yongdong WU, Robert H. Deng
Yongdong WU, Robert H. Deng
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
Authenticated Adversarial Routing
Yair Amir, Paul Bunn, Rafail Ostrovsky
Yair Amir, Paul Bunn, Rafail Ostrovsky
Divisible On-line/Off-line Signatures
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban
Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban
Cryptanalysis of the Improved Cellular Message Encryption Algorithm
Thomas Chardin, Raphaël Marinier
Thomas Chardin, Raphaël Marinier
Elliptic divisibility sequences and the elliptic curve discrete logarithm problem
Rachel Shipsey, Christine Swart
Rachel Shipsey, Christine Swart
Key differentiation attacks on stream ciphers
Enes Pasalic
Enes Pasalic
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
Anton Kargl, Stefan Pyka, Hermann Seuschek
Anton Kargl, Stefan Pyka, Hermann Seuschek
How Risky is the Random-Oracle Model?
Gaetan Leurent, Phong Q. Nguyen
Gaetan Leurent, Phong Q. Nguyen
Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
Michel Abdalla, Mihir Bellare, Gregory Neven
Linear equivalence between elliptic curves in Weierstrass and Hesse form
Alexander Rostovtsev
Alexander Rostovtsev
New Related-Key Boomerang Attacks on AES
Michael Gorski, Stefan Lucks
Michael Gorski, Stefan Lucks
Divisibility, Smoothness and Cryptographic Applications
David Naccache, Igor Shparlinski
David Naccache, Igor Shparlinski
BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
Zhibin Zhou, Dijiang Huang
Zhibin Zhou, Dijiang Huang
Obtaining and solving systems of equations in key variables only for the small variants of AES
Stanislav Bulygin, Michael Brickenstein
Stanislav Bulygin, Michael Brickenstein
The computational SLR: a logic for reasoning about computational indistinguishability
Yu Zhang
Yu Zhang
On differences of quadratic residues
Guillermo Morales-Luna
Guillermo Morales-Luna
Dynamic Provable Data Possession
C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou, Roberto Tamassia
C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou, Roberto Tamassia
Usable Optimistic Fair Exchange
Alptekin Kupcu, Anna Lysyanskaya
Alptekin Kupcu, Anna Lysyanskaya
Cryptographic Protocol Composition via the Authentication Tests
Joshua D. Guttman
Joshua D. Guttman
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III
Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III
Delegatable Anonymous Credentials
Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham
Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham
LEGO for Two Party Secure Computation
Jesper Buus Nielsen, Claudio Orlandi
Jesper Buus Nielsen, Claudio Orlandi
On Kasami Bent Functions
Deepmala Sharma, Sugata Gangopadhyay
Deepmala Sharma, Sugata Gangopadhyay
Efficient Asynchronous Multiparty Computation with Optimal Resilience
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
Searchable encryption with decryption in the standard model
Dennis Hofheinz, Enav Weinreb
Dennis Hofheinz, Enav Weinreb
A New Approach for Algebraically Homomorphic Encryption
Frederik Armknecht, Ahmad-Reza Sadeghi
Frederik Armknecht, Ahmad-Reza Sadeghi
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
Kaoru Kurosawa, Kazuhiro Suzuki
Kaoru Kurosawa, Kazuhiro Suzuki
Oblivious Transfer from Weak Noisy Channels
Jürg Wullschleger
Jürg Wullschleger
Parsing ambiguities in authentication and key establishment protocols
Liqun Chen, Chris J. Mitchell
Liqun Chen, Chris J. Mitchell
Privacy-Enhancing First-Price Auctions Using Rational Cryptography
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
On the security of pairing-friendly abelian varieties over non-prime fields
Naomi Benger, Manuel Charlemagne, David Freeman
Naomi Benger, Manuel Charlemagne, David Freeman
Almost-Asynchronous MPC with Faulty Minority
Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
Asynchronous Multiparty Computation: Theory and Implementation
Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
On the Number of Synchronous Rounds Required for Byzantine Agreement
Matthias Fitzi, Jesper Buus Nielsen
Matthias Fitzi, Jesper Buus Nielsen
Password Mistyping in Two-Factor-Authenticated Key Exchange
Vladimir Kolesnikov, Charles Rackoff
Vladimir Kolesnikov, Charles Rackoff
Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen
Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
Xu an Wang, Xiaoyuan Yang, Fagen Li
Xu an Wang, Xiaoyuan Yang, Fagen Li
A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
The Enigmatique Toolkit
Christopher Billings
Christopher Billings
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
An asymptotically optimal RFID protocol against relay attacks
Gildas Avoine, Aslan Tchamkerten
Gildas Avoine, Aslan Tchamkerten
Slid Pairs in Salsa20 and Trivium
Deike Priemuth-Schmid, Alex Biryukov
Deike Priemuth-Schmid, Alex Biryukov
Pairing with Supersingular Trace Zero Varieties Revisited
Emanuele Cesena
Emanuele Cesena
SPICE Simulation of a "Provably Secure" True Random Number Generator
Markus Dichtl, Bernd Meyer, Hermann Seuschek
Markus Dichtl, Bernd Meyer, Hermann Seuschek
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages
Jean-Charles Faugère, Ludovic Perret
Jean-Charles Faugère, Ludovic Perret
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
Mridul Nandi
Mridul Nandi
Comments on two password based protocols
Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou
Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou
Round Efficient Unconditionally Secure Multiparty Computation Protocol
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Generating genus two hyperelliptic curves over large characteristic finite fields
Takakazu Satoh
Takakazu Satoh
A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature
Uttam Kr. Mondal, Satyendra Nath Mandal, J. PalChoudhury
Uttam Kr. Mondal, Satyendra Nath Mandal, J. PalChoudhury
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Subhamoy Maitra, Goutam Paul
Subhamoy Maitra, Goutam Paul
New Applications of Differential Bounds of the SDS Structure
Jiali Choy, Khoongming Khoo
Jiali Choy, Khoongming Khoo
Attribute-Based Ring Signatures
Jin Li, Kwangjo Kim
Jin Li, Kwangjo Kim
How Far Must You See To Hear Reliably
Pranav K Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, Poornima M, Kannan Srinathan, Kishore Kothapalli
Pranav K Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, Poornima M, Kannan Srinathan, Kishore Kothapalli
GUC-Secure Set-Intersection Computation
TIAN Yuan, WANG Ying
TIAN Yuan, WANG Ying
Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
Tao Xie, FanBao Liu, DengGuo Feng
Tao Xie, FanBao Liu, DengGuo Feng
Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
Ann Hibner Koblitz, Neal Koblitz, Alfred Menezes
Ann Hibner Koblitz, Neal Koblitz, Alfred Menezes
Optimal Subset-Difference Broadcast Encryption with Free Riders
Murat Ak, Kamer Kaya, Ali Aydin Selcuk
Murat Ak, Kamer Kaya, Ali Aydin Selcuk
Double-Base Number System for Multi-Scalar Multiplications
Christophe Doche, David R. Kohel, Francesco Sica
Christophe Doche, David R. Kohel, Francesco Sica
--Withdrawn--
--withdrawn--
--withdrawn--
Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table
Michael Lifliand
Michael Lifliand
Cube Attacks on Tweakable Black Box Polynomials
Itai Dinur, Adi Shamir
Itai Dinur, Adi Shamir
Improving the Boneh-Franklin Traitor Tracing Scheme
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
Hierarchical Identity Based Encryption with Polynomially Many Levels
Craig Gentry, Shai Halevi
Craig Gentry, Shai Halevi
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home
Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
New AES software speed records
Daniel J. Bernstein, Peter Schwabe
Daniel J. Bernstein, Peter Schwabe
Dynamic Threshold Cryptosystem without Group Manager
Andreas Noack, Stefan Spitz
Andreas Noack, Stefan Spitz
A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare, Todor Ristov
Mihir Bellare, Todor Ristov
Additively Homomorphic Encryption with d-Operand Multiplications
Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
TRIVIUM's output partially autocancels
Michael Vielhaber
Michael Vielhaber
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol
Cas J. F. Cremers
Cas J. F. Cremers
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
Jan Camenisch, Nishanth Chandran, Victor Shoup
Jan Camenisch, Nishanth Chandran, Victor Shoup
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
Enumeration of Balanced Symmetric Functions over GF(p)
Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
Unconditionally Reliable Message Transmission in Directed Hypergraphs
Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
Compartmented Threshold RSA Based on the Chinese Remainder Theorem
Sorin Iftene, Stefan Ciobaca, Manuela Grindei
Sorin Iftene, Stefan Ciobaca, Manuela Grindei
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
Shahram Khazaei, Willi Meier
Shahram Khazaei, Willi Meier
Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting
Varad Kirtane, C. Pandu Rangan
Varad Kirtane, C. Pandu Rangan
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
Peeter Laud, Long Ngo
Peeter Laud, Long Ngo
Unique Shortest Vector Problem for max norm is NP-hard
Than Quang Khoat, Nguyen Hong Tan
Than Quang Khoat, Nguyen Hong Tan
Entropy Bounds for Traffic Confirmation
Luke O'Connor
Luke O'Connor
Zcipher Algorithm Specification
Ilya O Levin
Ilya O Levin
An argument for Hamiltonicity
Vadym Fedyukovych
Vadym Fedyukovych
The Cost of False Alarms in Hellman and Rainbow Tradeoffs
Jin Hong
Jin Hong
IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
William Whyte, Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, Joseph H. Silverman, Phil Hirschhorn
William Whyte, Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, Joseph H. Silverman, Phil Hirschhorn
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
Saurabh Dutta, Jyotsna Kumar mandal
Saurabh Dutta, Jyotsna Kumar mandal
Argument of knowledge of a bounded error
Vadym Fedyukovych
Vadym Fedyukovych
History-Independent Cuckoo Hashing
Moni Naor, Gil Segev, Udi Wieder
Moni Naor, Gil Segev, Udi Wieder
A protocol for K-multiple substring matching
Vadym Fedyukovych, Vitaliy Sharapov
Vadym Fedyukovych, Vitaliy Sharapov
Using Commutative Encryption to Share a Secret
Saied Hosseini Khayat
Saied Hosseini Khayat
An argument for rank metric
Vadym Fedyukovych
Vadym Fedyukovych
On DDos Attack against Proxy in Re-encryption and Re-signature
Xu an Wang
Xu an Wang
Weaknesses in HENKOS Stream Cipher
Prasanth Kumar Thandra, S. A. V. Satya Murty, R Balasubramanian
Prasanth Kumar Thandra, S. A. V. Satya Murty, R Balasubramanian
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
Flaws in Some Self-Healing Key Distribution Schemes with Revocation
Vanesa Daza, Javier Herranz, German Saez
Vanesa Daza, Javier Herranz, German Saez
Higher Order Differential Cryptanalysis of Multivariate Hash Functions
Yiyuan Luo, Xuejia Lai
Yiyuan Luo, Xuejia Lai
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
Iterative Probabilistic Reconstruction of RC4 Internal States
Jovan Golic, Guglielmo Morgari
Jovan Golic, Guglielmo Morgari
Information Leakage in Optimal Anonymized and Diversified Data
Chengfang Fang, Ee-Chien Chang
Chengfang Fang, Ee-Chien Chang
Remote Integrity Check with Dishonest Storage Server
Ee-Chien Chang, Jia Xu
Ee-Chien Chang, Jia Xu
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
Jooyoung Lee, Choon Sik Park
Jooyoung Lee, Choon Sik Park
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
Jooyoung Lee, Je Hong Park
Jooyoung Lee, Je Hong Park
Efficient RFID authentication protocols based on pseudorandom sequence generators
Jooyoung Lee, Yongjin Yeom
Jooyoung Lee, Yongjin Yeom
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, Pandu Rangan Chandrasekaran
S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, Pandu Rangan Chandrasekaran
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Pandu Rangan Chandrasekaran
S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Pandu Rangan Chandrasekaran
On construction of signature schemes based on birational permutations over noncommutative rings
Yasufumi Hashimoto, Kouichi Sakurai
Yasufumi Hashimoto, Kouichi Sakurai
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog
Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog
An improvement of discrete Tardos fingerprinting codes
Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai
Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai
Modified Huang-Wang's Convertible Nominative Signature Scheme
Wei Zhao, Dingfeng Ye
Wei Zhao, Dingfeng Ye
New attacks on ISO key establishment protocols
Anish Mathuria, G. Sriram
Anish Mathuria, G. Sriram
Public Key Cryptography from Different Assumptions
Boaz Barak, Avi Wigderson
Boaz Barak, Avi Wigderson
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
Darrel Hankerson, Koray Karabina, Alfred Menezes
Darrel Hankerson, Koray Karabina, Alfred Menezes
Explicit hard instances of the shortest vector problem
Johannes Buchmann, Richard Lindner, Markus Rückert, Michael Schneider
Johannes Buchmann, Richard Lindner, Markus Rückert, Michael Schneider
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
Mahalingam Ramkumar
Mahalingam Ramkumar
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
Manoj Kumar
Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He
Xianhui Lu, Xuejia Lai, Dake He
SMS4 Encryption Algorithm for Wireless Networks
Whitfield Diffie, George Ledin (translators)
Whitfield Diffie, George Ledin (translators)
Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance
Hemanta Maji, Manoj Prabhakaran, Mike Rosulek
Hemanta Maji, Manoj Prabhakaran, Mike Rosulek
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption
Le Trieu Phong, Wakaha Ogata
Le Trieu Phong, Wakaha Ogata
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
M. B. Paterson, D. R. Stinson
M. B. Paterson, D. R. Stinson
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Chunbo Ma, Jun Ao
Chunbo Ma, Jun Ao
RSA-TBOS Signcryption with Proxy Re-encryption.
Varad Kirtane, C. Pandu Rangan
Varad Kirtane, C. Pandu Rangan
A new identity based proxy signature scheme
Bin Wang
Bin Wang
Lattice-based Blind Signatures
Markus Rückert
Markus Rückert
A correction to ``Efficient and Secure Comparison for On-Line Auctions''
Ivan Damgård, Martin Geisler, Mikkel Krøigaard
Ivan Damgård, Martin Geisler, Mikkel Krøigaard
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
Yet Another Secure Distance-Bounding Protocol
Ventzislav Nikov, Marc Vauclair
Ventzislav Nikov, Marc Vauclair
Attacking and defending the McEliece cryptosystem
Daniel J. Bernstein, Tanja Lange, Christiane Peters
Daniel J. Bernstein, Tanja Lange, Christiane Peters
Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving
Abdulwahed M. Ismail, Mohamad Rushdan
Abdulwahed M. Ismail, Mohamad Rushdan
Signing a Linear Subspace: Signature Schemes for Network Coding
Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension
Santanu Sarkar, Subhamoy Maitra, Sumanta Sarkar
Santanu Sarkar, Subhamoy Maitra, Sumanta Sarkar
Scratch, Click & Vote: E2E voting over the Internet
Miroslaw Kutylowski, Filip Zagorski
Miroslaw Kutylowski, Filip Zagorski
A new almost perfect nonlinear function which is not quadratic
Yves Edel, Alexander Pott
Yves Edel, Alexander Pott
Improved efficiency of Kiltz07-KEM
Xianhui Lu, Xuejia Lai, Dake He
Xianhui Lu, Xuejia Lai, Dake He
Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
Orr Dunkelman, Nathan Keller
Orr Dunkelman, Nathan Keller
Attacks on RFID Protocols
T. van Deursen, S. Radomirovic
T. van Deursen, S. Radomirovic
Revocation Systems with Very Small Private Keys
Allison Lewko, Amit Sahai, Brent Waters
Allison Lewko, Amit Sahai, Brent Waters
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
Full Security:Fuzzy Identity Based Encryption
Liming Fang, Jinyue Xia
Liming Fang, Jinyue Xia
Combinatorial batch codes
M. B. Paterson, D. R. Stinson, R. Wei
M. B. Paterson, D. R. Stinson, R. Wei
Identity-Based Directed Signature Scheme from Bilinear Pairings
Xun Sun, Jian-hua Li, Gong-liang Chen, Shu-tang Yang
Xun Sun, Jian-hua Li, Gong-liang Chen, Shu-tang Yang
A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
Complete Fairness in Secure Two-Party Computation
S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell
S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell
Secure Biometric Authentication With Improved Accuracy
M. Barbosa, S. Cauchie, T. Brouard, S. Melo de Sousa
M. Barbosa, S. Cauchie, T. Brouard, S. Melo de Sousa
Accountability of Perfect Concurrent Signature
Yunfeng Li, Dake He, Xianhui Lu
Yunfeng Li, Dake He, Xianhui Lu
Cheon's algorithm, pairing inversion and the discrete logarithm problem
David J. Mireles Morales
David J. Mireles Morales
An analysis of the infrastructure in real function fields
David J. Mireles Morales
David J. Mireles Morales
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii
Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii
Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme
Hongzhen Du, Qiaoyan Wen
Hongzhen Du, Qiaoyan Wen
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
Foundations of Group Key Management – Framework, Security Model and a Generic Construction
Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Rahul Srinivasan, Pandu Rangan Chandrasekaran
Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Rahul Srinivasan, Pandu Rangan Chandrasekaran
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
Atefeh Mashatan, Douglas R. Stinson
Atefeh Mashatan, Douglas R. Stinson
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
Another approach to pairing computation in Edwards coordinates
Sorina Ionica, Antoine Joux
Sorina Ionica, Antoine Joux
How to Protect Yourself without Perfect Shredding
Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim
Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
Brent Waters
Brent Waters
Sharemind: a framework for fast privacy-preserving computations
Dan Bogdanov, Sven Laur, Jan Willemson
Dan Bogdanov, Sven Laur, Jan Willemson
How to Launch A Birthday Attack Against DES
Zhengjun Cao
Zhengjun Cao
Authenticated Byzantine Generals in Dual Failure Model
Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan
Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan
One-Up Problem for (EC)DSA
Daniel R. L. Brown
Daniel R. L. Brown
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Jithra Adikari, Vassil Dimitrov, Laurent Imbert
Jithra Adikari, Vassil Dimitrov, Laurent Imbert
Breaking the Akiyama-Goto cryptosystem
P. Ivanov, J. F. Voloch
P. Ivanov, J. F. Voloch
Attacks on Singelee and Preneel's protocol
Jorge Munilla, Alberto Peinado
Jorge Munilla, Alberto Peinado
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Jihye Kim, Gene Tsudik
Jihye Kim, Gene Tsudik
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
Taehyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung
Taehyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung
FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto
Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto
Delegating Capabilities in Predicate Encryption Systems
Elaine Shi, Brent Waters
Elaine Shi, Brent Waters
An Improved Robust Fuzzy Extractor
Bhavana Kanukurthi, Leonid Reyzin
Bhavana Kanukurthi, Leonid Reyzin
A strategy for any DAA Issuer and an additional verification by a Host
Vadym Fedyukovych
Vadym Fedyukovych
Signcryption with Proxy Re-encryption
Chandrasekar S., Ambika K., Pandu Rangan C.
Chandrasekar S., Ambika K., Pandu Rangan C.
Certificate-Based Signature Schemes without Pairings or Random Oracles
Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
Twisted Ate Pairing on Hyperelliptic Curves and Applications
Fangguo Zhang
Fangguo Zhang
White-Box Cryptography: Formal Notions and (Im)possibility Results
Amitabh Saxena, Brecht Wyseur, Bart Preneel
Amitabh Saxena, Brecht Wyseur, Bart Preneel
A New Hash Family Obtained by Modifying the SHA-2 Family
Somitra Kumar Sanadhya, Palash Sarkar
Somitra Kumar Sanadhya, Palash Sarkar
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
Somitra Kumar Sanadhya, Palash Sarkar
Somitra Kumar Sanadhya, Palash Sarkar
New Collision attacks Against Up To 24-step SHA-2
Somitra Kumar Sanadhya, Palash Sarkar
Somitra Kumar Sanadhya, Palash Sarkar
Searching for Low Weight Codewords in Linear Binary Codes
Somitra Kumar Sanadhya, Palash Sarkar
Somitra Kumar Sanadhya, Palash Sarkar
Adaptive Security in Broadcast Encryption Systems
Craig Gentry, Brent Waters
Craig Gentry, Brent Waters
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
Information-Theoretically Secure Voting Without an Honest Majority
Anne Broadbent, Alain Tapp
Anne Broadbent, Alain Tapp
Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors
Steven D. Galbraith, Michael Harrison, David J. Mireles Morales
Steven D. Galbraith, Michael Harrison, David J. Mireles Morales
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
Robin Künzler, Jörn Müller-Quade, Dominik Raub
Robin Künzler, Jörn Müller-Quade, Dominik Raub
Slide Attacks on a Class of Hash Functions
Michael Gorski, Stefan Lucks, Thomas Peyrin
Michael Gorski, Stefan Lucks, Thomas Peyrin
Statistically Reliable and Secure Message Transmission in Directed Networks
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
The Hidden Root Problem
F. Vercauteren
F. Vercauteren
Breaking RSA Generically is Equivalent to Factoring
Divesh Aggarwal, Ueli Maurer
Divesh Aggarwal, Ueli Maurer
2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
ZHAO Lu, WEN Qiao-yan
ZHAO Lu, WEN Qiao-yan
ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS
JAIYEOLA Temitope Gbolahan, ADENIRAN John Olushola
JAIYEOLA Temitope Gbolahan, ADENIRAN John Olushola
ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY
JAIYEOLA Temitope Gbolahan
JAIYEOLA Temitope Gbolahan
ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES
JAIYEOLA Temitope Gbolahan
JAIYEOLA Temitope Gbolahan
Embedding in Two Least Significant Bits with Wet Paper Coding
Xin Liao, Qiao-yan Wen
Xin Liao, Qiao-yan Wen
An Efficient Identity-based Ring Signcryption Scheme
Zhenchao ZHU, Yuqing ZHANG, Fengjiao WANG
Zhenchao ZHU, Yuqing ZHANG, Fengjiao WANG
Multi-Recipient Signcryption for Secure Wireless Group Communication
Yiliang Han, Xiaolin Gui, Xu'an Wang
Yiliang Han, Xiaolin Gui, Xu'an Wang
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Nick Varnovsky
Nick Varnovsky
Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols
Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
Pairings on hyperelliptic curves with a real model
Steven Galbraith, Xibin Lin, David Mireles
Steven Galbraith, Xibin Lin, David Mireles
Construction of Resilient Functions with Multiple Cryptographic Criteria
Shaojing Fu, Chao Li, Bing sun
Shaojing Fu, Chao Li, Bing sun
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Fengjiao Wang, Yuqing Zhang
Fengjiao Wang, Yuqing Zhang
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran
S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran
The Random Oracle Model and the Ideal Cipher Model are Equivalent
Jean-Sebastien Coron, Jacques Patarin, Yannick Seurin
Jean-Sebastien Coron, Jacques Patarin, Yannick Seurin
Cryptanalysis of an Authentication Scheme Using Truncated Polynomials
Markus Grassl, Rainer Steinwandt
Markus Grassl, Rainer Steinwandt
New balanced Boolean functions satisfying all the main cryptographic criteria
Claude Carlet, Keqin Feng
Claude Carlet, Keqin Feng
On the economic payoff of forensic systems when used to trace Counterfeited Software and content
Yacov Yacobi
Yacov Yacobi
Enumeration of Homogeneous Rotation Symmetric functions over GF(p)
Shaojing Fu Chao Li Bing Sun
Shaojing Fu Chao Li Bing Sun
Practical Attacks on HB and HB+ Protocols
Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, Marcin Zawada
Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, Marcin Zawada
Leakage-Resilient Cryptography in the Standard Model
Stefan Dziembowski, Krzysztof Pietrzak
Stefan Dziembowski, Krzysztof Pietrzak
Recognition in Ad Hoc Pervasive Networks
Atefeh Mashatan, Douglas R. Stinson
Atefeh Mashatan, Douglas R. Stinson
On the Provable Security of Multi-Receiver Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
Local Affinity Based Inversion of Filter Generators
O. A. Logachev, D. S. Nazarova
O. A. Logachev, D. S. Nazarova
A Modular Security Analysis of the TLS Handshake Protocol
P. Morrissey, N. P. Smart, B. Warinschi
P. Morrissey, N. P. Smart, B. Warinschi
Constant-Round Concurrent Non-Malleable Commitments and Decommitments
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
On the CCA1-Security of Elgamal and Damgård's Elgamal
Helger Lipmaa
Helger Lipmaa
On Resettably-Sound Resttable Zero Knowledege Arguments
Yi Deng, Dongdai Lin
Yi Deng, Dongdai Lin
Perfectly Secure Message Transmission Tolerating Mixed Adversary
Arpita Patra, Ashish Choudhury, Ashwinkumar B. V, Kannan Srinathan, C. Pandu Rangan
Arpita Patra, Ashish Choudhury, Ashwinkumar B. V, Kannan Srinathan, C. Pandu Rangan
A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Jose Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento
Jose Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento
A New Collision Differential For MD5 With Its Full Differential Path
Tao Xie, DengGuo Feng, FanBao Liu
Tao Xie, DengGuo Feng, FanBao Liu
Identification and Privacy: Zero-Knowledge is not Enough
Julien Bringer, Herve Chabanne, Thomas Icart
Julien Bringer, Herve Chabanne, Thomas Icart
Revisiting Wiener's Attack -- New Weak Keys in RSA
Subhamoy Maitra, Santanu Sarkar
Subhamoy Maitra, Santanu Sarkar
New Impossible Differential Cryptanalysis of ARIA
Ruilin Li, Bing Sun, Peng Zhang, Chao Li
Ruilin Li, Bing Sun, Peng Zhang, Chao Li
Proxy Key Re-encapsulation Mechanism for Group Communications
Chunbo Ma, Jun Ao
Chunbo Ma, Jun Ao
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem
Hai Huang, Zhenfu Cao
Hai Huang, Zhenfu Cao
On the Security of a Visual Cryptography Scheme for Color Images
Bert W. Leung, Felix Y. Ng, Duncan S. Wong
Bert W. Leung, Felix Y. Ng, Duncan S. Wong
Encryption-On-Demand: Practical and Theoretical Considerations
Gideon Samid
Gideon Samid
Efficient Conversion of Secret-shared Values Between Different Fields
Ivan Damgard, Rune Thorbek
Ivan Damgard, Rune Thorbek
Essentially Optimal Universally Composable Oblivious Transfer
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
Analysis and Details of the Random Cipher Output Mode Of Operation Primitives
Dan P. Milleville
Dan P. Milleville
Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation
Wouter Castryck, Steven Galbraith, Reza Rezaeian Farashahi
Wouter Castryck, Steven Galbraith, Reza Rezaeian Farashahi
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé
Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé
A New Multi-Linear Universal Hash Family
Palash Sarkar
Palash Sarkar
On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
Multi-Factor Password-Authenticated Key Exchange
Douglas Stebila, Poornaprajna Udupi, Sheueling Chang
Douglas Stebila, Poornaprajna Udupi, Sheueling Chang
The Multireceiver Commitment Schemes
Shuhong Wang
Shuhong Wang
Reducing the Complexity of the Weil Pairing Computation
Chang-An Zhao, Fangguo Zhang, Dongqing Xie
Chang-An Zhao, Fangguo Zhang, Dongqing Xie
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Goichiro Hanaoka, Kaoru Kurosawa
Goichiro Hanaoka, Kaoru Kurosawa
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm
Haimin Jin, Duncan S. Wong, Yinlong Xu
Haimin Jin, Duncan S. Wong, Yinlong Xu
Computing Bilinear Pairings on Elliptic Curves with Automorphisms
Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Bing-Long Chen
Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Bing-Long Chen
Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme
Naoki Ogura, Shigenori Uchiyama
Naoki Ogura, Shigenori Uchiyama
Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
Ben Adida, C. Andrew Neff
Ben Adida, C. Andrew Neff
Partial Fairness in Secure Two-Party Computation
Dov Gordon, Jonathan Katz
Dov Gordon, Jonathan Katz
On Software Parallel Implementation of Cryptographic Pairings
Philipp Grabher, Johann Groszschaedl, Dan Page
Philipp Grabher, Johann Groszschaedl, Dan Page
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem
Yanbin Pan, Yingpu Deng
Yanbin Pan, Yingpu Deng
Privacy-Preserving Matching of DNA Profiles
Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls
Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls
Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing
Zhitu Su, Hui Li, JianFeng Ma
Zhitu Su, Hui Li, JianFeng Ma
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
J. Wu, D. R. Stinson
J. Wu, D. R. Stinson
On The Security of The ElGamal Encryption Scheme and Damgard’s Variant
J. Wu, D. R. Stinson
J. Wu, D. R. Stinson
Simultaneous field divisions: an extension of Montgomery's trick
David G. Harris
David G. Harris
Security needs in embedded systems
Anoop MS
Anoop MS
Secure Multiparty Computation for Privacy-Preserving Data Mining
Yehuda Lindell, Benny Pinkas
Yehuda Lindell, Benny Pinkas
A New Family of Perfect Nonlinear Binomials
Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang
Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
Jin Zhengping, Zuo Huijuan, Du hongzhen, Wen Qiaoyan
Jin Zhengping, Zuo Huijuan, Du hongzhen, Wen Qiaoyan
Endomorphisms for faster elliptic curve cryptography on a large class of curves
Steven D. Galbraith, Xibin Lin, Michael Scott
Steven D. Galbraith, Xibin Lin, Michael Scott
A Tamper-Evident Voting Machine Resistant to Covert Channels
Wei Han, Tao Hao, Dong Zheng, Ke-fei Chen, Xiaofeng Chen
Wei Han, Tao Hao, Dong Zheng, Ke-fei Chen, Xiaofeng Chen
Investigating the DPA-Resistance Property of Charge Recovery Logics
Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
None
--withdrawn--
--withdrawn--
User-Sure-and-Safe Key Retrieval
Daniel R. L. Brown
Daniel R. L. Brown
How to Build a Hash Function from any Collision-Resistant Function
Thomas Ristenpart, Thomas Shrimpton
Thomas Ristenpart, Thomas Shrimpton
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Carsten Rolfes, Christof Paar, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Carsten Rolfes, Christof Paar, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
Fagen Li, Yong Yu
Fagen Li, Yong Yu
Privacy-Preserving Audit and Extraction of Digital Contents
Mehul A. Shah, Ram Swaminathan, Mary Baker
Mehul A. Shah, Ram Swaminathan, Mary Baker
A New Approach to Secure Logging
Di Ma, Gene Tsudik
Di Ma, Gene Tsudik
On the Secure Obfuscation of Deterministic Finite Automata
W. Erik Anderson
W. Erik Anderson
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Jean-Philippe Aumasson, Willi Meier, Florian Mendel
Jean-Philippe Aumasson, Willi Meier, Florian Mendel
Restricted Adaptive Oblivious Transfer
Javier Herranz
Javier Herranz
Proofs of Knowledge with Several Challenge Values
Grzegorz Stachowiak
Grzegorz Stachowiak
Imaginary quadratic orders with given prime factor of class number
Alexander Rostovtsev
Alexander Rostovtsev
An Efficient ID-based Ring Signature Scheme from Pairings
Chunxiang Gu, Yuefei Zhu
Chunxiang Gu, Yuefei Zhu
Optimal Discretization for High-Entropy Graphical Passwords
Kemal Bicakci
Kemal Bicakci
Algebraic Techniques in Differential Cryptanalysis
Martin Albrecht, Carlos Cid
Martin Albrecht, Carlos Cid
New construction of Boolean functions with maximun algebraic immunity
Wang yongjuan, Fan shuqin, Han wenbao
Wang yongjuan, Fan shuqin, Han wenbao
Proofs of Retrievability: Theory and Implementation
Kevin D. Bowers, Ari Juels, Alina Oprea
Kevin D. Bowers, Ari Juels, Alina Oprea
Non-Linear Reduced Round Attacks Against SHA-2 Hash family
Somitra Kumar Sanadhya, Palash Sarkar
Somitra Kumar Sanadhya, Palash Sarkar
Full Cryptanalysis of LPS and Morgenstern Hash Function
Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
The Round Complexity of Verifiable Secret Sharing Revisited
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
Binary Edwards Curves
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem
Simon R. Blackburn
Simon R. Blackburn
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Côme Berbain, Aline Gouget, Hervé Sibert
Côme Berbain, Aline Gouget, Hervé Sibert
Possibility and impossibility results for selective decommitments
Dennis Hofheinz
Dennis Hofheinz
Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols
Omkant Pandey
Omkant Pandey
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
Nicolas T. Courtois, Karsten Nohl, Sean O'Neil
Nicolas T. Courtois, Karsten Nohl, Sean O'Neil
Improved lower bound on the number of balanced symmetric functions over GF(p)
Pinhui Ke
Pinhui Ke
On the (Im)Possibility of Key Dependent Encryption
Iftach Haitner, Thomas Holenstein
Iftach Haitner, Thomas Holenstein
Universally Composable Adaptive Oblivious Transfer
Matthew Green, Susan Hohenberger
Matthew Green, Susan Hohenberger
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Michael Backes, Boris Köpf
Michael Backes, Boris Köpf
Modular polynomials for genus 2
Reinier Broker, Kristin Lauter
Reinier Broker, Kristin Lauter
A Proxy Signature Scheme over Braid Groups
Girraj Kumar Verma
Girraj Kumar Verma
A non-interactive deniable authentication scheme based on designated verifier proofs
Bin Wang
Bin Wang
DISH: Distributed Self-Healing in Unattended Sensor Networks
Di Ma, Gene Tsudik
Di Ma, Gene Tsudik
Secure Online Elections in Practice
Lucie Langer, Axel Schmidt, Johannes Buchmann
Lucie Langer, Axel Schmidt, Johannes Buchmann
On Black-Box Ring Extraction and Integer Factorization
Kristina Altmann, Tibor Jager, Andy Rupp
Kristina Altmann, Tibor Jager, Andy Rupp
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
David Freeman
David Freeman
The Walsh Spectrum of a New Family of APN Functions
Yue Zhou, Chao Li
Yue Zhou, Chao Li
Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour
Clemens Heuberger
Clemens Heuberger
Computational soundness of symbolic zero-knowledge proofs
Michael Backes, Dominique Unruh
Michael Backes, Dominique Unruh
Impossible Differential Cryptanalysis of CLEFIA
Bing Sun, Ruilin Li, Mian Wang, Ping Li, Chao Li
Bing Sun, Ruilin Li, Mian Wang, Ping Li, Chao Li
Robust Combiners for Software Hardening
Amir Herzberg, Haya Shulman
Amir Herzberg, Haya Shulman
Toy Factoring by Newton's Method
Daniel R. L. Brown
Daniel R. L. Brown
Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
A Real-World Attack Breaking A5/1 within Hours
Timo Gendrullis, Martin Novotny, Andy Rupp
Timo Gendrullis, Martin Novotny, Andy Rupp
Dynamic SHA-2
Xu Zijie
Xu Zijie
Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
Jithra Adikari, Vassil S. Dimitrov, Pradeep K. Mishra
Jithra Adikari, Vassil S. Dimitrov, Pradeep K. Mishra
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
Shiva Prasad Kasiviswanathan, Adam Smith
Shiva Prasad Kasiviswanathan, Adam Smith
Certificateless Signcryption
M. Barbosa, P. Farshim
M. Barbosa, P. Farshim
Attacking Reduced Round SHA-256
Somitra Kumar Sanadhya, Palash Sarkar
Somitra Kumar Sanadhya, Palash Sarkar
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
Reducing Complexity Assumptions for Oblivious Transfer
K. Y. Cheong, Takeshi Koshiba
K. Y. Cheong, Takeshi Koshiba
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian
Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian
Oblivious Transfer Based on the McEliece Assumptions
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
More Discriminants with the Brezing-Weng Method
Gaetan Bisson, Takakazu Satoh
Gaetan Bisson, Takakazu Satoh
Constant-Size Dynamic $k$-TAA
Man Ho Au, Willy Susilo, Yi Mu
Man Ho Au, Willy Susilo, Yi Mu
Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations
Clemens Heuberger, James A. Muir
Clemens Heuberger, James A. Muir
Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
Alon Rosen, Gil Segev
Alon Rosen, Gil Segev
The arithmetic of characteristic 2 Kummer surfaces
P. Gaudry, D. Lubicz
P. Gaudry, D. Lubicz
A Framework for the Sound Specification of Cryptographic Tasks
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
Analysis of Step-Reduced SHA-256
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
Mohamed Layouni
Mohamed Layouni
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation
Nidia Cortez-Duarte, Francisco Rodríguez-Henríquez, Jean-Luc Beuchat, Eiji Okamoto
Nidia Cortez-Duarte, Francisco Rodríguez-Henríquez, Jean-Luc Beuchat, Eiji Okamoto
Machine Learning Attacks Against the ASIRRA CAPTCHA
Philippe Golle
Philippe Golle
Pairing Lattices
Florian Hess
Florian Hess
A Simple Derivation for the Frobenius Pseudoprime Test
Daniel Loebenberger
Daniel Loebenberger
Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style
Mehrdad Khatir, Amir Moradi
Mehrdad Khatir, Amir Moradi
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
Seog Chung Seo, Dong-Guk Han, Seokhie Hong
Seog Chung Seo, Dong-Guk Han, Seokhie Hong
New proofs for old modes
Mark Wooding
Mark Wooding
Public key encryption and encryption emulation attacks
Denis Osin, Vladimir Shpilrain
Denis Osin, Vladimir Shpilrain
Linear Bandwidth Naccache-Stern Encryption
Benoit Chevallier-Mames, David Naccache, Jacques Stern
Benoit Chevallier-Mames, David Naccache, Jacques Stern
Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication
Patrick Longa, Catherine Gebotys
Patrick Longa, Catherine Gebotys
Exponentiation in pairing-friendly groups using homomorphisms
Steven D. Galbraith, Michael Scott
Steven D. Galbraith, Michael Scott
Chosen-Ciphertext Security via Correlated Products
Alon Rosen, Gil Segev
Alon Rosen, Gil Segev
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez
Scalable and Efficient Provable Data Possession
Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132
Daniel Mall, Qing Zhong
Daniel Mall, Qing Zhong
Democratic Group Signatures with Threshold Traceability
Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li
Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li
THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
Yuriy Izbenko, Vladislav Kovtun, Alexandr Kuznetsov
Yuriy Izbenko, Vladislav Kovtun, Alexandr Kuznetsov
On the Design of Secure and Fast Double Block Length Hash Functions
Zheng Gong, Xuejia Lai, Kefei Chen
Zheng Gong, Xuejia Lai, Kefei Chen
Collisions for Round-Reduced LAKE
Florian Mendel, Martin Schläffer
Florian Mendel, Martin Schläffer
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Jintai Ding, Bo-Yin Yang, Owen Chen, Ming-Shing Chen, Doug Cheng
Jintai Ding, Bo-Yin Yang, Owen Chen, Ming-Shing Chen, Doug Cheng
Private Branching Programs: On Communication-Efficient Cryptocomputing
Helger Lipmaa
Helger Lipmaa
Knapsack cryptosystems built on NP-hard instances
Laurent Evain
Laurent Evain
Cryptanalysis of White-Box Implementations
W. Michiels, P. Gorissen, H. D. L. Hollmann
W. Michiels, P. Gorissen, H. D. L. Hollmann
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Ernie Brickell, Liqun Chen, Jiangtao Li
Ernie Brickell, Liqun Chen, Jiangtao Li
Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
Jun Shao, Dongsheng Xing, Zhenfu Cao
Jun Shao, Dongsheng Xing, Zhenfu Cao
Degradation and Amplification of Computational Hardness
Shai Halevi, Tal Rabin
Shai Halevi, Tal Rabin
Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
Arpita Patra, Ashish Choudhary, AshwinKumar B. V, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, AshwinKumar B. V, C. Pandu Rangan
Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields
Patrick Longa
Patrick Longa
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
Kristin E. Lauter, Katherine E. Stange
Kristin E. Lauter, Katherine E. Stange
On Security Notions for Verifiable Encrypted Signature
Xu-An Wang, Xiaoyuan Yang, Yiliang Han
Xu-An Wang, Xiaoyuan Yang, Yiliang Han
Fairness with an Honest Minority and a Rational Majority
Shien Jin Ong, David Parkes, Alon Rosen, Salil Vadhan
Shien Jin Ong, David Parkes, Alon Rosen, Salil Vadhan
Optimal Pairings
F. Vercauteren
F. Vercauteren
Strongly Unforgeable ID-based Signatures Without Random Oracles
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
Universally Composable Undeniable Signature
Kaoru Kurosawa, Jun Furukawa
Kaoru Kurosawa, Jun Furukawa
New ID-based Fair Blind Signatures
Girraj Kumar Verma
Girraj Kumar Verma
An Efficient SPRP-secure Construction based on Pseudo Random Involution
Mridul Nandi
Mridul Nandi
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation
Mridul Nandi
Mridul Nandi
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach
Mridul Nandi
Mridul Nandi
An improved preimage attack on MD2
Søren S. Thomsen
Søren S. Thomsen
A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
Mahabir Prasad Jhanwar, Rana Barua
Mahabir Prasad Jhanwar, Rana Barua
Towards a Theory of White-Box Security
Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Arpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan
Arpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan
All Pairings Are in a Group
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
ID based generalized signcryption
Sunder Lal, Prashant Kushwah
Sunder Lal, Prashant Kushwah
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
Roberto Araujo, Peter Y. A. Ryan
Roberto Araujo, Peter Y. A. Ryan
Template Attacks on ECDSA
Marcel Medwed, Elisabeth Oswald
Marcel Medwed, Elisabeth Oswald
Pairing-Based Onion Routing with Improved Forward Secrecy
Aniket Kate, Greg Zaverucha, Ian Goldberg
Aniket Kate, Greg Zaverucha, Ian Goldberg
Homomorphic Encryption with CCA Security
Manoj Prabhakaran, Mike Rosulek
Manoj Prabhakaran, Mike Rosulek
A Short Proof of the PRP/PRF Switching Lemma
Donghoon Chang, Mridul Nandi
Donghoon Chang, Mridul Nandi
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
Results from a Search for the Best Linear Approximation of a Block Cipher
Kashif Ali, Howard M. Heys
Kashif Ali, Howard M. Heys
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
Jonathan J. Hoch, Adi Shamir
Jonathan J. Hoch, Adi Shamir
On the Chikazawa-Inoue ID based key system
Bae Eun Jung, Hee Jean Kim
Bae Eun Jung, Hee Jean Kim
Compact Proofs of Retrievability
Hovav Shacham, Brent Waters
Hovav Shacham, Brent Waters
The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption
Alexandre M. Deusajute, Paulo S. L. M. Barreto
Alexandre M. Deusajute, Paulo S. L. M. Barreto
Blockcipher Based Hashing Revisited
Martijn Stam
Martijn Stam
Generators of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
Christian Robenhagen Ravnshoj
HENKOS Cryptanalysis-Related keys attack
Marius Oliver Gheorghita
Marius Oliver Gheorghita
Multiparty Computation Goes Live
Peter Bogetoft, Dan Lund Christensen, Ivan Damgard, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft
Peter Bogetoft, Dan Lund Christensen, Ivan Damgard, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft
The Twin Diffie-Hellman Problem and Applications
David Cash, Eike Kiltz, Victor Shoup
David Cash, Eike Kiltz, Victor Shoup
High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)
Junjie Jiang, Jing Chen, Jian Wang, Duncan S. Wong, Xiaotie Deng
Junjie Jiang, Jing Chen, Jian Wang, Duncan S. Wong, Xiaotie Deng
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
Junghyun Nam
Junghyun Nam
Remarks on the NFS complexity
Pavol Zajac
Pavol Zajac
Efficient Sequential Aggregate Signed Data
Gregory Neven
Gregory Neven
Computing Hilbert Class Polynomials
Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter
Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter
Abelian varieties with prescribed embedding degree
David Freeman, Peter Stevenhagen, Marco Streng
David Freeman, Peter Stevenhagen, Marco Streng
Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields
Nicholas T. Sullivan
Nicholas T. Sullivan
Buying random votes is as hard as buying no-votes
Stefan Popoveniuc, Jonathan Stanton
Stefan Popoveniuc, Jonathan Stanton
Physical Cryptanalysis of KeeLoq Code Hopping Applications
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
Vladislav Kovtun, Jan Pelzl, Alexandr Kuznetsov
Vladislav Kovtun, Jan Pelzl, Alexandr Kuznetsov
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)
Vladislav Kovtun, Thomas Wollinger
Vladislav Kovtun, Thomas Wollinger
cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards
S. Sharmila Deva Selvi, S. Sree Vivek
S. Sharmila Deva Selvi, S. Sree Vivek
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
Miroslava Sotakova
Miroslava Sotakova
New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)
Patrick Longa, Ali Miri
Patrick Longa, Ali Miri
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)
Patrick Longa, Ali Miri
Patrick Longa, Ali Miri
Multi-PKG ID based signcryption
Sunder Lal, Prashant Kushwah
Sunder Lal, Prashant Kushwah
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell, Benny Pinkas
Yehuda Lindell, Benny Pinkas
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
Fair Traceable Multi-Group Signatures
Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Tal Moran, Gil Segev
Tal Moran, Gil Segev
Threshold RSA for Dynamic and Ad-Hoc Groups
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
Ari Juels, Ravikanth Pappu, Bryan Parno
Ari Juels, Ravikanth Pappu, Bryan Parno
Cryptanalysis of CRUSH hash structure
Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
Julien Bringer, Herve Chabanne
Julien Bringer, Herve Chabanne
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
Hassan Elkamchouchi, Yasmine Abouelseoud
Hassan Elkamchouchi, Yasmine Abouelseoud
Efficient and Generalized Pairing Computation on Abelian Varieties
Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
New Results on Unconditionally Secure Multireceiver Manual Authentication
Shuhong Wang, Reihaneh Safavi-Naini
Shuhong Wang, Reihaneh Safavi-Naini
A New Blind Identity-Based Signature Scheme with Message Recovery
Hassan Elkamchouchi, Yasmine Abouelseoud
Hassan Elkamchouchi, Yasmine Abouelseoud
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Georg Fuchsbauer, David Pointcheval
Georg Fuchsbauer, David Pointcheval
Generic Attacks on Feistel Schemes
Jacques Patarin
Jacques Patarin
Efficient Fully-Simulatable Oblivious Transfer
Yehuda Lindell
Yehuda Lindell
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation
Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang
Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang
Lower Bounds on Signatures From Symmetric Primitives
Boaz Barak, Mohammad Mahmoody
Boaz Barak, Mohammad Mahmoody
Merkle's Key Agreement Protocol is Optimal: An $O(n^2)$ Attack on any Key Agreement from Random Oracles
Boaz Barak, Mohammad Mahmoody
Boaz Barak, Mohammad Mahmoody
Authenticating with Attributes
Dalia Khader
Dalia Khader
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
Non-Cyclic Subgroups of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
Christian Robenhagen Ravnshoj
HB#: Increasing the Security and Efficiency of HB+
Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
Blind Signature Scheme over Braid Groups
Girraj Kumar Verma
Girraj Kumar Verma
Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$
Mitsuru Kawazoe, Tetsuya Takahashi
Mitsuru Kawazoe, Tetsuya Takahashi
Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
Christian Robenhagen Ravnshoj
Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
Sunder Lal, Vandani Verma
Sunder Lal, Vandani Verma
General Certificateless Encryption and Timed-Release Encryption
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods
M. Gebhardt, G. Illies, W. Schindler
M. Gebhardt, G. Illies, W. Schindler
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Eike Kiltz, Yevgeniy Vahlis
Eike Kiltz, Yevgeniy Vahlis
Computing Pairings Using x-Coordinates Only
Steven D. Galbraith, Xibin Lin
Steven D. Galbraith, Xibin Lin
Disjunctive Multi-Level Secret Sharing
Mira Belenkiy
Mira Belenkiy
New State Recovery Attack on RC4
Alexander Maximov, Dmitry Khovratovich
Alexander Maximov, Dmitry Khovratovich
ECM using Edwards curves
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
Practical Short Signature Batch Verification
Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
Simulatable Adaptive Oblivious Transfer
Jan Camenisch, Gregory Neven, abhi shelat
Jan Camenisch, Gregory Neven, abhi shelat
Twisted Edwards Curves
Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
The Encrypted Elliptic Curve Hash
Daniel R. L. Brown
Daniel R. L. Brown
A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II
Ayan Mahalanobis
Ayan Mahalanobis
A Proof of Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the ``$H_{\sigma}$ technique''--
Jacques Patarin
Jacques Patarin
Generic Attacks for the Xor of k random permutations
Jacques Patarin
Jacques Patarin
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves
Zhitu su, Hui Li, Jianfeng Ma
Zhitu su, Hui Li, Jianfeng Ma
Efficient One-round Key Exchange in the Standard Model
Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Ralf Kuesters, Max Tuengerthal
Ralf Kuesters, Max Tuengerthal
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
Francois Mace, Francois-Xavier Standaert, Jean-Jacques Quisquater
Francois Mace, Francois-Xavier Standaert, Jean-Jacques Quisquater
Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
Palash Sarkar
Palash Sarkar
On Collisions of Hash Functions Turbo SHA-2
Vlastimil Klima
Vlastimil Klima
Fuzzy Identity Based Signature
Piyi Yang, Zhenfu Cao, Xiaolei Dong
Piyi Yang, Zhenfu Cao, Xiaolei Dong
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang
Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
Leonardo B. Oliveira, Michael Scott, Julio López, Ricardo Dahab
Leonardo B. Oliveira, Michael Scott, Julio López, Ricardo Dahab
MAC-free variant of KD04
Xianhui Lu, Xuejia Lai, Dake He
Xianhui Lu, Xuejia Lai, Dake He
Differential Fault Analysis on the AES Key Schedule
Junko Takahashi, Toshinori Fukunaga
Junko Takahashi, Toshinori Fukunaga
An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
J. Wu, D. R. Stinson
J. Wu, D. R. Stinson
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
Dafna Kidron, Yehuda Lindell
Dafna Kidron, Yehuda Lindell
Algebraic Side-Channel Collision Attacks on AES
Andrey Bogdanov, Andrey Pyshkin
Andrey Bogdanov, Andrey Pyshkin
Dynamic SHA
Xu Zijie
Xu Zijie
Obtaining Universally Composable Security: Towards the Bare Bones of Trust
Ran Canetti
Ran Canetti
Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
Martin Cochran
Martin Cochran
Authenticated Key Exchange and Key Encapsulation Without Random Oracles
Tatsuaki Okamoto
Tatsuaki Okamoto
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
Attacks on the WEP protocol
Erik Tews
Erik Tews
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
Bodo Möller, Andy Rupp
Bodo Möller, Andy Rupp
ID-Based Group Password-Authenticated Key Exchange
Xun Yi, Raylin Tso, Eiji Okamoto
Xun Yi, Raylin Tso, Eiji Okamoto
On the hash function of ODH assumption
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil Vadhan
André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil Vadhan
Improved Impossible Differential Cryptanalysis of CLEFIA
Wei Wang, Xiaoyun Wang
Wei Wang, Xiaoyun Wang
A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions
Zheng Gong, Xuejia Lai, Kefei Chen
Zheng Gong, Xuejia Lai, Kefei Chen
Secure Computation Without Authentication
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
Efficient GF(3m) Multiplication Algorithm for eta T Pairing
Gen Takahashi, Fumitaka Hoshino, Tetsutaro Kobayashi
Gen Takahashi, Fumitaka Hoshino, Tetsutaro Kobayashi
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Siamak F Shahandashti, Reihaneh Safavi-Naini
Siamak F Shahandashti, Reihaneh Safavi-Naini
Verifiable Attribute-based Encryption
Qiang Tang, Dongyao Ji
Qiang Tang, Dongyao Ji
Guarantees for Customers of Incentive Anonymizing Networks
Timothy Atkinson, Marius Silaghi
Timothy Atkinson, Marius Silaghi
Practical Anonymous Divisible E-Cash From Bounded Accumulators
Man Ho Au, Willy Susilo, Yi Mu
Man Ho Au, Willy Susilo, Yi Mu
Saving Private Randomness in One-Way Functions and Pseudorandom Generators
Nenad Dedic, Danny Harnik, Leonid Reyzin
Nenad Dedic, Danny Harnik, Leonid Reyzin
Comparing Implementation Efficiency of Ordinary and Squared Pairings
Christine Abegail Antonio, Tanaka Satoru, Ken Nakamula
Christine Abegail Antonio, Tanaka Satoru, Ken Nakamula
Precise Zero-Knowledge in Concurrent Setting
Ning Ding, Dawu Gu
Ning Ding, Dawu Gu
Analysis and optimization of elliptic-curve single-scalar multiplication
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Efficient Certificateless Signatures Suitable for Aggregation
Rafael Castro, Ricardo Dahab
Rafael Castro, Ricardo Dahab
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
Kenneth G. Paterson, Sriramkrishnan Srinivasan
Kenneth G. Paterson, Sriramkrishnan Srinivasan
Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott
Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott
Precise Concurrent Zero Knowledge
Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
Short Group Signature without Random Oracles
Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Jacques Patarin, Valérie Nachef, Côme Berbain
Jacques Patarin, Valérie Nachef, Côme Berbain
Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
Sergiy Pometun
Sergiy Pometun
Weak adaptive chosen ciphertext secure hybrid encryption scheme
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
Carlos AGUILAR MELCHOR, Philippe GABORIT
Carlos AGUILAR MELCHOR, Philippe GABORIT
Proposal of a new efficient public key system for encryption and digital signatures
Gerold Grünauer
Gerold Grünauer
Tight bounds between algebraic immunity and nonlinearities of high orders
Lobanov Mikhail
Lobanov Mikhail
Template Attacks with a Power Model
Moulay Abdelaziz EL AABID, Sylvain GUILLEY, Philippe HOOGVORST
Moulay Abdelaziz EL AABID, Sylvain GUILLEY, Philippe HOOGVORST
Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Faster Group Operations on Elliptic Curves
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
An Improved Remote User Authentication Scheme using Bilinear Pairings
Sunder Lal, K. K. Goyal
Sunder Lal, K. K. Goyal
Multiparty Key Agreement Using Bilinear Map
Nam-Su Jho, Myung-Hwan Kim, Do Won Hong, Byung-Gil Lee
Nam-Su Jho, Myung-Hwan Kim, Do Won Hong, Byung-Gil Lee
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty, Francisco Rodriguez-Henriquez
Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty, Francisco Rodriguez-Henriquez
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Gautham Sekar, Souradyuti Paul, Bart Preneel
Gautham Sekar, Souradyuti Paul, Bart Preneel
Irreducibility to the One-More Evaluation Problems: More May Be Less
Daniel R. L. Brown
Daniel R. L. Brown
Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
Xibin Lin, Chang-An Zhao, Fangguo Zhang, Yanming Wang
Xibin Lin, Chang-An Zhao, Fangguo Zhang, Yanming Wang
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
Fabien Coelho
Fabien Coelho
Trapdoors for Hard Lattices and New Cryptographic Constructions
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
Notions of Efficiency in Simulation Paradigm
Tzer-jen Wei
Tzer-jen Wei
Cryptanalysis of LASH
Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang
Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang
On compressible pairings and their computation
Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
Benjamin Smith
Benjamin Smith
Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
Sumanta Sarkar, Subhamoy Maitra
Sumanta Sarkar, Subhamoy Maitra
Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
Christine Abegail Antonio, Satoru Tanaka, Ken Nakamula
Christine Abegail Antonio, Satoru Tanaka, Ken Nakamula
On prime-order elliptic curves with embedding degrees k=3,4 and 6
Koray Karabina, Edlyn Teske
Koray Karabina, Edlyn Teske
When e-th Roots Become Easier Than Factoring
Antoine Joux, David Naccache, Emmanuel Thomé
Antoine Joux, David Naccache, Emmanuel Thomé
Finding Low Weight Polynomial Multiples Using Lattices
Laila El Aimani, Joachim von zur Gathen
Laila El Aimani, Joachim von zur Gathen
Structural Identity-Based Encryption
Man Ho Au, Siu-Ming Yiu
Man Ho Au, Siu-Ming Yiu
The role of help in Classical and Quantum Zero-Knowledge
André Chailloux, Iordanis Kerenidis
André Chailloux, Iordanis Kerenidis
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Jiayuan Sui, Douglas R. Stinson
Jiayuan Sui, Douglas R. Stinson
Cryptanalysis of the Random Number Generator of the Windows Operating System
Leo Dorrendorf, Zvi Gutterman, Benny Pinkas
Leo Dorrendorf, Zvi Gutterman, Benny Pinkas
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Amit K Awasthi
Amit K Awasthi
Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong
Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Optimizing double-base elliptic-curve single-scalar multiplication
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
Michael Vielhaber
Michael Vielhaber
Proposing a Master One-Way Function
Gideon Samid
Gideon Samid
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Inverted Edwards coordinates
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
Thomas Shrimpton, Martijn Stam
Thomas Shrimpton, Martijn Stam
Differential Cryptanalysis of PRESENT
Meiqin Wang
Meiqin Wang
Provably Secure Grouping-proofs for RFID tags
Mike Burmester, Breno de Medeiros, Rossana Motta
Mike Burmester, Breno de Medeiros, Rossana Motta
Modeling Computational Security in Long-Lived Systems
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding
Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Jonathan Katz, Amit Sahai, Brent Waters
Jonathan Katz, Amit Sahai, Brent Waters
Turbo SHA-2
Danilo Gligoroski, Svein Johan Knapskog
Danilo Gligoroski, Svein Johan Knapskog
Robust, Anonymous RFID Authentication with Constant Key-Lookup
Mike Burmester, Breno de Medeiros, Rossana Motta
Mike Burmester, Breno de Medeiros, Rossana Motta
Another Look at Automated Theorem-Proving
Neal Koblitz
Neal Koblitz
REMARKS ON IBE SCHEME OF WANG AND CAO
Sunder Lal, Priyam Sharma
Sunder Lal, Priyam Sharma
Ceremony Design and Analysis
Carl Ellison
Carl Ellison
A Short Signature Scheme in the Standard Model
Li Kang, Xiaohu Tang, Xianhui Lu, Jia Fan
Li Kang, Xiaohu Tang, Xianhui Lu, Jia Fan
On the security defects of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
Proxy Re-Signature Schemes without Random Oracles
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
Second Preimage Attacks on Dithered Hash Functions
Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sebastien Zimmer
Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sebastien Zimmer
Almost-everywhere Secure Computation
Juan A. Garay, Rafail Ostrovsky
Juan A. Garay, Rafail Ostrovsky
Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms
Haining Fan, Jiaguang Sun, Ming Gu, Kwok-Yan Lam
Haining Fan, Jiaguang Sun, Ming Gu, Kwok-Yan Lam
Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups
Jonathan Trostle, Andy Parrish
Jonathan Trostle, Andy Parrish
A novel public key crypto system based on semi-modules over quotient semi-rings
Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
Augusto Jun Devegili, Michael Scott, Ricardo Dahab
Augusto Jun Devegili, Michael Scott, Ricardo Dahab
Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
Dragos Florin Ciocan, Salil Vadhan
Dragos Florin Ciocan, Salil Vadhan
On Ciphertext Undetectability
Peter Gazi, Martin Stanek
Peter Gazi, Martin Stanek
Analysis of Local Optima in Block Ciphers
John A. Clark, Juan M. E. Tapiador
John A. Clark, Juan M. E. Tapiador
(Convertible) Undeniable Signatures without Random Oracles
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
On the insecurity of interchanged use of OFB and CBC modes of operation
Danilo Gligoroski
Danilo Gligoroski
Non-Interactive Anonymous Credentials
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Oblivious Transfer via McEliece's PKC and Permuted Kernels
K. Kobara, K. Morozov, R. Overbeck
K. Kobara, K. Morozov, R. Overbeck
Cryptanalysis of Two New Instances of TTM Cryptosystem
Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding
Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding
X-FCSR: a new software oriented stream cipher based upon FCSRs
Francois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier
Francois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier
On The Inequivalence Of Ness-Helleseth APN Functions
Xiangyong Zeng, Lei Hu, Yang Yang, Wenfeng Jiang
Xiangyong Zeng, Lei Hu, Yang Yang, Wenfeng Jiang
Algebraic Structure Defectoscopy
Sean O'Neil
Sean O'Neil
Fast Point Multiplication on Elliptic Curves of Even Order
Rongquan Feng, Hongfeng Wu
Rongquan Feng, Hongfeng Wu
An Efficient Range-Bounded Commitment Scheme
Zhengjun Cao
Zhengjun Cao
Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
Gregory Hirshman
Gregory Hirshman
On Factoring Arbitrary Integers with Known Bits
Mathias Herrmann, Alexander May
Mathias Herrmann, Alexander May
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
On the Authentication of One Popular Signcryption Scheme
Zhengjun Cao
Zhengjun Cao
Group-oriented encryption secure against collude attack
Chunbo Ma, Jun Ao, Jianhua Li
Chunbo Ma, Jun Ao, Jianhua Li
FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu
Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu
Universally Composable Multi-Party Computation with an Unreliable Common Reference String
Vipul Goyal, Jonathan Katz
Vipul Goyal, Jonathan Katz
Reducing Trust in the PKG in Identity Based Cryptosystems
Vipul Goyal
Vipul Goyal
Cryptanalysis of Rational Multivariate Public Key Cryptosystems
Jintai Ding, John Wagner
Jintai Ding, John Wagner
Breaking the Symmetry: a Way to Resist the New Differential Attack
Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, Vivien Dubois
Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, Vivien Dubois
Pairings on Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
Christian Robenhagen Ravnshoj
A Proof of Security of a Mesh Security Architecture
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
Fuzzy Private Matching (Extended Abstract)
Łukasz Chmielewski, Jaap-Henk Hoepman
Łukasz Chmielewski, Jaap-Henk Hoepman
Statistical Testing for Disk Encryption Modes of Operations
Mohamed Abo El-Fotouh, Klaus Diepold
Mohamed Abo El-Fotouh, Klaus Diepold
Proxy Re-encryption Systems for Identity-based Encryption
Toshihiko Matsuo
Toshihiko Matsuo
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent
Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent
Intrusion-Resilient Secret Sharing
Stefan Dziembowski, Krzysztof Pietrzak
Stefan Dziembowski, Krzysztof Pietrzak
Improving the Round Complexity of VSS in Point-to-Point Networks
Jonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan
Jonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan
A Note on Signature Standards
Michael Braun, Anton Kargl
Michael Braun, Anton Kargl
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
Christophe Petit, Francois-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti Yung
Christophe Petit, Francois-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti Yung
Secret sharing on the infinite ladder
Laszlo Csirmaz
Laszlo Csirmaz
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
Cheng-Kang Chu, Wen-Guey Tzeng
Cheng-Kang Chu, Wen-Guey Tzeng
Multiparty Computation to Generate Secret Permutations
Chris Studholme, Ian Blake
Chris Studholme, Ian Blake
New Local Collisions for the SHA-2 Hash Family
Somitra Kumar Sanadhya, Palash Sarkar
Somitra Kumar Sanadhya, Palash Sarkar
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Iftach Haitner, Jonathan J. Hoch, Gil Segev
Iftach Haitner, Jonathan J. Hoch, Gil Segev
On Tweaking Luby-Rackoff Blockciphers
David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
Statistically Hiding Sets
Manoj Prabhakaran, Rui Xue
Manoj Prabhakaran, Rui Xue
A Framework for Efficient and Composable Oblivious Transfer
Chris Peikert, Vinod Vaikuntanathan, Brent Waters
Chris Peikert, Vinod Vaikuntanathan, Brent Waters
Lai-Massey Scheme and Quasi-Feistel Networks
Aaram Yun, Je Hong Park, Jooyoung Lee
Aaram Yun, Je Hong Park, Jooyoung Lee
Secure multi-party computation on incomplete networks
Shailesh Vaya
Shailesh Vaya
Analysis of Underlying Assumptions in NIST DRBGs
Wilson Kan
Wilson Kan
Security Analysis of WAPI Authentication and Key Exchange Protocol
Liufei Wu, Yuqing Zhang, FengjiaoWang
Liufei Wu, Yuqing Zhang, FengjiaoWang
Updated standards for validating elliptic curves
Laura Hitt
Laura Hitt
A New Security Model for Cross-Realm C2C-PAKE Protocol
Fengjiao Wang, Yuqing Zhang
Fengjiao Wang, Yuqing Zhang
Multi-Party Indirect Indexing and Applications
Matthew Franklin, Mark Gondree, Payman Mohassel
Matthew Franklin, Mark Gondree, Payman Mohassel
Efficient Implementation of the Pairing on Mobilephones using BREW
Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
On the security of a class of image encryption schemes
Chengqing Li, Guanrong Chen
Chengqing Li, Guanrong Chen
VHASH Security
Wei Dai, Ted Krovetz
Wei Dai, Ted Krovetz
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
W. Bamberger, O. Welter, S. Spitz, M. Marhöfer
W. Bamberger, O. Welter, S. Spitz, M. Marhöfer
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
Onur Aciicmez, Werner Schindler
Onur Aciicmez, Werner Schindler
Encryption Techniques for Secure Database Outsourcing
Sergei Evdokimov, Oliver Guenther
Sergei Evdokimov, Oliver Guenther
New Constructions for UC Secure Computation using Tamper-proof Hardware
Nishanth Chandran, Vipul Goyal, Amit Sahai
Nishanth Chandran, Vipul Goyal, Amit Sahai
Towards Key-Dependent Message Security in the Standard Model
Dennis Hofheinz, Dominique Unruh
Dennis Hofheinz, Dominique Unruh
Universally Composable Multiparty Computation with Partially Isolated Parties
Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
Isolated Proofs of Knowledge and Isolated Zero Knowledge
Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
Remote Power Analysis of {RFID} Tags
Yossi Oren
Yossi Oren
A Tunable Broadcast Encryption Scheme
David Lubicz, Thomas Sirvent
David Lubicz, Thomas Sirvent
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
Ivan Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
Ivan Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Ivan Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
Ivan Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
Efficient Password-based Authenticated Key Exchange without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
Faster and Shorter Password-Authenticated Key Exchange
Rosario Gennaro
Rosario Gennaro
Towards provable security for route discovery protocols in mobile ad hoc networks
Mike Burmester, Breno de Medeiros
Mike Burmester, Breno de Medeiros
Attribute-Based Encryption with Non-Monotonic Access Structures
Rafail Ostrovsky, Amit Sahai, Brent Waters
Rafail Ostrovsky, Amit Sahai, Brent Waters
Identifying Ideal Lattices
Jintai Ding, Richard Lindner
Jintai Ding, Richard Lindner
Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
Selcuk Kavut, Melek Diker Yucel
Selcuk Kavut, Melek Diker Yucel
On the Big Gap Between $|p|$ and $|q|$ in DSA
Zhengjun Cao
Zhengjun Cao
A New Security Definition for Public Key Encryption Schemes and Its Applications
Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng
Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng
On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
Michael Neve, Kris Tiri
Michael Neve, Kris Tiri
Improving Upon the TET Mode of Operation
Palash Sarkar
Palash Sarkar
SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
Sunder Lal, Priyam Sharma
Sunder Lal, Priyam Sharma
Security under Key-Dependent Inputs
Shai Halevi, Hugo Krawczyk
Shai Halevi, Hugo Krawczyk
Formal Certification of Code-Based Cryptographic Proofs
G. Barthe, B. Grëgoire, R. Janvier, S. Zanella Bëguelin
G. Barthe, B. Grëgoire, R. Janvier, S. Zanella Bëguelin
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
Shengbao Wang, Zhenfu Cao, Zhaohui Cheng, Kim-Kwang Raymond Choo
Shengbao Wang, Zhenfu Cao, Zhaohui Cheng, Kim-Kwang Raymond Choo
Secure Similarity Search
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan
A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
Kwang Ho Kim
Kwang Ho Kim
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
Subhamoy Maitra
Subhamoy Maitra
Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
Selcuk Kavut, Melek Diker Yucel
Selcuk Kavut, Melek Diker Yucel
Locally Invertible Boolean Mappings
Oleg A. Logachev
Oleg A. Logachev
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière
Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière
On Non-Randomness of the Permutation after RC4 Key Scheduling
Goutam Paul, Subhamoy Maitra, Rohit Srivastava
Goutam Paul, Subhamoy Maitra, Rohit Srivastava
A Bound on the Size of Separating Hash Families
Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson, Gregory M. Zaverucha
Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson, Gregory M. Zaverucha
A Forward Secure Remote User Authentication Scheme
Manoj Kumar
Manoj Kumar
Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori Kuwakado, Masakatu Morii
Hidenori Kuwakado, Masakatu Morii
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
Yuri Borissov, Moon Ho Lee, Svetla Nikova
Yuri Borissov, Moon Ho Lee, Svetla Nikova
A Note on Automata-based Dynamic Convolutional Cryptosystems
Renji Tao
Renji Tao
Optimizing Multiprecision Multiplication for Public Key Cryptography
Michael Scott, Piotr Szczechowiak
Michael Scott, Piotr Szczechowiak
The Security of the Extended Codebook (XCB) Mode of Operation
David A. McGrew, Scott R. Fluhrer
David A. McGrew, Scott R. Fluhrer
Secret sharing on infinite graphs
Laszlo Csirmaz
Laszlo Csirmaz
Construction of Efficient and Secure Pairing Algorithm and its Application
Doo Ho Choi, Dong-Guk Han, Howon Kim
Doo Ho Choi, Dong-Guk Han, Howon Kim
Linearization Attacks Against Syndrome Based Hashes
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
Julien Bringer, Herve Chabanne, Thomas Icart
Julien Bringer, Herve Chabanne, Thomas Icart
Fully Resilient Traitor Tracing Scheme using Key Update
Eun Sun Yoo, Koutarou Suzuki, Myung-Hwan Kim
Eun Sun Yoo, Koutarou Suzuki, Myung-Hwan Kim
Improved security analysis of OMAC
Mridul Nandi
Mridul Nandi
Relations Among Notions of Plaintext Awareness
James Birkett, Alexander W. Dent
James Birkett, Alexander W. Dent
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
Sumanta Sarkar, Subhamoy Maitra
Sumanta Sarkar, Subhamoy Maitra
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
Michael Backes, Matteo Maffei, Dominique Unruh
Michael Backes, Matteo Maffei, Dominique Unruh
Secure Hybrid Encryption from Weakened Key Encapsulation
Dennis Hofheinz, Eike Kiltz
Dennis Hofheinz, Eike Kiltz
The Effectiveness of Receipt-Based Attacks on ThreeBallot
Kevin Henry, Douglas R. Stinson, Jiayuan Sui
Kevin Henry, Douglas R. Stinson, Jiayuan Sui
Faster addition and doubling on elliptic curves
Daniel J. Bernstein, Tanja Lange
Daniel J. Bernstein, Tanja Lange
Solving MRHS linear equations
Håvard Raddum, Igor Semaev
Håvard Raddum, Igor Semaev
No title
No Author
No Author
Provably Secure Framework for Information Aggregation is Sensor Networks
Mark Manulis, Joerg Schwenk
Mark Manulis, Joerg Schwenk
Analysis of countermeasures against access driven cache attacks on AES
Johannes Blömer, Volker Krummel
Johannes Blömer, Volker Krummel
A Pollard-like pseudorandom number generator over EC
Grzegorz Wojtenko
Grzegorz Wojtenko
On solving sparse algebraic equations over finite fields II
Igor Semaev
Igor Semaev
Lossy Trapdoor Functions and Their Applications
Chris Peikert, Brent Waters
Chris Peikert, Brent Waters
A Framework for Iterative Hash Functions - HAIFA
Eli Biham, Orr Dunkelman
Eli Biham, Orr Dunkelman
Cryptanalysis of a class of cryptographic hash functions
Praveen Gauravaram, John Kelsey
Praveen Gauravaram, John Kelsey
Prolific Codes with the Identifiable Parent Property
Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
`Good' Pseudo-Random Binary Sequences from Elliptic Curves
Zhixiong CHEN, Guozhen XIAO
Zhixiong CHEN, Guozhen XIAO
Group-based Proxy Re-encryption scheme
Chunbo Ma, Jun Ao, Jianhua Li
Chunbo Ma, Jun Ao, Jianhua Li
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
Mihir Bellare, Sarah Shoup
Mihir Bellare, Sarah Shoup
Cryptanalysis of a Hash Function Proposed at ICISC 2006
Willi Geiselmann, Rainer Steinwandt
Willi Geiselmann, Rainer Steinwandt
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Mihir Bellare, Thomas Ristenpart
Mihir Bellare, Thomas Ristenpart
Secret Ballot Elections with Unconditional Integrity
David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora
David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora
Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
Jeroen van de Graaf
Jeroen van de Graaf
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
CRUST: Cryptographic Remote Untrusted Storage without Public Keys
Erel Geron, Avishai Wool
Erel Geron, Avishai Wool
Filling the Gap between Voters and Cryptography in e-Voting
Wei Han, Dong Zheng, Ke-fei Chen
Wei Han, Dong Zheng, Ke-fei Chen
Which Languages Have 4-Round Zero-Knowledge Proofs?
Jonathan Katz
Jonathan Katz
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Thomas Ristenpart, Scott Yilek
Thomas Ristenpart, Scott Yilek
Efficiency Improvement for NTRU
Johannes Buchmann, Martin Döring, Richard Lindner
Johannes Buchmann, Martin Döring, Richard Lindner
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Subhamoy Maitra, Goutam Paul
Subhamoy Maitra, Goutam Paul
An Efficient One-move Nominative Signature Scheme
Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong
Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong
Algebraic Immunity Hierarchy of Boolean Functions
Ziran Tu, Yingpu Deng
Ziran Tu, Yingpu Deng
UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
Ulrich Kaiser
Ulrich Kaiser
A Forward-Secure Signature with Backward-Secure Detection
Dai-Rui Lin, Chih-I Wang
Dai-Rui Lin, Chih-I Wang
Aspects of Pairing Inversion
S. D. Galbraith, F. Hess, F. Vercauteren
S. D. Galbraith, F. Hess, F. Vercauteren
Efficient Identity Based Signature in Standard Model
S. Narayan
S. Narayan
Fully Secure Proxy Re-Encryption without Random Oracles
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
Choosing the correct elliptic curve in the CM method
K. Rubin, A. Silverberg
K. Rubin, A. Silverberg
A Verifiable Voting Protocol based on Farnel
Roberto Araujo, Ricardo Felipe Custodio, Jeroen van de Graaf
Roberto Araujo, Ricardo Felipe Custodio, Jeroen van de Graaf
A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
Vëronique Cortier, Ralf Kuesters, Bogdan Warinschi
Vëronique Cortier, Ralf Kuesters, Bogdan Warinschi
Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
Hongzhen Du, Qiaoyan Wen
Hongzhen Du, Qiaoyan Wen
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
Serge Fehr, Christian Schaffner
Serge Fehr, Christian Schaffner
1. AES seems weak. 2. Linear time secure cryptography
Warren D. Smith
Warren D. Smith
A Note on the Ate Pairing
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
BEDA: Button-Enabled Device Pairing
Claudio Soriente, Gene Tsudik, Ersin Uzun
Claudio Soriente, Gene Tsudik, Ersin Uzun
Incorporating Temporal Capabilities in Existing Key Management Schemes
Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
Martin Hlavac, Tomas Rosa
Martin Hlavac, Tomas Rosa
PORs: Proofs of Retrievability for Large Files
Ari Juels, Burton S. Kaliski Jr.
Ari Juels, Burton S. Kaliski Jr.
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee
Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee
Attribute Based Group Signature with Revocation
Dalia Khader
Dalia Khader
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
George I. Davida, Jeremy A. Hansen
George I. Davida, Jeremy A. Hansen
Making Large Hash Functions From Small Compression Functions
William R. Speirs, Ian Molloy
William R. Speirs, Ian Molloy
Long-lived digital integrity using short-lived hash functions
Stuart Haber
Stuart Haber
Forward-secure Key Evolution in Wireless Sensor Networks
Marek Klonowski, Mirosław Kutyłowski, Michał Ren, Katarzyna Rybarczyk
Marek Klonowski, Mirosław Kutyłowski, Michał Ren, Katarzyna Rybarczyk
Certificateless Ring Signatures
Sherman S. M. Chow, Wun-She Yap
Sherman S. M. Chow, Wun-She Yap
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Matthew Green, Susan Hohenberger
Matthew Green, Susan Hohenberger
Provable-Security Analysis of Authenticated Encryption in Kerberos
Alexandra Boldyreva, Virendra Kumar
Alexandra Boldyreva, Virendra Kumar
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Michael Backes, Markus Duermuth, Ralf Kuesters
Michael Backes, Markus Duermuth, Ralf Kuesters
A new paradigm of chosen ciphertext secure public key encryption scheme
Xianhui Lu, Xuejia Lai, Dake He
Xianhui Lu, Xuejia Lai, Dake He
Secure Two-Party k-Means Clustering
Paul Bunn, Rafail Ostrovsky
Paul Bunn, Rafail Ostrovsky
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar, Souradyuti Paul, Bart Preneel
Gautham Sekar, Souradyuti Paul, Bart Preneel
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
Ueli Maurer, Stefano Tessaro
Ueli Maurer, Stefano Tessaro
AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek El-Ghazawi
Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek El-Ghazawi
Related-Key Statistical Cryptanalysis
Darakhshan J. Mir, Poorvi L. Vora
Darakhshan J. Mir, Poorvi L. Vora
Generalized mix functions and orthogonal equitable rectangles
Douglas R. Stinson
Douglas R. Stinson
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
Shengli Liu, Xiaofeng Chen, Fangguo Zhang
Shengli Liu, Xiaofeng Chen, Fangguo Zhang
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan
Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black, Martin Cochran, Thomas Shrimpton
John Black, Martin Cochran, Thomas Shrimpton
Towards Security Limits in Side-Channel Attacks
Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater
Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
Michel Abdalla, Eike Kiltz, Gregory Neven
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
Fengjiao WANG, Yuqing ZHANG
Fengjiao WANG, Yuqing ZHANG
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
Liufei Wu, Yuqing Zhang, Fengjiao Wang
Liufei Wu, Yuqing Zhang, Fengjiao Wang
Differential Cryptanalysis in Stream Ciphers
Eli Biham, Orr Dunkelman
Eli Biham, Orr Dunkelman
Identity-Based Broadcast Encryption
Ryuichi Sakai, Jun Furukawa
Ryuichi Sakai, Jun Furukawa
Unlinkable Divisible Digital Cash without Trusted Third Party
Pawel Pszona, Grzegorz Stachowiak
Pawel Pszona, Grzegorz Stachowiak
Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
Jesper Buus Nielsen
Jesper Buus Nielsen
Matrix Power S-Box Construction
Eligijus Sakalauskas, Kestutis Luksys
Eligijus Sakalauskas, Kestutis Luksys
Unlinkable Randomizable Signature and Its Application in Group Signature
Sujing Zhou, Dongdai Lin
Sujing Zhou, Dongdai Lin
The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.
Andrey Khalyavin
Andrey Khalyavin
Scalable Storage Scheme from Forward Key Rotation
Chunbo Ma, Jun Ao, Jianhua Li
Chunbo Ma, Jun Ao, Jianhua Li
Efficient chosen ciphertext secure PKE scheme with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Liqun Chen, Qiang Tang
Liqun Chen, Qiang Tang
RC4 State Information at Any Stage Reveals the Secret Key
Goutam Paul, Subhamoy Maitra
Goutam Paul, Subhamoy Maitra
On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
Automatic Search of Differential Path in MD4
Pierre-Alain Fouque, Gaetan Leurent, Phong Nguyen
Pierre-Alain Fouque, Gaetan Leurent, Phong Nguyen
A kilobit special number field sieve factorization
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen Lenstra, Dag Arne Osvik
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen Lenstra, Dag Arne Osvik
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
Shu Yun Lim, Chuan Chin Pu, Hyo Taek Lim, Hoon Jae Lee
Shu Yun Lim, Chuan Chin Pu, Hyo Taek Lim, Hoon Jae Lee
Kipnis-Shamir's Attack on HFE Revisited
Xin Jiang, Jintai Ding, Lei Hu
Xin Jiang, Jintai Ding, Lei Hu
Provable Data Possession at Untrusted Stores
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song
The BBG HIBE Has Limited Delegation
Hovav Shacham
Hovav Shacham
ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
Philip Atzemoglou, Tal Malkin
Philip Atzemoglou, Tal Malkin
A Framework for Game-Based Security Proofs
David Nowak
David Nowak
Mutual Information Analysis -- A Universal Differential Side-Channel Attack
Benedikt Gierlichs, Lejla Batina, Pim Tuyls
Benedikt Gierlichs, Lejla Batina, Pim Tuyls
On-Line Ciphers and the Hash-CBC Constructions
Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
An Efficient Certificateless Signature Scheme
Rafael Castro, Ricardo Dahab
Rafael Castro, Ricardo Dahab
Verifying Statistical Zero Knowledge with Approximate Implementations
Ling Cheung, Sayan Mitra, Olivier Pereira
Ling Cheung, Sayan Mitra, Olivier Pereira
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
Ernie Brickell, Jiangtao Li
Ernie Brickell, Jiangtao Li
Some Identity Based Strong Bi-Designated Verifier Signature Schemes
Sunder Lal, Vandani Verma
Sunder Lal, Vandani Verma
Optimal Irreducible Polynomials for GF(2^m) Arithmetic
Michael Scott
Michael Scott
Deniable Internet Key-Exchange
Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
Tian Yuan
Tian Yuan
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee
Meng-Hui Lim, Sanggon Lee
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Kim-Kwang Raymond Choo
Kim-Kwang Raymond Choo
Executing Modular Exponentiation on a Graphics Accelerator
Andrew Moss, Dan Page, Nigel Smart
Andrew Moss, Dan Page, Nigel Smart
Fully Anonymous Group Signatures without Random Oracles
Jens Groth
Jens Groth
New FORK-256
Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee
Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee
Provable password-based tripartite key agreement protocol
Chunbo Ma, Jun Ao, Jianhua Li
Chunbo Ma, Jun Ao, Jianhua Li
Provably Secure Ciphertext Policy ABE
Ling Cheung, Calvin Newport
Ling Cheung, Calvin Newport
Optimistic Fair Exchange in a Multi-user Setting
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
Kwang Ho Kim, So In Kim
Kwang Ho Kim, So In Kim
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen
Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen
New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
Kwang Ho Kim, So In Kim, Ju Song Choe
Kwang Ho Kim, So In Kim, Ju Song Choe
Utility Sampling for Trust Metrics in PKI
Dakshi Agrawal and Charanjit Jutla
Dakshi Agrawal and Charanjit Jutla
Space-Efficient Identity Based Encryption Without Pairings
Dan Boneh, Craig Gentry, Michael Hamburg
Dan Boneh, Craig Gentry, Michael Hamburg
Seven-Property-Preserving Iterated Hashing: ROX
Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
Embedding Degree of Hyperelliptic Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
Christian Robenhagen Ravnshoj
Counting hyperelliptic curves that admit a Koblitz model
Cevahir Demirkiran, Enric Nart
Cevahir Demirkiran, Enric Nart
Provable Secure Generalized Signcryption
Xu An Wang, Xiaoyuan Yang, Yiliang Han
Xu An Wang, Xiaoyuan Yang, Yiliang Han
Batch Verification of Short Signatures
Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
Chosen-Ciphertext Secure Proxy Re-Encryption
Ran Canetti, Susan Hohenberger
Ran Canetti, Susan Hohenberger
Clone Resistant Mutual Authentication for Low-Cost RFID Technology
Stephane Lemieux, Adrian Tang
Stephane Lemieux, Adrian Tang
On the Security of Protocols with Logarithmic Communication Complexity
Michael Backes, Dominique Unruh
Michael Backes, Dominique Unruh
Random Oracles and Auxiliary Input
Dominique Unruh
Dominique Unruh
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)
Yi-Ru Liu, Wen-Guey Tzeng
Yi-Ru Liu, Wen-Guey Tzeng
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
Junghyun Nam
Junghyun Nam
Inductive Proof Method for Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
Yet Another MicroArchitectural Attack: Exploiting I-cache
Onur Aciicmez
Onur Aciicmez
Secure Deniable Authenticated Key Establishment for Internet Protocols
Meng-Hui Lim, Sanggon Lee, Youngho Park, Sangjae Moon
Meng-Hui Lim, Sanggon Lee, Youngho Park, Sangjae Moon
Bingo Voting: Secure and coercion-free voting using a trusted random number generator
Jens-Matthias Bohli, Joern Mueller-Quade, Stefan Roehrich
Jens-Matthias Bohli, Joern Mueller-Quade, Stefan Roehrich
Collusion-Resistant Group Key Management Using Attribute-Based Encryption
Ling Cheung, Joseph A. Cooley, Roger Khazan, Calvin Newport
Ling Cheung, Joseph A. Cooley, Roger Khazan, Calvin Newport
Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
Muxiang Zhang
Muxiang Zhang
Attribute Based Group Signatures
Dalia Khader
Dalia Khader
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
Mridul Nandi
Mridul Nandi
ConSum v0: An Experimental Cipher
David A. Madore
David A. Madore
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
Efficient Non-interactive Proof Systems for Bilinear Groups
Jens Groth, Amit Sahai
Jens Groth, Amit Sahai
Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
Danilo Gligoroski, Svein Johan Knapskog
Danilo Gligoroski, Svein Johan Knapskog
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
Aggelos Kiayias, Moti Yung
Aggelos Kiayias, Moti Yung
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
Nicolas T. Courtois
Nicolas T. Courtois
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Tal Moran, Moni Naor, Gil Segev
Tal Moran, Moni Naor, Gil Segev
Generators of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
Christian Robenhagen Ravnshoj
Towards Generating Secure Keys for Braid Cryptography
Ki Hyoung Ko, Jang Won Lee, Tony Thomas
Ki Hyoung Ko, Jang Won Lee, Tony Thomas
Practical Compact E-Cash
Man Ho Au, Willy Susilo, Yi Mu
Man Ho Au, Willy Susilo, Yi Mu
Using decision problems in public key cryptography
Vladimir Shpilrain, Gabriel Zapata
Vladimir Shpilrain, Gabriel Zapata
Time Capsule Signature: Efficient and Provably Secure Constructions
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev
Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev
Two New Examples of TTM
T. Moh
T. Moh
Offline/Online Mixing
Ben Adida, Douglas Wikström
Ben Adida, Douglas Wikström
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
Practical Cryptanalysis of SFLASH
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
Hidden Identity-Based Signatures
Aggelos Kiayias, Hong-Sheng Zhou
Aggelos Kiayias, Hong-Sheng Zhou
The Delivery and Evidences Layer
Amir Herzberg, Igal Yoffe
Amir Herzberg, Igal Yoffe
Efficient Pairing Computation on Curves
Rongquan Feng, Hongfeng Wu
Rongquan Feng, Hongfeng Wu
Multivariates Polynomials for Hashing
Jintai Ding, Bo-yin Yang
Jintai Ding, Bo-yin Yang
Fair Exchange Signature Schemes
Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
Efficient ID-based Signature Without Trusted PKG
Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
Osman Kocar
Osman Kocar
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
Helger Lipmaa
Helger Lipmaa
Equivocal Blind Signatures and Adaptive UC-Security
Aggelos Kiayias, Hong-Sheng Zhou
Aggelos Kiayias, Hong-Sheng Zhou
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
Some Results on Anonymity in Hybrid Encryption
Tian Yuan, Chen Zhi-Yu, Jin Yuee, Jin Feng, Ma Huihui
Tian Yuan, Chen Zhi-Yu, Jin Yuee, Jin Feng, Ma Huihui
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
Cameron McDonald, Chris Charnes, Josef Pieprzyk
Cameron McDonald, Chris Charnes, Josef Pieprzyk
Computationally Sound Mechanized Proofs of Correspondence Assertions
Bruno Blanchet
Bruno Blanchet
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
An Interesting Member ID-based Group Signature
Sujing Zhou, Dongdai Lin
Sujing Zhou, Dongdai Lin
Attacking the IPsec Standards in Encryption-only Configurations
Jean Paul Degabriele, Kenneth G. Paterson
Jean Paul Degabriele, Kenneth G. Paterson
Rebuttal of overtaking VEST
Benjamin Gittins, Howard Landman
Benjamin Gittins, Howard Landman
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Berkant Ustaoglu
Berkant Ustaoglu
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
Qiang Tang
Qiang Tang
Certificateless Encryption Schemes Strongly Secure in the Standard Model
Alexander W. Dent, Benoit Libert, Kenneth G. Paterson
Alexander W. Dent, Benoit Libert, Kenneth G. Paterson
Breaking 104 bit WEP in less than 60 seconds
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
Rerandomizable RCCA Encryption
Manoj Prabhakaran, Mike Rosulek
Manoj Prabhakaran, Mike Rosulek
Smooth Projective Hashing and Two-Message Oblivious Transfer
Shai Halevi, Yael Tauman Kalai
Shai Halevi, Yael Tauman Kalai
Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
Sihem Mesnager
Sihem Mesnager
A Zero-Knowledge Identification and Key Agreement Protocol
D. R. Stinson, J. Wu
D. R. Stinson, J. Wu
Quadratic Almost Perfect Nonlinear Functions With Many Terms
Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire
Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire
High Efficiency Feedback Shift Register: $\sigma-$LFSR
Guang Zeng, Wenbao Han, Kaicheng He
Guang Zeng, Wenbao Han, Kaicheng He
An Enhanced ID-based Deniable Authentication Protocol on Pairings
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
Koh-ichi Nagao
Koh-ichi Nagao
Privacy-Preserving Distributed Set Intersection
Qingsong Ye, Huaxiong Wang, Christophe Tartary
Qingsong Ye, Huaxiong Wang, Christophe Tartary
Construction of Pairing-Friendly Elliptic Curves
Woo Sug Kang
Woo Sug Kang
How to Enrich the Message Space of a Cipher
Thomas Ristenpart, Phillip Rogaway
Thomas Ristenpart, Phillip Rogaway
An Improved Distinguisher for Dragon
Joo Yeon Cho, Josef Pieprzyk
Joo Yeon Cho, Josef Pieprzyk
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
Yasuyuki MURAKAMI, Takeshi NASAKO
Yasuyuki MURAKAMI, Takeshi NASAKO
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
Masao KASAHARA
Masao KASAHARA
Isodual Reduction of Lattices
Nicholas A. Howgrave-Graham
Nicholas A. Howgrave-Graham
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
Roberto Avanzi
Roberto Avanzi
On the Role of Scheduling in Simulation-Based Security
Ran Canetti, Ling Cheung, Nancy Lynch, Olivier Pereira
Ran Canetti, Ling Cheung, Nancy Lynch, Olivier Pereira
Practical Password Recovery on an MD5 Challenge and Response
Yu Sasaki, Go Yamamoto, Kazumaro Aoki
Yu Sasaki, Go Yamamoto, Kazumaro Aoki
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Shengbao Wang, Zhenfu Cao
Shengbao Wang, Zhenfu Cao
Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
Jaime Gutierrez, Alvar Ibeas
Jaime Gutierrez, Alvar Ibeas
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
Lilya Budaghyan, Claude Carlet
Lilya Budaghyan, Claude Carlet
Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshøj
Christian Robenhagen Ravnshøj
Somos Sequence Near-Addition Formulas and Modular Theta Functions
R. Wm. Gosper, Rich Schroeppel
R. Wm. Gosper, Rich Schroeppel
Generic Certificateless Encryption in the Standard Model
Qiong Huang, Duncan S. Wong
Qiong Huang, Duncan S. Wong
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
Xavier Boyen
Xavier Boyen
HAPADEP: Human Asisted Pure Audio Device Pairing
Claudio Soriente, Gene Tsudik, Ersin Uzun
Claudio Soriente, Gene Tsudik, Ersin Uzun
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
Grzegorz Wojtenko
Grzegorz Wojtenko
Arithmetic Operators for Pairing-Based Cryptography
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
On the security of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
Ueli Maurer, Dominik Raub
Ueli Maurer, Dominik Raub
An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
Jie Liu, Jianhua Li
Jie Liu, Jianhua Li
Non-Interactive Proofs for Integer Multiplication
Ivan Damgard, Rune Thorbek
Ivan Damgard, Rune Thorbek
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Hongbo Yu, Xiaoyun Wang
Hongbo Yu, Xiaoyun Wang
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
Sanjit Chatterjee, Palash Sarkar
Sanjit Chatterjee, Palash Sarkar
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
Brett Hemenway, Rafail Ostrovsky
Brett Hemenway, Rafail Ostrovsky
Deniable Authentication on the Internet
Shaoquan Jiang
Shaoquan Jiang
Revisiting an Efficient Elliptic Curve Key Agreement Protocol
Maurizio Adriano Strangio
Maurizio Adriano Strangio
Weakly only Unforgeable Signature and Its Application in Group Signature
Sujing Zhou, Dongdai Lin
Sujing Zhou, Dongdai Lin
How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki, Kaoru Kurosawa
Kazuhiro Suzuki, Kaoru Kurosawa
MPC vs. SFE: Perfect Security in a Unified Corruption Model
Zuzana Beerliova-Trubiniova, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
Zuzana Beerliova-Trubiniova, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
On bent functions with zero second derivatives
Sugata Gangopadhyay
Sugata Gangopadhyay
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Kaoru Kurosawa, Kazuhiro Suzuki
Kaoru Kurosawa, Kazuhiro Suzuki
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar, Souradyuti Paul, Bart Preneel
Gautham Sekar, Souradyuti Paul, Bart Preneel
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
Hovav Shacham
Hovav Shacham
Public Key Encryption that Allows PIR Queries
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard
Namin Yu, Howard M. Heys
Namin Yu, Howard M. Heys
Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
Ahto Buldas, Sven Laur
Ahto Buldas, Sven Laur
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
Alexander Maximov
Alexander Maximov
Nominative Signature: Application, Security Model and Construction
Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
Efficient Hierarchical Identity Based Signature in the Standard Model
Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
withdrawn
withdrawn
withdrawn
Low-Density Attack Revisited
Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
How to Derive Lower Bound on Oblivious Transfer Reduction
Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba
Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba
Algebraic Lower Bounds for Computing on Encrypted Data
Rafail Ostrovsky, William E. Skeith III
Rafail Ostrovsky, William E. Skeith III
Constructing new APN functions from known ones
Lilya Budaghyan, Claude Carlet, Gregor Leander
Lilya Budaghyan, Claude Carlet, Gregor Leander
Algebraic and Slide Attacks on KeeLoq
Nicolas T. Courtois, Gregory V. Bard, David Wagner
Nicolas T. Courtois, Gregory V. Bard, David Wagner
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
Neil Costigan, Michael Scott
Neil Costigan, Michael Scott
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Yonatan Aumann, Yehuda Lindell
Yonatan Aumann, Yehuda Lindell
A Survey of Single Database PIR: Techniques and Applications
Rafail Ostrovsky, William E. Skeith III
Rafail Ostrovsky, William E. Skeith III
The simplest method for constructing APN polynomials EA-inequivalent to power functions
Lilya Budaghyan
Lilya Budaghyan
Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
David Freeman
David Freeman
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
Cryptanalysis of the KeeLoq block cipher
Andrey Bogdanov
Andrey Bogdanov
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
Souradyuti Paul
Souradyuti Paul
Compiler Assisted Elliptic Curve Cryptography
M. Barbosa, A. Moss, D. Page
M. Barbosa, A. Moss, D. Page
Forward-Secure Sequential Aggregate Authentication
Di Ma, Gene Tsudik
Di Ma, Gene Tsudik
Forward-secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester, Breno de Medeiros
Tri van Le, Mike Burmester, Breno de Medeiros
Special block cipher family DN and new generation SNMAC-type hash function family HDN
Vlastimil KLIMA
Vlastimil KLIMA
Security Arguments for a Class of ID-based Signatures
jin zhou, ya-juan zhang, yue-fei zhu
jin zhou, ya-juan zhang, yue-fei zhu
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Daniel R. L. Brown, Kristian Gjøsteen
Daniel R. L. Brown, Kristian Gjøsteen
New Constructions of Fuzzy Identity-Based Encryption
Joonsang Baek, Willy Susilo, Jianying Zhou
Joonsang Baek, Willy Susilo, Jianying Zhou
Direct Reduction of String (1,2)-OT to Rabin's OT
Kaoru Kurosawa, Takeshi Koshiba
Kaoru Kurosawa, Takeshi Koshiba
A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
Design and Primitive Specification for Shannon
Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory Rose, Miriam Wiggers de Vries
Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory Rose, Miriam Wiggers de Vries
Reflection Attacks on Product Ciphers
Orhun Kara
Orhun Kara
Authorship Proof for Textual Document
J. Wu, D. R. Stinson
J. Wu, D. R. Stinson
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B. Skoric, S. Katzenbeisser, M. U. Celik
B. Skoric, S. Katzenbeisser, M. U. Celik
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
Pradeep Kumar Mishra, Vassil Dimitrov
Pradeep Kumar Mishra, Vassil Dimitrov
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Onur Aciicmez, Shay Gueron, Jean-Pierre Seifert
Onur Aciicmez, Shay Gueron, Jean-Pierre Seifert
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
Joo Yeon Cho, Josef Pieprzyk
Joo Yeon Cho, Josef Pieprzyk
Best Quadratic Approximations of Cubic Boolean Functions
Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
Eike Kiltz
Eike Kiltz
Cryptanalysis of white box DES implementations
Louis Goubin, Jean-Michel Masereel, Michael Quisquater
Louis Goubin, Jean-Michel Masereel, Michael Quisquater
A New Type of Cipher: DICING_CSB
Li An-Ping
Li An-Ping
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
Eike Kiltz
Eike Kiltz
An improved collision probability for CBC-MAC and PMAC
Avradip Mandal, Mridul Nandi
Avradip Mandal, Mridul Nandi
Improved Security Analysis of PMAC
Mridul Nandi, Avradip Mandal
Mridul Nandi, Avradip Mandal
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Debrup Chakraborty, Palash Sarkar
Debrup Chakraborty, Palash Sarkar
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
Debrup Chakraborty, Palash Sarkar
Debrup Chakraborty, Palash Sarkar
Verifying Data Integrity with Few Queries to Untrusted Memory
Nachiketh R. Potlapally
Nachiketh R. Potlapally
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang
Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang
Private Locally Decodable Codes
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
Gregory V. Bard, Nicolas T. Courtois, Chris Jefferson.
Gregory V. Bard, Nicolas T. Courtois, Chris Jefferson.
Efficient Hybrid Encryption from ID-Based Encryption
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
On Perfectly Balanced Boolean Functions
O. A. Logachev
O. A. Logachev
Two Trivial Attacks on Trivium
Alexander Maximov, Alex Biryukov
Alexander Maximov, Alex Biryukov
TinyTate: Identity-Based Encryption for Sensor Networks
Leonardo B. Oliveira, Diego Aranha, Eduardo Morais, Felipe Daguano, Julio Lo'pez, Ricardo Dahab
Leonardo B. Oliveira, Diego Aranha, Eduardo Morais, Felipe Daguano, Julio Lo'pez, Ricardo Dahab
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
Changshe Ma, Jian Weng, Dong Zheng
Changshe Ma, Jian Weng, Dong Zheng
Strongly-Secure Identity-based Key Agreement and Anonymous Extension
Sherman S. M. Chow, Kim-Kwang Raymond Choo
Sherman S. M. Chow, Kim-Kwang Raymond Choo
Group Decryption
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
VEST Ciphers
Sean O'Neil, Benjamin Gittins, Howard A. Landman
Sean O'Neil, Benjamin Gittins, Howard A. Landman
Group Encryption
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
Invertible Universal Hashing and the TET Encryption Mode
Shai Halevi
Shai Halevi
Optimised versions of the Ate and Twisted Ate Pairings
Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto
Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto
Interactive two-channel message authentication based on interactive-collision Resistant hash functions
Atefeh Mashatan, Douglas R. Stinson
Atefeh Mashatan, Douglas R. Stinson
Universally Composable Key-evolving Signature
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
David Freeman, Kristin Lauter
David Freeman, Kristin Lauter
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
Zhenfu Cao, Xiaolei Dong, Licheng Wang
Zhenfu Cao, Xiaolei Dong, Licheng Wang
Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
Dong Hoon Lee, Je Hong Park, Jaewoo Han
Dong Hoon Lee, Je Hong Park, Jaewoo Han
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Wei Gao, Xueli Wang, Guilin Wang, Fei Li
Wei Gao, Xueli Wang, Guilin Wang, Fei Li
Efficient Dynamic k-Times Anonymous Authentication
Lan Nguyen
Lan Nguyen
Privacy-Protecting Coupon System Revisited
Lan Nguyen
Lan Nguyen
Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
Johann Groszschaedl, Alexander Szekely, Stefan Tillich
Johann Groszschaedl, Alexander Szekely, Stefan Tillich
Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
Huang Lin, Zhenfu Cao
Huang Lin, Zhenfu Cao
Families of genus 2 curves with small embedding degree
Laura Hitt
Laura Hitt
Inductive Trace Properties for Computational Security
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori Kuwakado, Masakatu Morii
Hidenori Kuwakado, Masakatu Morii
A New Identity Based Encryption Scheme From Pairing
Xianhui Lu, Dake He, Guomin Li
Xianhui Lu, Dake He, Guomin Li
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Countermeasures for the Simple Branch Prediction Analysis
Giovanni Agosta, Gerardo Pelosi
Giovanni Agosta, Gerardo Pelosi
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
Donghoon Chang
Donghoon Chang
Cryptanalysis of REESSE1+ Public Key Cryptosystem
Shengli Liu, Fangguo Zhang
Shengli Liu, Fangguo Zhang
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
Donghoon Chang
Donghoon Chang
Dynamic Cryptographic Hash Functions
William R. Speirs II, Samuel S. Wagstaff Jr.
William R. Speirs II, Samuel S. Wagstaff Jr.
Password-Authenticated Multi-Party Key Exchange with Different Passwords
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee
New Technique for Solving Sparse Equation Systems
Håvard Raddum, Igor Semaev
Håvard Raddum, Igor Semaev
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
Chang-An Zhao, Fangguo Zhang, Jiwu Huang
Identity-Based Proxy Re-encryption
Matthew Green, Giuseppe Ateniese
Matthew Green, Giuseppe Ateniese
A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment
Luis Teixeira d'Aguiar Norton Brandao
Luis Teixeira d'Aguiar Norton Brandao
Multiplication and Squaring on Pairing-Friendly Fields
Augusto Jun Devegili, Colm Ó~hÉigeartaigh, Michael Scott, Ricardo Dahab
Augusto Jun Devegili, Colm Ó~hÉigeartaigh, Michael Scott, Ricardo Dahab
On the security of a group key agreement protocol
Qiang Tang
Qiang Tang
An Attack on Disguised Elliptic Curves
David Mireles
David Mireles
White Box Cryptography: Another Attempt
Julien Bringer, Herve Chabanne, Emmanuelle Dottax
Julien Bringer, Herve Chabanne, Emmanuelle Dottax
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
Donghoon Chang, Moti Yung
Donghoon Chang, Moti Yung
Prime Order Primitive Subgroups in Torus-Based Cryptography
Jason E. Gower
Jason E. Gower
Security and Composition of Cryptographic Protocols: A Tutorial
Ran Canetti
Ran Canetti
Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
Obfuscation for Cryptographic Purposes
Dennis Hofheinz, John Malone-Lee, Martijn Stam
Dennis Hofheinz, John Malone-Lee, Martijn Stam
Improved Collision and Preimage Resistance Bounds on PGV Schemes
Lei Duo, Chao Li
Lei Duo, Chao Li
On Post-Modern Cryptography
Oded Goldreich
Oded Goldreich
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
Donghoon Chang
Donghoon Chang
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
Claude Carlet
Claude Carlet
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing
Aggelos Kiayias, Moti Yung
Aggelos Kiayias, Moti Yung
Linear Approximating to Integer Addition
Li An-Ping
Li An-Ping
Indistinguishability Amplification
Ueli Maurer, Krzysztof Pietrzak, Renato Renner
Ueli Maurer, Krzysztof Pietrzak, Renato Renner
On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation
Jonathan Katz
Jonathan Katz
How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
Key Replacement Attack on a Certificateless Signature Scheme
Zhenfeng Zhang, Dengguo Feng
Zhenfeng Zhang, Dengguo Feng
Hybrid Protocol For Password-based Key Exchange in Three-party Setting
TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Jongsung Kim
Jongsung Kim
Secure Cryptographic Workflow in the Standard Model
M. Barbosa, P. Farshim
M. Barbosa, P. Farshim
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
Mihir Bellare, Phillip Rogaway
Mihir Bellare, Phillip Rogaway
Universally Composable and Forward Secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester, Breno de Medeiros
Tri van Le, Mike Burmester, Breno de Medeiros
Towards a Separation of Semantic and CCA Security for Public Key Encryption
Yael Gertner, Tal Malkin, Steven Myers
Yael Gertner, Tal Malkin, Steven Myers
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo
Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo
A class of quadratic APN binomials inequivalent to power functions
Lilya Budaghyan, Claude Carlet, Gregor Leander
Lilya Budaghyan, Claude Carlet, Gregor Leander
Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
Chris Peikert, Alon Rosen
Chris Peikert, Alon Rosen
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Yvo Desmedt, Tanja Lange, Mike Burmester
Yvo Desmedt, Tanja Lange, Mike Burmester
An attack on the certificateless signature scheme from EUC Workshops 2006
Je Hong Park
Je Hong Park
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
Donghoon Chang, Mridul Nandi
Donghoon Chang, Mridul Nandi
A New Type of Group Signature Scheme
Jun Zhong Dake He
Jun Zhong Dake He
A New Type of Group Blind Signature Scheme Based on Bilinear Pairings
Jun Zhong Dake He
Jun Zhong Dake He
On the pseudo-random generator ISAAC
Jean-Philippe Aumasson
Jean-Philippe Aumasson
On Zigzag Functions and Related Objects in New Metric
An Braeken, Ventzislav Nikov, Svetla Nikova
An Braeken, Ventzislav Nikov, Svetla Nikova
Statistically-Hiding Commitment from Any One-Way Function
Iftach Haitner, Omer Reingold
Iftach Haitner, Omer Reingold
Searching for Shapes in Cryptographic Protocols (extended version)
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
Balanced Boolean Functions with (more than) Maximum Algebraic Immunity
Deepak Kumar Dalai, Subhamoy Maitra
Deepak Kumar Dalai, Subhamoy Maitra
Information Theoretic Bounds on Authentication Systems in Query Model
Reihaneh Safavi-Naini, Peter Wild
Reihaneh Safavi-Naini, Peter Wild
Universally Composable Security with Global Setup
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing
Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
From Weak to Strong Watermarking
Nicholas Hopper, David Molnar, David Wagner
Nicholas Hopper, David Molnar, David Wagner
On a new invariant of Boolean functions
Sugata Gangopadhyay, Deepmala Sharma
Sugata Gangopadhyay, Deepmala Sharma
Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4
Lilya Budaghyan, Claude Carlet, Gregor Leander
Lilya Budaghyan, Claude Carlet, Gregor Leander
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
Christophe Tartary, Huaxiong Wang
Christophe Tartary, Huaxiong Wang
A protocol
anoymous
anoymous
Security Analysis of Voice-over-IP Protocols
Prateek Gupta, Vitaly Shmatikov
Prateek Gupta, Vitaly Shmatikov
Perfect NIZK with Adaptive Soundness
Masayuki Abe, Serge Fehr
Masayuki Abe, Serge Fehr
Long-term Security and Universal Composability
Joern Mueller-Quade, Dominique Unruh
Joern Mueller-Quade, Dominique Unruh
Universally Composable Three-Party Key Distribution
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
The REESSE1+ Public Key Cryptosystem v 2.21
Shenghui Su, Shuwang Lv
Shenghui Su, Shuwang Lv
Some New Hidden Ideal Cryptosystems
Ilia Toli
Ilia Toli
Analysis of Privacy-Preserving Element Reduction of Multiset
Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong
Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong
The Recent Attack of Nie et al On TTM is Faulty
T. Moh
T. Moh
Authenticated Interleaved Encryption
Claude Castelluccia
Claude Castelluccia
On the Minimal Embedding Field
Laura Hitt
Laura Hitt
Zero Knowledge and Soundness are Symmetric
Shien Jin Ong, Salil Vadhan
Shien Jin Ong, Salil Vadhan
Preimage Attack on Parallel FFT-Hashing
Donghoon Chang
Donghoon Chang
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
Donghoon Chang
Donghoon Chang
Preimage Attack on Hashing with Polynomials proposed at ICISC'06
Donghoon Chang
Donghoon Chang
Galois Field Commitment Scheme
Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
A NEW MAC: LAMA
Li An-Ping
Li An-Ping
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
Goichiro Hanaoka, Hideki Imai
Goichiro Hanaoka, Hideki Imai
Cryptography in the Multi-string Model
Jens Groth, Rafail Ostrovsky
Jens Groth, Rafail Ostrovsky
Redundancy of the Wang-Yu Sufficient Conditions
Yuto Nakano, Hidenori Kuwakado, Masakatu Morii
Yuto Nakano, Hidenori Kuwakado, Masakatu Morii
Universally Composable Blind Signatures in the Plain Model
Aslak Bakke Buan, Kristian Gøsteen, Lillian Kråkmo
Aslak Bakke Buan, Kristian Gøsteen, Lillian Kråkmo
Faugere's F5 Algorithm Revisited
Till Stegers
Till Stegers
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
Willi Geiselmann, Rainer Steinwandt
Willi Geiselmann, Rainer Steinwandt
Algebraic Cryptanalysis of the Data Encryption Standard
Nicolas T. Courtois, Gregory V. Bard
Nicolas T. Courtois, Gregory V. Bard
On the cost of cryptanalytic attacks
Jean-Philippe Aumasson
Jean-Philippe Aumasson
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Mihir Bellare, Thomas Ristenpart
Mihir Bellare, Thomas Ristenpart
The Layered Games Framework for Specifications and Analysis of Security Protocols
Amir Herzberg, Igal Yoffe
Amir Herzberg, Igal Yoffe
Revisiting the Efficiency of Malicious Two-Party Computation
David P. Woodruff
David P. Woodruff
Security Protocols with Isotropic Channels
Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan
Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan
Security-Focused Survey on Group Key Exchange Protocols
Mark Manulis
Mark Manulis
Identity Based Strong Designated Verifier Proxy Signature Schemes
Sunder Lal, Vandani Verma
Sunder Lal, Vandani Verma
The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable
Sujing Zhou, Dongdai Lin
Sujing Zhou, Dongdai Lin
The Tate Pairing via Elliptic Nets
Katherine E. Stange
Katherine E. Stange
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security
Ronald Cramer, Dennis Hofheinz, Eike Kiltz
Ronald Cramer, Dennis Hofheinz, Eike Kiltz
Revisit of CS98
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Traceable Ring Signature
Eiichiro Fujisaki, Koutarou Suzuki
Eiichiro Fujisaki, Koutarou Suzuki
Survey on Security Requirements and Models for Group Key Exchange
Mark Manulis
Mark Manulis
A Note on the Security of NTRUSign
Phong Q. Nguyen
Phong Q. Nguyen
The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange
Mark Wooding
Mark Wooding
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Joerg Schwenk
Emmanuel Bresson, Mark Manulis, Joerg Schwenk
Design and Analysis of a Hash Ring-iterative Structure
Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang
Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang
Traitor tracing scheme with constant ciphertext rate against powerful pirates
Thomas Sirvent
Thomas Sirvent
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
E-yong Kim, Hwangnam Kim, Kunsoo Park
E-yong Kim, Hwangnam Kim, Kunsoo Park
Cryptanalysis on an Algorithm for Efficient Digital Signatures
Fuw-Yi Yang
Fuw-Yi Yang
On Security of Sovereign Joins
Einar Mykletun, Gene Tsudik
Einar Mykletun, Gene Tsudik
Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator
Matthew J. Campagna
Matthew J. Campagna
A New Key Exchange Primitive Based on the Triple Decomposition Problem
Yesem Kurt
Yesem Kurt
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
James Birkett, Alexander W. Dent, Gregory Neven, Jacob Schuldt
James Birkett, Alexander W. Dent, Gregory Neven, Jacob Schuldt
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions
Vlastimil KLIMA
Vlastimil KLIMA
Distortion maps for genus two curves
Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin Smith
Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin Smith
Robust Final-Round Cache-Trace Attacks Against AES
Joseph Bonneau
Joseph Bonneau
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Joseph K. Liu, Man Ho Au, Willy Susilo
Joseph K. Liu, Man Ho Au, Willy Susilo
A taxonomy of pairing-friendly elliptic curves
David Freeman, Michael Scott, Edlyn Teske
David Freeman, Michael Scott, Edlyn Teske
Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3
Robert Ronan, Colm o hEigeartaigh, Colin Murphy, Tim Kerins, Paulo S. L. M. Barreto
Robert Ronan, Colm o hEigeartaigh, Colin Murphy, Tim Kerins, Paulo S. L. M. Barreto
A DoS Attack Against the Integrity-Less ESP (IPSec)
Ventzislav Nikov
Ventzislav Nikov
RadioGatún, a belt-and-mill hash function
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
An Attack on a Certificateless Signature Scheme
Xuefei Cao, Kenneth G. Paterson, Weidong Kou
Xuefei Cao, Kenneth G. Paterson, Weidong Kou
A Latency-Free Election Scheme
Kristian Gjøsteen
Kristian Gjøsteen
Revisit of KD04
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
Gregory V. Bard
Gregory V. Bard
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Ventzislav Nikov, Svetla Nikova, Bart Preneel
Ventzislav Nikov, Svetla Nikova, Bart Preneel
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
Palash Sarkar, Sanjit Chatterjee
Palash Sarkar, Sanjit Chatterjee
Generic Construction of (Identity-based) Perfect Concurrent Signatures
Sherman S. M. Chow, Willy Susilo
Sherman S. M. Chow, Willy Susilo
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Marc Stevens, Arjen Lenstra, Benne de Weger
Marc Stevens, Arjen Lenstra, Benne de Weger
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
Mihir Bellare, Oded Goldreich
Mihir Bellare, Oded Goldreich
Public Key Encryption with Keyword Search based on K-Resilient IBE
Dalia Khader
Dalia Khader
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild
Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild
Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds
Emilia Käsper, Sven Laur, Helger Lipmaa
Emilia Käsper, Sven Laur, Helger Lipmaa
Concurrent Non-Malleable Zero Knowledge
Boaz Barak, Manoj Prabhakaran, Amit Sahai
Boaz Barak, Manoj Prabhakaran, Amit Sahai
A new stream cipher: DICING
Li An-Ping
Li An-Ping
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
Zhenjie Huang, Kefei Chen, Yumin Wang
Zhenjie Huang, Kefei Chen, Yumin Wang
Foundations of Secure E-Commerce: The Order Layer
Amir Herzberg, Igal Yoffe
Amir Herzberg, Igal Yoffe
On the Power of Simple Branch Prediction Analysis
Onur Aciicmez, Cetin Kaya Koc, Jean-Pierre Seifert
Onur Aciicmez, Cetin Kaya Koc, Jean-Pierre Seifert
Impossible Differential Cryptanalysis of ARIA and Camellia
Wenling Wu, Wentao Zhang, Dengguo Feng
Wenling Wu, Wentao Zhang, Dengguo Feng
A Note On Side-Channels Resulting From Dynamic Compilation
D. Page
D. Page
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
Krzysztof Pietrzak
Krzysztof Pietrzak
Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1
Fumiyuki Momose, Jinhui Chao
Fumiyuki Momose, Jinhui Chao
Generic Transformation to Strongly Unforgeable Signatures
Qiong Huang, Duncan S. Wong, Yiming Zhao
Qiong Huang, Duncan S. Wong, Yiming Zhao
Private and Efficient Stable Marriages (Matching)
T. Atkinson, R. Bartak, M. -C. Silaghi, E. Tuleu, M. Zanker
T. Atkinson, R. Bartak, M. -C. Silaghi, E. Tuleu, M. Zanker
A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority
Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
Verifiably Encrypted Signature Scheme with Threshold Adjudication
M. Choudary Gorantla, Ashutosh Saxena
M. Choudary Gorantla, Ashutosh Saxena
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
MV3: A new word based stream cipher using rapid mixing and revolving buffers
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
Cryptanalyses of Some Multimedia Encryption Schemes
Chengqing Li
Chengqing Li
A New family of Ideal Multipartite Access Structure Based on MSP
Jun Xu, Jiwen Zeng, Xiaomin Zha
Jun Xu, Jiwen Zeng, Xiaomin Zha
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
Fagen Li, Yupu Hu, Shuanggen Liu
Fagen Li, Yupu Hu, Shuanggen Liu
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
D. R. Stinson, J. Wu
D. R. Stinson, J. Wu
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
A ID-Based Deniable Authentication Protocol on pairings
Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
Colliding Message Pair for 53-Step HAS-160
Florian Mendel
Florian Mendel
Discrete Logarithms in Generalized Jacobians
S. D. Galbraith, B. A. Smith
S. D. Galbraith, B. A. Smith
Improved Efficiency for Private Stable Matching
Matthew Franklin, Mark Gondree, Payman Mohassel
Matthew Franklin, Mark Gondree, Payman Mohassel
On the Security of Generalized Jacobian Cryptosystems
Isabelle Dechene
Isabelle Dechene
Extended Double-Base Number System with applications to Elliptic Curve Cryptography
Christophe Doche, Laurent Imbert
Christophe Doche, Laurent Imbert
Designated Verifier Signature Scheme Based on Braid Groups
Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan
Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
Jonathan Katz, Adam Smith
Jonathan Katz, Adam Smith
Invisible Designated Confirmer Signatures without Random Oracles
Victor K. Wei
Victor K. Wei
The Average Transmission Overhead of Broadcast Encryption
Sarang Aravamuthan, Sachin Lodha
Sarang Aravamuthan, Sachin Lodha
Computational Soundness of Formal Indistinguishability and Static Equivalence
Gergei Bana, Payman Mohassel, Till Stegers
Gergei Bana, Payman Mohassel, Till Stegers
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction
Yassir Nawaz, Kishan Chand Gupta, Guang Gong
Yassir Nawaz, Kishan Chand Gupta, Guang Gong
Efficient Pseudorandom Generators Based on the DDH Assumption
Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
CMSS -- An Improved Merkle Signature Scheme
Johannes Buchmann, Luis Carlos Coronado Garcia, Erik Dahmen, Martin Doering, Elena Klintsevich
Johannes Buchmann, Luis Carlos Coronado Garcia, Erik Dahmen, Martin Doering, Elena Klintsevich
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Scott Contini, Yiqun Lisa Yin
Scott Contini, Yiqun Lisa Yin
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Chunbo Ma, Jun Ao, Jianhua Li
Chunbo Ma, Jun Ao, Jianhua Li
Weaknesses of the FORK-256 compression function
Krystian Matusiewicz, Scott Contini, Josef Pieprzyk
Krystian Matusiewicz, Scott Contini, Josef Pieprzyk
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
Sarang Aravamuthan, Viswanatha Rao Thumparthy
Sarang Aravamuthan, Viswanatha Rao Thumparthy
On the Necessity of Rewinding in Secure Multiparty Computation
Michael Backes, Joern-Mueller Quade, Dominique Unruh
Michael Backes, Joern-Mueller Quade, Dominique Unruh
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields
Lars Elmegaard-Fessel
Lars Elmegaard-Fessel
ElGamal type signature schemes for n-dimensional vector spaces
Iwan M. Duursma, SeungKook Park
Iwan M. Duursma, SeungKook Park
Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme
Bennian Dou, Chungen Xu
Bennian Dou, Chungen Xu
A d-Sequence based Recursive Random Number Generator
Abhishek Parakh
Abhishek Parakh
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
Efficient ID-based Threshold Signature Schemes without Pairings
Jun Shao, Zhenfu Cao, Licheng Wang
Jun Shao, Zhenfu Cao, Licheng Wang
Note on Design Criteria for Rainbow-Type Multivariates
Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen
Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability
Alexander W. Dent, Qiang Tang
Alexander W. Dent, Qiang Tang
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
V. S. Dimitrov, K. U. Jaervinen, M. J. Jacobson Jr., W. F. Chan, Z. Huang
V. S. Dimitrov, K. U. Jaervinen, M. J. Jacobson Jr., W. F. Chan, Z. Huang
Identity-Based Encryption Gone Wild
Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
Eric Filiol
Eric Filiol
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
Atefeh Mashatan, Douglas R. Stinson
Atefeh Mashatan, Douglas R. Stinson
New features for JPEG Steganalysis
Johann Barbier, Éric Filiol, Kichenakoumar Mayoura
Johann Barbier, Éric Filiol, Kichenakoumar Mayoura
Attacks and Modifications of CJC's E-voting Scheme
Bennian Dou, Chun-hua Chen, Roberto Araujo
Bennian Dou, Chun-hua Chen, Roberto Araujo
Efficient Implementation of Tate Pairing on a Mobile Phone using Java
Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
Dan Boneh, Brent Waters
Dan Boneh, Brent Waters
Forward-Secure Signatures with Untrusted Update
Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
On the Generic Construction of Identity-Based Signatures with Additional Properties
David Galindo, Javier Herranz, Eike Kiltz
David Galindo, Javier Herranz, Eike Kiltz
Visual secret sharing scheme with autostereogram
Feng Yi, Daoshun Wang, Yiqi Dai
Feng Yi, Daoshun Wang, Yiqi Dai
The Collision Intractability of MDC-2 in the Ideal Cipher Model
John P Steinberger
John P Steinberger
Fast Algorithms for the Free Riders Problem in Broadcast Encryption
Zulfikar Ramzan, David P. Woodruff
Zulfikar Ramzan, David P. Woodruff
Ideal Multipartite Secret Sharing Schemes
Oriol Farras, Jaume Marti-Farre, Carles Padro
Oriol Farras, Jaume Marti-Farre, Carles Padro
Hard Homogeneous Spaces
Jean-Marc Couveignes
Jean-Marc Couveignes
On Authentication with HMAC and Non-Random Properties
Christian Rechberger, Vincent Rijmen
Christian Rechberger, Vincent Rijmen
Efficient Ring Signatures without Random Oracles
Hovav Shacham, Brent Waters
Hovav Shacham, Brent Waters
Predicting Secret Keys via Branch Prediction
Onur Aciicmez, Jean-Pierre Seifert, Cetin Kaya Koc
Onur Aciicmez, Jean-Pierre Seifert, Cetin Kaya Koc
Conjunctive, Subset, and Range Queries on Encrypted Data
Dan Boneh, Brent Waters
Dan Boneh, Brent Waters
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
Sujing Zhou, Dongdai Lin
Sujing Zhou, Dongdai Lin
Unrestricted Aggregate Signatures
Mihir Bellare, Chanathip Namprempre, Gregory Neven
Mihir Bellare, Chanathip Namprempre, Gregory Neven
Constant Round Group Key Exchange with Logarithmic Computational Complexity
Junghyun Nam, Youngsook Lee, Dongho Won
Junghyun Nam, Youngsook Lee, Dongho Won
Does Privacy Require True Randomness?
Carl Bosley, Yevgeniy Dodis
Carl Bosley, Yevgeniy Dodis
Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
Victor K. Wei, Fangguo Zhang
Victor K. Wei, Fangguo Zhang
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
Phillip Rogaway
Phillip Rogaway
Deniable Authentication and Key Exchange
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
Sanjit Chatterjee, Palash Sarkar
Sanjit Chatterjee, Palash Sarkar
Fundamental problems in provable security and cryptography
Alexander W. Dent
Alexander W. Dent
On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
Oded Goldreich
Oded Goldreich
Mitigating Dictionary Attacks on Password-Protected Local Storage
Ran Canetti, Shai Halevi, Michael Steiner
Ran Canetti, Shai Halevi, Michael Steiner
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
Debrup Chakraborty, Palash Sarkar
Debrup Chakraborty, Palash Sarkar
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Debasis Giri, P. D. Srivastava
Debasis Giri, P. D. Srivastava
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Mikio Fujii
Mikio Fujii
Efficient Use of Random Delays
Olivier Benoit, Michael Tunstall
Olivier Benoit, Michael Tunstall
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Gregory V. Bard
Gregory V. Bard
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
An Analysis of the Hermes8 Stream Ciphers
Steve Babbage, Carlos Cid, Norbert Pramstaller, Havard Raddum
Steve Babbage, Carlos Cid, Norbert Pramstaller, Havard Raddum
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
Mihir Bellare, Tadayoshi Kohno, Victor Shoup
Mihir Bellare, Tadayoshi Kohno, Victor Shoup
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
Michael Backes, Peeter Laud
Michael Backes, Peeter Laud
Some (in)sufficient conditions for secure hybrid encryption.
Javier Herranz, Dennis Hofheinz, Eike Kiltz
Javier Herranz, Dennis Hofheinz, Eike Kiltz
A Simple and Unified Method of Proving Unpredictability
Mridul Nandi
Mridul Nandi
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
Dragos Trinca
Dragos Trinca
Logical Concepts in Cryptography
Simon Kramer
Simon Kramer
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
Frederic Didier
Frederic Didier
A Note On Game-Hopping Proofs
Alexander W. Dent
Alexander W. Dent
Simplified Submission of Inputs to Protocols
Douglas Wikstrom
Douglas Wikstrom
Cryptanalysis of a Cognitive Authentication Scheme
Philippe Golle, David Wagner
Philippe Golle, David Wagner
Efficient Divisor Class Halving on Genus Two Curves
Peter Birkner
Peter Birkner
Constant-Round Concurrent NMWI and its relation to NMZK
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
Malicious KGC Attacks in Certificateless Cryptography
Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang
Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang
Applications of SAT Solvers to Cryptanalysis of Hash Functions
Ilya Mironov, Lintao Zhang
Ilya Mironov, Lintao Zhang
Hard Instances of the Constrained Discrete Logarithm Problem
Ilya Mironov, Anton Mityagin, Kobbi Nissim
Ilya Mironov, Anton Mityagin, Kobbi Nissim
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Maurizio A. Strangio
Maurizio A. Strangio
Accelerating Cryptanalysis with the Method of Four Russians
Gregory V. Bard
Gregory V. Bard
Linear Cryptanalysis of CTC
Orr Dunkelman, Nathan Keller
Orr Dunkelman, Nathan Keller
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
Selcuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yucel
Selcuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yucel
Disguising tori and elliptic curves
Steven D. Galbraith
Steven D. Galbraith
Factoring Class Polynomials over the Genus Field
Marcel Martin
Marcel Martin
ON THE POSTQUANTUM CIPHER SCHEME
Jaroslav HRUBY
Jaroslav HRUBY
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
K. Phani Kumar, G. Shailaja, Ashutosh Saxena
K. Phani Kumar, G. Shailaja, Ashutosh Saxena
Length-based cryptanalysis: The case of Thompson's Group
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
Haina Zhang, Shaohui Wang, Xiaoyun Wang
Haina Zhang, Shaohui Wang, Xiaoyun Wang
A Stronger Definition for Anonymous Electronic Cash
Marten Trolin
Marten Trolin
Computing Zeta Functions of Nondegenerate Curves
W. Castryck, J. Denef, F. Vercauteren
W. Castryck, J. Denef, F. Vercauteren
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
Yi Deng, Dongdai Lin
Yi Deng, Dongdai Lin
Searchable Index Schemes for Groups : Security vs. Efficiency
Hyun-A Park, Yu Jeong Lee, Dong Hoon Lee
Hyun-A Park, Yu Jeong Lee, Dong Hoon Lee
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
Claire Whelan, Mike Scott
Claire Whelan, Mike Scott
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
Application of ECM to a Class of RSA keys
Abderrahmane Nitaj
Abderrahmane Nitaj
RFID Security: Tradeoffs between Security and Efficiency
Ivan Damgård, Michael Østergaard
Ivan Damgård, Michael Østergaard
A simple generalization of El-Gamal cryptosystem to non-abelian groups
Ayan Mahalanobis
Ayan Mahalanobis
Improvement to AKS algorithm
Roman Popovych
Roman Popovych
A handy multi-coupon system
Sebastien Canard, Aline Gouget, Emeline Hufschmitt
Sebastien Canard, Aline Gouget, Emeline Hufschmitt
Another Look at Generic Groups
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Another Look at "Provable Security". II
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
Mihir Bellare, Amit Sahai
Mihir Bellare, Amit Sahai
An Elliptic Curve Processor Suitable For RFID-Tags
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede
The Fairness of Perfect Concurrent Signatures
Guilin Wang, Feng Bao, Jianying Zhou
Guilin Wang, Feng Bao, Jianying Zhou
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Generalizations of the Karatsuba Algorithm for Efficient Implementations
André Weimerskirch, Christof Paar
André Weimerskirch, Christof Paar
What Hashes Make RSA-OAEP Secure?
Daniel R. L. Brown
Daniel R. L. Brown
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
R. Overbeck
R. Overbeck
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
Phillip Rogaway, Thomas Shrimpton
Phillip Rogaway, Thomas Shrimpton
Multi-Dimensional Montgomery Ladders for Elliptic Curves
Daniel R. L. Brown
Daniel R. L. Brown
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
Statistical Analysis of the MARS Block Cipher
Andrey Pestunov
Andrey Pestunov
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
Meloni Nicolas
Meloni Nicolas
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
Shujun Li, Chengqing Li, Kowk-Tung Lo, Guanrong Chen
Shujun Li, Chengqing Li, Kowk-Tung Lo, Guanrong Chen
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Luby-Rackoff Ciphers from Weak Round Functions?
Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
Kemal BICAKCI, Bruno Crispo, Andrew S. Tanenbaum
Kemal BICAKCI, Bruno Crispo, Andrew S. Tanenbaum
A Survey of Certificateless Encryption Schemes and Security Models
Alexander W. Dent
Alexander W. Dent
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky
Minimal Weight and Colexicographically Minimal Integer Representations
Clemens Heuberger, James A. Muir
Clemens Heuberger, James A. Muir
Private Information Retrieval Using Trusted Hardware
Shuhong Wang, Xuhua Ding, Robert Deng, Feng Bao
Shuhong Wang, Xuhua Ding, Robert Deng, Feng Bao
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
Javier Herranz, Dennis Hofheinz, Eike Kiltz
Javier Herranz, Dennis Hofheinz, Eike Kiltz
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
ID-Based Ring Signature Scheme secure in the Standard Model
Man Ho Au, Joseph K. Liu, Y. H. Yuen, Duncan S. Wong
Man Ho Au, Joseph K. Liu, Y. H. Yuen, Duncan S. Wong
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar.
Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar.
Generalization of the Selective-ID Security Model for HIBE Protocols
Sanjit Chatterjee, Palash Sarkar
Sanjit Chatterjee, Palash Sarkar
Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
Efficient Tate Pairing Computation Using Double-Base Chains
Chang'an Zhao, Fangguo Zhang, Jiwu Huang
Chang'an Zhao, Fangguo Zhang, Jiwu Huang
Improvement of recently proposed Remote User Authentication Schemes
Guanfei Fang, Genxun huang
Guanfei Fang, Genxun huang
Identity-based Key Agreement Protocols From Pairings
L. Chen, Z. Cheng, N. P. Smart
L. Chen, Z. Cheng, N. P. Smart
Cryptographically Private Support Vector Machines
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
On ZK-Crypt, Book Stack, and Statistical Tests
S. Doroshenko, A. Fionov, A. Lubkin, V. Monarev, B. Ryabko
S. Doroshenko, A. Fionov, A. Lubkin, V. Monarev, B. Ryabko
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
Self-Generated-Certificate Public Key Cryptosystem
Joseph K. Liu, Man Ho Au
Joseph K. Liu, Man Ho Au
(Hierarchical Identity-Based) Threshold Ring Signatures
Victor K. Wei, Tsz Hon Yuen
Victor K. Wei, Tsz Hon Yuen
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
Osman Kocar
Osman Kocar
A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
Sahadeo Padhye
Sahadeo Padhye
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
Berry Schoenmakers, Andrey Sidorenko
Berry Schoenmakers, Andrey Sidorenko
Unconditionally secure chaffing and winnowing with short authentication tags
D. R. Stinson
D. R. Stinson
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
Tetsu Iwata
Tetsu Iwata
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
Deterministic and Efficiently Searchable Encryption
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
Minh-Huyen Nguyen, Shien Jin Ong, Salil Vadhan
Minh-Huyen Nguyen, Shien Jin Ong, Salil Vadhan
On Signatures of Knowledge
Melissa Chase, Anna Lysyanskaya
Melissa Chase, Anna Lysyanskaya
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
On the Limits of Point Function Obfuscation
Arvind Narayanan, Vitaly Shmatikov
Arvind Narayanan, Vitaly Shmatikov
There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$
Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions
Dmitry Khovratovich
Dmitry Khovratovich
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
Chang Shu, Soonhak Kwon, Kris Gaj
Chang Shu, Soonhak Kwon, Kris Gaj
A New Cryptosystem Based On Hidden Order Groups
Amitabh Saxena, Ben Soh
Amitabh Saxena, Ben Soh
On the (Im-)Possibility of Extending Coin Toss
Dennis Hofheinz, Joern Mueller-Quade, Dominique Unruh
Dennis Hofheinz, Joern Mueller-Quade, Dominique Unruh
Counting points on elliptic curves in medium characteristic
Antoine Joux, Reynald Lercier
Antoine Joux, Reynald Lercier
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
Moni Naor, Gil Segev, Adam Smith
Moni Naor, Gil Segev, Adam Smith
Frobenius expansion and the Diffie Hellman problem
V. R. Sule
V. R. Sule
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
Le Trieu Phong, Ogata Wakaha
Le Trieu Phong, Ogata Wakaha
On Computing Products of Pairings
R Granger, N. P. Smart
R Granger, N. P. Smart
Key confirmation and adaptive corruptions in the protocol security logic
Prateek Gupta, Vitaly Shmatikov
Prateek Gupta, Vitaly Shmatikov
Visual Cryptography Schemes with Optimal Pixel Expansion
Carlo Blundo, Stelvio Cimato, Alfredo De Santis
Carlo Blundo, Stelvio Cimato, Alfredo De Santis
Simplified pairing computation and security implications
Steven D. Galbraith, Colm O hEigeartaigh, Caroline Sheedy
Steven D. Galbraith, Colm O hEigeartaigh, Caroline Sheedy
How Fast can be Algebraic Attacks on Block Ciphers ?
Nicolas T. Courtois
Nicolas T. Courtois
Towards Trustworthy e-Voting using Paper Receipts
Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
General Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
Sorin Iftene
Pairings for Cryptographers
S. D. Galbraith, K. G. Paterson, N. P. Smart
S. D. Galbraith, K. G. Paterson, N. P. Smart
Classification of Signature-only Signature Models
Zhengjun Cao
Zhengjun Cao
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods
Gregory V. Bard
Gregory V. Bard
A Summary of McEliece-Type Cryptosystems and their Security
D. Engelbert, R. Overbeck, A. Schmidt
D. Engelbert, R. Overbeck, A. Schmidt
Cryptanalysis of 4-Pass HAVAL
Zhangyi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng
Zhangyi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng
A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings
L. Chen, Z. Cheng, N. P. Smart
L. Chen, Z. Cheng, N. P. Smart
Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006
Joonsang Baek, Guilin Wang
Joonsang Baek, Guilin Wang
An Efficient ID-based Proxy Signature Scheme from Pairings
Chunxiang Gu, Yuefei Zhu
Chunxiang Gu, Yuefei Zhu
An efficient way to access an array at a secret index
Timothy Atkinson, Marius C. Silaghi
Timothy Atkinson, Marius C. Silaghi
The Hardness of the DHK Problem in the Generic Group Model
Alexander W. Dent
Alexander W. Dent
Independent Zero-Knowledge Sets
Rosario Gennaro, Silvio Micali
Rosario Gennaro, Silvio Micali
New Public Key Authentication Frameworks with Lite Certification Authority
Xiaolei Dong, Licheng Wang, Zhenfu Cao
Xiaolei Dong, Licheng Wang, Zhenfu Cao
On the Relationships Between Notions of Simulation-Based Security
Anupam Datta, Ralf Kuesters, John C. Mitchell, Ajith Ramanathan
Anupam Datta, Ralf Kuesters, John C. Mitchell, Ajith Ramanathan
Pairing based Mutual Authentication Scheme Using Smart Cards
G. Shailaja, K. Phani Kumar, Ashutosh Saxena
G. Shailaja, K. Phani Kumar, Ashutosh Saxena
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Ralf Kuesters
Ralf Kuesters
Demonstrating data possession and uncheatable data transfer
Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto
Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto
A method of construction of balanced functions with optimum algebraic immunity
C. Carlet
C. Carlet
Computational Indistinguishability between Quantum States and Its Cryptographic Application
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
New Integrated proof Method on Iterated Hash Structure and New Structures
Duo Lei
Duo Lei
Completeness of Formal Hashes in the Standard Model
Flavio D. Garcia, Peter van Rossum
Flavio D. Garcia, Peter van Rossum
PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES
Alexander Rostovtsev, Anton Stolbunov
Alexander Rostovtsev, Anton Stolbunov
Implementing Cryptographic Pairings on Smartcards
Michael Scott, Neil Costigan, Wesam Abdulwahab
Michael Scott, Neil Costigan, Wesam Abdulwahab
Blinded Fault Resistant Exponentiation
Guillaume Fumaroli, David Vigilant
Guillaume Fumaroli, David Vigilant
Rational Secret Sharing, Revisited
S. Dov Gordon, Jonathan Katz
S. Dov Gordon, Jonathan Katz
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei
Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
Jiejun Kong
Jiejun Kong
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
Francois-Xavier Standaert, Tal G. Malkin, Moti Yung
Francois-Xavier Standaert, Tal G. Malkin, Moti Yung
Trace-Driven Cache Attacks on AES
Onur Ac\i{}içmez, Çetin Kaya Koç
Onur Ac\i{}içmez, Çetin Kaya Koç
Defining Strong Privacy for RFID
Ari Juels, Stephen A. Weis
Ari Juels, Stephen A. Weis
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
Gregory V. Bard
Gregory V. Bard
The Design Principle of Hash Function with Merkle-Damgård Construction
Duo Lei, Da Lin, Li Chao, Keqin Feng, Longjiang Qu
Duo Lei, Da Lin, Li Chao, Keqin Feng, Longjiang Qu
Identity Based Strong Designated Verifier Signature Scheme
K. Phani Kumar, G. Shailaja, Ashutosh Saxena
K. Phani Kumar, G. Shailaja, Ashutosh Saxena
Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials
Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio López-Hernández
Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio López-Hernández
Conditional Reactive Simulatability
Michael Backes, Markus Duermuth, Dennis Hofheinz, Ralf Kuesters
Michael Backes, Markus Duermuth, Dennis Hofheinz, Ralf Kuesters
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
Mike Burmester, Tri van Le, Breno de Medeiros
Mike Burmester, Tri van Le, Breno de Medeiros
Simulatable Security and Polynomially Bounded Concurrent Composition
Dennis Hofheinz, Dominique Unruh
Dennis Hofheinz, Dominique Unruh
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
Wei Han, Dong Zheng, Ke-fei Chen
Wei Han, Dong Zheng, Ke-fei Chen
On the existence of distortion maps on ordinary elliptic curves
Denis Charles
Denis Charles
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
Sourav Mukhopadhyay, Palash Sarkar
Sourav Mukhopadhyay, Palash Sarkar
ECGSC: Elliptic Curve based Generalized Signcryption Scheme
Yiliang Han, Xiaoyuan Yang
Yiliang Han, Xiaoyuan Yang
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves
Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee
Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving
K. W. Wong, Edward C. W. Lee, L. M. Cheng, Xiaofeng Liao
K. W. Wong, Edward C. W. Lee, L. M. Cheng, Xiaofeng Liao
Designated Confirmer Signatures Revisited
Douglas Wikström
Douglas Wikström
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Eike Kiltz
Eike Kiltz
Counting Prime Numbers with Short Binary Signed Representation
José de Jesús Angel Angel, Guillermo Morales-Luna
José de Jesús Angel Angel, Guillermo Morales-Luna
Key Privacy for Identity Based Encryption
Jason E. Holt
Jason E. Holt
Repairing Attacks on a Password-Based Group Key Agreement
Ratna Dutta, Rana Barua
Ratna Dutta, Rana Barua
On construction of non-normal Boolean functions
Sugata Gangopadhyay, Deepmala Sharma
Sugata Gangopadhyay, Deepmala Sharma
Conjectured Security of the ANSI-NIST Elliptic Curve RNG
Daniel R. L. Brown
Daniel R. L. Brown
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
Mario Lamberger, Norbert Pramstaller, Vincent Rijmen
Mario Lamberger, Norbert Pramstaller, Vincent Rijmen
Fast exponentiation via prime finite field isomorphism
Alexander Rostovtsev
Alexander Rostovtsev
Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
A New Construction of Time Capsule Signature
Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian
Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
Markus Volkmer
Markus Volkmer
Attacking LCCC Batch Verification of RSA Signatures
Martin Stanek
Martin Stanek
The Eta Pairing Revisited
F. Hess, N. P. Smart, F. Vercauteren
F. Hess, N. P. Smart, F. Vercauteren
A Simpler Sieving Device: Combining ECM and TWIRL
Willi Geiselmann, Fabian Januszewski, Hubert Koepfer, Jan Pelzl, Rainer Steinwandt
Willi Geiselmann, Fabian Januszewski, Hubert Koepfer, Jan Pelzl, Rainer Steinwandt
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
The number field sieve for integers of low weight
Oliver Schirokauer
Oliver Schirokauer
Further Refinement of Pairing Computation Based on Miller's Algorithm
Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen
Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen
Tunnels in Hash Functions: MD5 Collisions Within a Minute
Vlastimil Klima
Vlastimil Klima
Fast Collision Attack on MD5
Marc Stevens
Marc Stevens
Security of VSH in the Real World
Markku-Juhani O. Saarinen
Markku-Juhani O. Saarinen
Efficient Blind and Partially Blind Signatures Without Random Oracles
Tatsuaki Okamoto
Tatsuaki Okamoto
Information-theoretic analysis of coating PUFs
B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls
B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
Zhou Sujing, Lin Dongdai
Zhou Sujing, Lin Dongdai
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
Dongvu Tonien, Reihaneh Safavi-Naini
Dongvu Tonien, Reihaneh Safavi-Naini
Gröbner Basis Based Cryptanalysis of SHA-1
Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
A Cryptographic Tour of the IPsec Standards
Kenneth G. Paterson
Kenneth G. Paterson
Sequential Aggregate Signatures and Multisignatures without Random Oracles
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
MAC Reforgeability
John Black, Martin Cochran
John Black, Martin Cochran
Cryptanalysis of the MEM Mode of Operation
Peng Wang, Dengguo Feng, Wenling Wu
Peng Wang, Dengguo Feng, Wenling Wu
RSA and a higher degree diophantine equation
Abderrahmane Nitaj
Abderrahmane Nitaj
Cryptanalysis of RSA with constrained keys
Abderrahmane Nitaj
Abderrahmane Nitaj
The Complexity of Online Memory Checking
Moni Naor, Guy Rothblum
Moni Naor, Guy Rothblum
Secure Sketch for Multi-Sets
Ee-Chien Chang, Vadym Fedyukovych, Qiming Li
Ee-Chien Chang, Vadym Fedyukovych, Qiming Li
A Tree-based Model of Unicast Stream Authentication
Goce Jakimoski, Yvo Desmedt
Goce Jakimoski, Yvo Desmedt
On the Feasibility of Consistent Computations
Sven Laur, Helger Lipmaa
Sven Laur, Helger Lipmaa
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
Analysis of the Linux Random Number Generator
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
Xavier Boyen, Brent Waters
Xavier Boyen, Brent Waters
Cryptography from Anonymity
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Browsers Defenses Against Phishing, Spoofing and Malware
Amir Herzberg
Amir Herzberg
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
HariGovind V. Ramasamy, Christian Cachin
HariGovind V. Ramasamy, Christian Cachin
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
Efficient Identity-based Signatures Secure in the Standard Model
Kenneth G. Paterson, Jacob C. N. Schuldt
Kenneth G. Paterson, Jacob C. N. Schuldt
Towards Provably Secure Group Key Agreement Building on Group Theory
Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
Verifiable Random Permutations
Yevgeniy Dodis, Prashant Puniya
Yevgeniy Dodis, Prashant Puniya
On Secret Sharing Schemes, Matroids and Polymatroids
Jaume Marti-Farre, Carles Padro
Jaume Marti-Farre, Carles Padro
A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
Amitabh Saxena, Ben Soh
Amitabh Saxena, Ben Soh
ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM
TOMOHIRO HARAYAMA
TOMOHIRO HARAYAMA
How to Construct Sufficient Condition in Searching Collisions of MD5
Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
Stronger Security of Authenticated Key Exchange
Brian LaMacchia, Kristin Lauter, Anton Mityagin
Brian LaMacchia, Kristin Lauter, Anton Mityagin
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
Yaniv Shaked, Avishai Wool
Yaniv Shaked, Avishai Wool
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
Ueli Maurer, Johan Sjödin
Ueli Maurer, Johan Sjödin
The experimental distinguishing attack on RC4
Sergey Doroshenko, Boris Ryabko
Sergey Doroshenko, Boris Ryabko
Automated Security Proofs with Sequences of Games
Bruno Blanchet, David Pointcheval
Bruno Blanchet, David Pointcheval
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Michael Backes, Birgit Pfitzmann, Michael Waidner
Michael Backes, Birgit Pfitzmann, Michael Waidner
Scalar Multiplication on Koblitz Curves using Double Bases
Roberto Avanzi, Francesco Sica
Roberto Avanzi, Francesco Sica
Simple and Flexible Private Revocation Checking
John Solis, Gene Tsudik
John Solis, Gene Tsudik
On Expected Constant-Round Protocols for Byzantine Agreement
Jonathan Katz, Chiu-Yuen Koo
Jonathan Katz, Chiu-Yuen Koo
Perturbing and Protecting a Traceable Block Cipher
Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
Provably Secure Universal Steganographic Systems
Boris Ryabko, Daniil Ryabko
Boris Ryabko, Daniil Ryabko
A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
Debrup Chakraborty, Palash Sarkar
Debrup Chakraborty, Palash Sarkar
--Withdrawn--
Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
An Efficient ID-based Signature Scheme from Pairings
Chunxiang Gu, Yuefei Zhu, Xiaoyu Pan
Chunxiang Gu, Yuefei Zhu, Xiaoyu Pan
High Security Pairing-Based Cryptography Revisited
R. Granger, D. Page, N. P. Smart
R. Granger, D. Page, N. P. Smart
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
Key Exchange Using Passwords and Long Keys
Vladimir Kolesnikov, Charles Rackoff
Vladimir Kolesnikov, Charles Rackoff
Key Exchange Protocols: Security Definition, Proof Method and Applications
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
Multicollision Attacks on some Generalized Sequential Hash Functions
M. Nandi, D. R. Stinson
M. Nandi, D. R. Stinson
How to Build a Low-Cost, Extended-Range RFID Skimmer
Ilan Kirschenbaum, Avishai Wool
Ilan Kirschenbaum, Avishai Wool
Cryptanalysis of the CFVZ cryptosystem
J. J. Climent, E. Gorla, J. Rosenthal
J. J. Climent, E. Gorla, J. Rosenthal
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert
Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
Secure Device Pairing based on a Visual Channel
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
Crossword Puzzle Attack on NLS
Joo Yeon Cho, Josef Pieprzyk
Joo Yeon Cho, Josef Pieprzyk
New Results on Multipartite Access Structures
Javier Herranz, German Saez
Javier Herranz, German Saez
Cryptographically Sound Theorem Proving
Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner
Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner
Efficient Primitives from Exponentiation in Zp
Shaoquan Jiang
Shaoquan Jiang
Fully Collusion Resistant Traitor Tracing
Dan Boneh, Amit Sahai, Brent Waters
Dan Boneh, Amit Sahai, Brent Waters
Linear Integer Secret Sharing and Distributed Exponentiation
Ivan Damgard, Rune Thorbek
Ivan Damgard, Rune Thorbek
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
Mihir Bellare
Mihir Bellare
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
Sourav Mukhopadhyay, Palash Sarkar
Sourav Mukhopadhyay, Palash Sarkar
Reactively Simulatable Certified Mail
Birgit Pfitzmann, Matthias Schunter, Michael Waidner
Birgit Pfitzmann, Matthias Schunter, Michael Waidner
Linkable Democratic Group Signatures
Mark Manulis, Ahmad-Reza Sadeghi, Joerg Schwenk
Mark Manulis, Ahmad-Reza Sadeghi, Joerg Schwenk
Two-Round AES Differentials
Joan Daemen, Vincent Rijmen
Joan Daemen, Vincent Rijmen
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
Jintai Ding, Jason E. Gower, Dieter S. Schmidt
Jintai Ding, Jason E. Gower, Dieter S. Schmidt
Message Authentication on 64-bit Architectures
Ted Krovetz
Ted Krovetz
Vector Stream Cipher Instant Key Recovery
Sean O'Neil
Sean O'Neil
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar A. Saqib, Nareli Cruz-Cortés
Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar A. Saqib, Nareli Cruz-Cortés
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
Eike Kiltz, David Galindo
Eike Kiltz, David Galindo
Arithmetic of Generalized Jacobians
Isabelle Déchène
Isabelle Déchène
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
Deepak Kumar Dalai, Subhamoy Maitra
Deepak Kumar Dalai, Subhamoy Maitra
On a Variation of Kurosawa-Desmedt Encryption Scheme
Le Trieu Phong, Wakaha Ogata
Le Trieu Phong, Wakaha Ogata
Improved cryptanalysis of Py
Paul Crowley
Paul Crowley
Authenticated Hybrid Encryption for Multiple Recipients
Stéphanie Alt
Stéphanie Alt
Cryptanalysis of recently proposed Remote User Authentication Schemes
Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena
Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Vladimir Bayev
Vladimir Bayev
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
David Freeman
David Freeman
Signatures for Network Coding
Denis Charles, Kamal Jain, Kristin Lauter
Denis Charles, Kamal Jain, Kristin Lauter
Improving the Decoding Efficiency of Private Search
George Danezis, Claudia Diaz
George Danezis, Claudia Diaz
A Method to Implement Direct Anonymous Attestation
HE GE
HE GE
Cryptographic hash functions from expander graphs
Denis Charles, Eyal Goren, Kristin Lauter
Denis Charles, Eyal Goren, Kristin Lauter
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
Adam Smith
Adam Smith
Hermes8 : A Low-Complexity Low-Power Stream Cipher
Ulrich Kaiser
Ulrich Kaiser
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
Threshold and Proactive Pseudo-Random Permutations
Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
Message Modification for Step 21-23 on SHA-0
Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
A Family of Dunces: Trivial RFID Identification and Authentication Protocols
Gene Tsudik
Gene Tsudik
Sound Computational Interpretation of Symbolic Hashes in the Standard Model
Flavio D. Garcia, Peter van Rossum
Flavio D. Garcia, Peter van Rossum
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
Hung-Yu Chien
Hung-Yu Chien
Certificate-Based Encryption Without Random Oracles
Paz Morillo, Carla Ràfols
Paz Morillo, Carla Ràfols
Formal Proof for the Correctness of RSA-PSS
Christina Lindenberg, Kai Wirt, Johannes Buchmann
Christina Lindenberg, Kai Wirt, Johannes Buchmann
Finding Characteristic Polynomials with Jump Indices
Steve Babbage, Matthew Dodd
Steve Babbage, Matthew Dodd
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kay Tsay, Christopher Walstad
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kay Tsay, Christopher Walstad
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
James A. Muir
James A. Muir
Further Discussions on the Security of a Nominative Signature Scheme
Lifeng Guo, Guilin Wang, Duncan S. Wong
Lifeng Guo, Guilin Wang, Duncan S. Wong
Group Key Agreement for Ad Hoc Networks
Lijun Liao
Lijun Liao
Pairing Calculation on Supersingular Genus 2 Curves
Colm O hEigeartaigh, Michael Scott
Colm O hEigeartaigh, Michael Scott
Provably Secure Subsitution of Cryptographic Tools
Lea Kissner, David Molnar
Lea Kissner, David Molnar
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
Dragos Trinca
Dragos Trinca
Geometric constructions of optimal linear perfect hash families
S. G. Barwick, W. -A. Jackson.
S. G. Barwick, W. -A. Jackson.
Homomorphic Cryptosystems and their Applications
Doerte K. Rappe
Doerte K. Rappe
A lower bound on the higher order nonlinearity of algebraic immune functions
C. Carlet
C. Carlet
Blind Attacks on Engineering Samples
Vanessa Gratzer, David Naccache
Vanessa Gratzer, David Naccache
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)
Ricardo Corin, Jerry den Hartog
Ricardo Corin, Jerry den Hartog
Cryptanalysis of the Yang -Wang's password authentication schemes
Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee
Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee
A sequence approach to constructing perfect hash families
S. G. Barwick, W. -A. Jackson
S. G. Barwick, W. -A. Jackson
Equivalent Keys in Multivariate Quadratic Public Key Systems
Christopher Wolf, Bart Preneel
Christopher Wolf, Bart Preneel
More short signatures without random oracles
Victor K. Wei, Tsz Hon Yuen
Victor K. Wei, Tsz Hon Yuen
A Simplified Quadratic Frobenius Primality Test
Martin Seysen
Martin Seysen
Parallel and Concurrent Security of the HB and HB+ Protocols
Jonathan Katz, Ji Sun Shin
Jonathan Katz, Ji Sun Shin
One-Time HNP or Attacks on a Flawed El Gamal Revisited
Tomas Rosa
Tomas Rosa
A Practical Attack on the Root Problem in Braid Groups
Anja Groch, Dennis Hofheinz, Rainer Steinwandt
Anja Groch, Dennis Hofheinz, Rainer Steinwandt
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
James A. Muir
James A. Muir
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol
Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu
Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu
A Secure Scheme for Authenticated Encryption
Fuw-Yi Yang
Fuw-Yi Yang
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange
Robert W. Zhu, Xiaojian Tian, Duncan S. Wong
Robert W. Zhu, Xiaojian Tian, Duncan S. Wong
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
Further Constructions of Almost Resilient Functions
Pinhui Ke, Jie Zhang, Qiaoyan Wen
Pinhui Ke, Jie Zhang, Qiaoyan Wen
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, Roberto Segala
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, Roberto Segala
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
Jue-Sam Chou, Yalin Chen, Ming-De Yang
Jue-Sam Chou, Yalin Chen, Ming-De Yang
Improvement of Manik et al.¡¦s remote user authentication scheme
Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
Longjiang Qu, Guozhu Feng, Chao Li
Longjiang Qu, Guozhu Feng, Chao Li
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)
Souradyuti Paul, Bart Preneel
Souradyuti Paul, Bart Preneel
A new key exchange protocol based on the decomposition problem
Vladimir Shpilrain, Alexander Ushakov
Vladimir Shpilrain, Alexander Ushakov
Democratic Group Signatures on Example of Joint Ventures
Mark Manulis
Mark Manulis
An Anonymous Authentication Scheme for Trusted Computing Platform
HE GE
HE GE
Privacy-Preserving Polling using Playing Cards
Sid Stamm, Markus Jakobsson
Sid Stamm, Markus Jakobsson
Revised: Block Cipher Based Hash Function Construction From PGV
Duo Lei
Duo Lei
One-Time Signatures Revisited: Have They Become Practical?
Dalit Naor, Amir Shenhav, Avishai Wool
Dalit Naor, Amir Shenhav, Avishai Wool
Tight bound between nonlinearity and algebraic immunity
Mikhail Lobanov
Mikhail Lobanov
HB++: a Lightweight Authentication Protocol Secure against Some Attacks
Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
A note on the n-spendable extension of Ferguson's single-term off-line coins
T. C. Lam
T. C. Lam
Minimal Assumptions for Efficient Mercurial Commitments
Yevgeniy Dodis
Yevgeniy Dodis
On Boolean functions with maximum algebraic immunity
Enes Pasalic
Enes Pasalic
A Note on the Kasami Power Function
Doreen Hertel
Doreen Hertel
Concurrent Blind Signatures without Random Oracles
Aggelos Kiayias, Hong-Sheng Zhou
Aggelos Kiayias, Hong-Sheng Zhou
Prompted User Retrieval of Secret Entropy: The Passmaze Protocol
Daniel R. L. Brown
Daniel R. L. Brown
Proxy Re-Signatures: New Definitions, Algorithms, and Applications
Giuseppe Ateniese, Susan Hohenberger
Giuseppe Ateniese, Susan Hohenberger
On the Security of Kaweichel
Dieter Schmidt
Dieter Schmidt
Is it possible to have CBE from CL-PKE?
Bo Gyeong Kang, Je Hong Park
Bo Gyeong Kang, Je Hong Park
F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei
Duo Lei
Signature from a New Subgroup Assumption
Victor K. Wei
Victor K. Wei
Loud and Clear: Human-Verifiable Authentication Based on Audio
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun
Solutions to Key Exposure Problem in Ring Signature
Joseph K. Liu, Duncan S. Wong
Joseph K. Liu, Duncan S. Wong
On the Security of a Certificateless Public-Key Encryption
Zhenfeng Zhang, Dengguo Feng
Zhenfeng Zhang, Dengguo Feng
Improved Collision Attack on Hash Function MD5
Jie Liang, Xuejia Lai
Jie Liang, Xuejia Lai
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Sven Laur, N. Asokan, Kaisa Nyberg
Sven Laur, N. Asokan, Kaisa Nyberg
ID-based signature and Key-insulated threshold signature
Jin Li, Fangguo Zhang
Jin Li, Fangguo Zhang
On Anonymity of Group Signatures
Zhou Sujing, Lin Dongdai
Zhou Sujing, Lin Dongdai
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
Michael Backes, Birgit Pfitzmann, Andre Scedrov
Michael Backes, Birgit Pfitzmann, Andre Scedrov
Efficient Scalar Multiplication by Isogeny Decompositions
Christophe Doche, Thomas Icart, David R. Kohel
Christophe Doche, Thomas Icart, David R. Kohel
Unified Point Addition Formulæ and Side-Channel Attacks
Douglas Stebila, Nicolas Thériault
Douglas Stebila, Nicolas Thériault
Generic On-Line/Off-Line Threshold Signatures
Chris Crutchfield, David Molnar, David Turner, David Wagner
Chris Crutchfield, David Molnar, David Turner, David Wagner
Correlation-Resistant Storage via Keyword-Searchable Encryption
Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose
Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Kenneth G. Paterson, Arnold K. L. Yau
Kenneth G. Paterson, Arnold K. L. Yau
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512
Benjamin Gittins, Howard A. Landman, Sean O'Neil, Ron Kelson
Benjamin Gittins, Howard A. Landman, Sean O'Neil, Ron Kelson
Authenticated Encryption Mode of VEST Ciphers
Sean O'Neil, Benjamin Gittins
Sean O'Neil, Benjamin Gittins
VEST Hardware-Dedicated Stream Ciphers
Sean O'Neil, Benjamin Gittins, Howard A. Landman
Sean O'Neil, Benjamin Gittins, Howard A. Landman
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
Tsz Hon Yuen, Victor K. Wei
Tsz Hon Yuen, Victor K. Wei
More Compact E-Cash with Efficient Coin Tracing
Victor K. Wei
Victor K. Wei
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows
Victor K. Wei
Victor K. Wei
Intrusion-Resilient Authentication in the Limited Communication Model
David Cash, Yan Zong Ding, Wenke Lee, Richard Lipton
David Cash, Yan Zong Ding, Wenke Lee, Richard Lipton
Compartmented Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
Sorin Iftene
Anonymous Signature Schemes
Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited
Dominique Unruh
Dominique Unruh
Building Better Signcryption Schemes with Tag-KEMs
Tor E. Bjørstad, Alexander W. Dent
Tor E. Bjørstad, Alexander W. Dent
Preventing Attacks on Machine Readable Travel Documents (MRTDs)
Gaurav S. Kc, Paul A. Karger
Gaurav S. Kc, Paul A. Karger
Collisions in the Original Version of a Chaotic Hash Function
Scott Contini
Scott Contini
Some Analysis of Radix-r Representations
Dong-Guk Han, Tsuyoshi Takagi
Dong-Guk Han, Tsuyoshi Takagi
A Computationally Sound Mechanized Prover for Security Protocols
Bruno Blanchet
Bruno Blanchet
Improved Collision Attack on MD5
Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta
Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta
On affine rank of spectrum support for plateaued function
Yuriy Tarannikov
Yuriy Tarannikov
Preliminary Analysis of DHA-256
IAIK Krypto Group
IAIK Krypto Group
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
Neil Kauer, Tony Suarez, Yuliang Zheng
Neil Kauer, Tony Suarez, Yuliang Zheng
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
Secure Group Key Establishment Revisited
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
How to Shuffle in Public
Ben Adida, Douglas Wikström
Ben Adida, Douglas Wikström
Multivariate Quadratic Polynomials in Public Key Cryptography
Christopher Wolf
Christopher Wolf
An Efficient Variant of RSA Cryptosystem
Sahadeo Padhye
Sahadeo Padhye
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1
Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto
Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto, Edward Dawson
Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto, Edward Dawson
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
KyungKeun Lee, JoongHyo Oh, SangJae Moon
KyungKeun Lee, JoongHyo Oh, SangJae Moon
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
YongBin Zhou, DengGuo Feng
YongBin Zhou, DengGuo Feng
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
C. Carlet
C. Carlet
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
Practical Group Signatures without Random Oracles
Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros
Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros
Some Explicit Formulae of NAF and its Left-to-Right Analogue
Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi
Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi
Key Mixing in Block Ciphers through Addition modulo $2^n$
Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
One-Wayness Equivalent to General Factoring
Kaoru Kurosawa, Tsuyoshi Takagi
Kaoru Kurosawa, Tsuyoshi Takagi
Compact Group Signatures Without Random Oracles
Xavier Boyen, Brent Waters
Xavier Boyen, Brent Waters
Breaking RSA May Be As Difficult As Factoring
Daniel R. L. Brown
Daniel R. L. Brown
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
Jonathan Katz, Yehuda Lindell
Jonathan Katz, Yehuda Lindell
A New Protocol for Conditional Disclosure of Secrets And Its Applications
Sven Laur, Helger Lipmaa
Sven Laur, Helger Lipmaa
Exclusion-Intersection Encryption
Sherman S. M. Chow, Siu-Ming Yiu
Sherman S. M. Chow, Siu-Ming Yiu
Representing small identically self-dual matroids by self-dual codes
Carles Padro, Ignacio Gracia
Carles Padro, Ignacio Gracia
Truncated differential cryptanalysis of five rounds of Salsa20
Paul Crowley
Paul Crowley
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
Kunpeng Wang, Bao Li
Kunpeng Wang, Bao Li
Efficient Broadcast Encryption Scheme with Log-Key Storage
Yong Ho Hwang, Pil Joong Lee
Yong Ho Hwang, Pil Joong Lee
Secret color images sharing schemes based on XOR operation
Dao-Shun Wang, Lei Zhang, Ning Ma, Lian-Sheng Huang
Dao-Shun Wang, Lei Zhang, Ning Ma, Lian-Sheng Huang
On a Traitor Tracing Scheme from ACISP 2003
Dongvu Tonien
Dongvu Tonien
Resource Fairness and Composability of Cryptographic Protocols
Juan A. Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang
Juan A. Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang
Secure and {\sl Practical} Identity-Based Encryption
David Naccache
David Naccache
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
David Molnar, Matt Piotrowski, David Schultz, David Wagner
David Molnar, Matt Piotrowski, David Schultz, David Wagner
Searchable Keyword-Based Encryption
Dong Jin Park, Juyoung Cha, Pil Joong Lee
Dong Jin Park, Juyoung Cha, Pil Joong Lee
Efficient Compilers for Authenticated Group Key Exchange
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
Derandomization in Cryptography
Boaz Barak, Shien Jin Ong, Salil Vadhan
Boaz Barak, Shien Jin Ong, Salil Vadhan
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
Amitabh Saxena
Amitabh Saxena
Elliptic Curves with Low Embedding Degree
Florian Luca, Igor E. Shparlinski
Florian Luca, Igor E. Shparlinski
On a (Flawed) Proposal to Build More Pairing-Friendly Curves
Michael Scott, Paulo S. L. M. Barreto
Michael Scott, Paulo S. L. M. Barreto
Strict Avalanche Criterion Over Finite Fields
Yuan Li, T. W. Cusick
Yuan Li, T. W. Cusick
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
Jens Matthias-Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Jens Matthias-Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
An infinite class of quadratic APN functions which are not equivalent to power mappings
L. Budaghyan, C. Carlet, P. Felke, G. Leander
L. Budaghyan, C. Carlet, P. Felke, G. Leander
Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
Haining Fan, Duo Liu, Yiqi Dai
Haining Fan, Duo Liu, Yiqi Dai
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
Kyung-Ah Shim
Kyung-Ah Shim
Exponential Memory-Bound Functions for Proof of Work Protocols
Fabien Coelho
Fabien Coelho
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
Rongxing Lu, Zhenfu Cao
Rongxing Lu, Zhenfu Cao
Pairing-Based Two-Party Authenticated Key Agreement Protocol
Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao
Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao
On the Security of A Group Signature Scheme
Jianhong Zhang, Wei Zou
Jianhong Zhang, Wei Zou
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
Danilo Gligoroski
Danilo Gligoroski
Errors in Computational Complexity Proofs for Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Is SHA-1 conceptually sound?
Charanjit S. Jutla, Anindya C. Patthak
Charanjit S. Jutla, Anindya C. Patthak
Oblivious Transfer and Linear Functions
Ivan B. Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
Ivan B. Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
On Proofs of Security for Certificateless Cryptosystems
Alexander W. Dent, Caroline Kudla
Alexander W. Dent, Caroline Kudla
Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
Song Han, Elizabeth Chang, Tharam Dillon
Song Han, Elizabeth Chang, Tharam Dillon
Batch Verification of Validity of Bids in Homomorphic E-auction
Kun Peng, Colin Boyd, Ed Dawson
Kun Peng, Colin Boyd, Ed Dawson
Group Signatures with Efficient Concurrent Join
Aggelos Kiayias, Moti Yung
Aggelos Kiayias, Moti Yung
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.
Tapan Rai
Tapan Rai
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
Amitabh Saxena, Serguey Priymak, Ben Soh
Amitabh Saxena, Serguey Priymak, Ben Soh
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
Pu Duan, Shi Cui, Choong Wah Chan
Pu Duan, Shi Cui, Choong Wah Chan
A Universally Composable Scheme for Electronic Cash
Marten Trolin
Marten Trolin
A New Approach to Counteract DPA Attacks on Block Ciphers
Christophe Giraud, Emmanuel Prouff
Christophe Giraud, Emmanuel Prouff
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
An Improved Power Analysis Attack Against Camellia's Key Schedule
Lu Xiao, Howard M. Heys
Lu Xiao, Howard M. Heys
Statistical Multiparty Computation Based on Random Walks on Graphs
Liangliang Xiao, Mulan Liu, Zhifang Zhang
Liangliang Xiao, Mulan Liu, Zhifang Zhang
Pairing-based identification schemes
David Freeman
David Freeman
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
Amitabh Saxena, Ben Soh
Amitabh Saxena, Ben Soh
Secure Key-Updating for Lazy Revocation
Michael Backes, Christian Cachin, Alina Oprea
Michael Backes, Christian Cachin, Alina Oprea
Universally Composable Disk Encryption Schemes
Ivan Damgård, Kasper Dupont
Ivan Damgård, Kasper Dupont
Classification of Cubic $(n-4)$-resilient Boolean Functions
An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
A Fuzzy Sketch with Trapdoor
Julien Bringer, Hervé Chabanne, Quoc Dung Do
Julien Bringer, Hervé Chabanne, Quoc Dung Do
A Dedicated Processor for the eta Pairing
Robert Ronan, Colm O hEigeartaigh, Colin Murphy, Michael Scott, Tim Kerins, W. P. Marnane
Robert Ronan, Colm O hEigeartaigh, Colin Murphy, Michael Scott, Tim Kerins, W. P. Marnane
Cryptographic Protocols to Prevent Spam
Amir Herzberg
Amir Herzberg
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
Jonathan Katz, Chiu-Yuen Koo
Jonathan Katz, Chiu-Yuen Koo
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
An Effective Method to Implement Group Signature with Revocation
HE GE
HE GE
Extracting bits from coordinates of a point of an elliptic curve
Nicolas Gürel
Nicolas Gürel
The Weil pairing on elliptic curves over C
Steven D. Galbraith
Steven D. Galbraith
Evolutionary Design of Trace Form Bent Functions
Min yang, Qingshu Meng, Huanguo Zhang
Min yang, Qingshu Meng, Huanguo Zhang
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
Liam Keliher, Jiayuan Sui
Liam Keliher, Jiayuan Sui
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
ID-based Restrictive Partially Blind Signatures and Applications
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
Bounds on Birthday Attack Times
Michael J. Wiener
Michael J. Wiener
Ring Signatures without Random Oracles
Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen
Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung
Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
David Molnar, Andrea Soppera, David Wagner
David Molnar, Andrea Soppera, David Wagner
Fast genus 2 arithmetic based on Theta functions
P. Gaudry
P. Gaudry
Deterministic Identity-Based Signatures for Partial Aggregation
Javier Herranz
Javier Herranz
A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
Xijin Tang, Yong Feng
Xijin Tang, Yong Feng
What do S-boxes Say in Differential Side Channel Attacks?
Cecile Canovas, Jessy Clediere
Cecile Canovas, Jessy Clediere
Meta Ring Signature
Hiroyuki OKAZAKI, Ryuichi SAKAI, Masao KASAHARA
Hiroyuki OKAZAKI, Ryuichi SAKAI, Masao KASAHARA
A New Efficient ID-Based Authenticated Key Agreement Protocol
Quan Yuan, Songping Li
Quan Yuan, Songping Li
Adaptable Group-Oriented Signature
Chunbo Ma, Jun Ao, Dake He
Chunbo Ma, Jun Ao, Dake He
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
K. Bentahar
K. Bentahar
Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
Yasuyuki MURAKAMI, Masao KASAHARA
Yasuyuki MURAKAMI, Masao KASAHARA
Steganography with Imperfect Samplers
Anna Lysyanskaya, Maria Meyerovich
Anna Lysyanskaya, Maria Meyerovich
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Adam Bender, Jonathan Katz, Ruggero Morselli
Adam Bender, Jonathan Katz, Ruggero Morselli
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
Kevin Fu, Seny Kamara, Tadayoshi Kohno
Kevin Fu, Seny Kamara, Tadayoshi Kohno
Elliptic Curves for Pairing Applications
Angela Murphy, Noel Fitzpatrick
Angela Murphy, Noel Fitzpatrick
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Paris Kitsos
Paris Kitsos
Towards Security Two-part Authenticated Key Agreement Protocols
Songping Li, Quan Yuan, Jin Li
Songping Li, Quan Yuan, Jin Li
Nonlinearity of the Round Function
Marcin Kontak, Janusz Szmidt
Marcin Kontak, Janusz Szmidt
Keeping Denial-of-Service Attackers in the Dark
Gal Badishi, Amir Herzberg, Idit Keidar
Gal Badishi, Amir Herzberg, Idit Keidar
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
Maithili Narasimha, Gene Tsudik
Maithili Narasimha, Gene Tsudik
A Key Establishment IP-Core for Ubiquitous Computing
Markus Volkmer, Sebastian Wallner
Markus Volkmer, Sebastian Wallner
Hidden Exponent RSA and Efficient Key Distribution
HE GE
HE GE
On Fairness in Simulatability-based Cryptographic Systems
Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
Speeding Up Pairing Computation
Colm O hEigeartaigh
Colm O hEigeartaigh
Improved Integral Cryptanalysis of FOX Block Cipher
Wu Wenling, Zhang Wentao, Feng Dengguo
Wu Wenling, Zhang Wentao, Feng Dengguo
Cryptography In the Bounded Quantum-Storage Model
Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
Perfect Non-Interactive Zero Knowledge for NP
Jens Groth, Rafail Ostrovsky, Amit Sahai
Jens Groth, Rafail Ostrovsky, Amit Sahai
Overview of Key Agreement Protocols
Ratna Dutta, Rana Barua
Ratna Dutta, Rana Barua
Direct Chosen Ciphertext Security from Identity-Based Techniques
Xavier Boyen, Qixiang Mei, Brent Waters
Xavier Boyen, Qixiang Mei, Brent Waters
Provable Efficient Certificateless Public Key Encryption
Yijuan Shi, Jianhua Li
Yijuan Shi, Jianhua Li
Concurrent Zero Knowledge without Complexity Assumptions
Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan
Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan
Generalizations of RSA public key cryptosystems
Li Banghe
Li Banghe
Foundations and Applications for Secure Triggers
Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
Revisiting Oblivious Signature-Based Envelopes
Samad Nasserian, Gene Tsudik
Samad Nasserian, Gene Tsudik
Spreading Alerts Quietly and the Subgroup Escape Problem
James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
Herding Hash Functions and the Nostradamus Attack
John Kelsey, Tadayoshi Kohno
John Kelsey, Tadayoshi Kohno
Partitioned Cache Architecture as a Side-Channel Defence Mechanism
D. Page
D. Page
Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model
Bao Li, Hongda Li, Guangwu Xu, Haixia Xu
Bao Li, Hongda Li, Guangwu Xu, Haixia Xu
A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications
Katja Schmidt-Samoa
Katja Schmidt-Samoa
Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions
Fumiyuki Momose, Jinhui Chao
Fumiyuki Momose, Jinhui Chao
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Jung Hee Cheon, Dong Hoon Lee
Jung Hee Cheon, Dong Hoon Lee
Explicit Construction of Secure Frameproof Codes
Dongvu Tonien, Reihaneh Safavi-Naini
Dongvu Tonien, Reihaneh Safavi-Naini
Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign
Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III
P G Vaidya, Sajini Anand
P G Vaidya, Sajini Anand
An Authentication Protocol For Mobile Agents Using Bilinear Pairings
Amitabh Saxena, Ben Soh
Amitabh Saxena, Ben Soh
Cache attacks and Countermeasures: the Case of AES
Dag Arne Osvik, Adi Shamir, Eran Tromer
Dag Arne Osvik, Adi Shamir, Eran Tromer
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing
Junghyun Nam, Seungjoo Kim, Dongho Won
Junghyun Nam, Seungjoo Kim, Dongho Won
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI
Shujun Li, Heung-Yeung Shum
Shujun Li, Heung-Yeung Shum
Stream Cipher Design based on Jumping Finite State Machines
Cees J. A. Jansen
Cees J. A. Jansen
A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code
Charanjit S. Jutla, Anindya C. Patthak
Charanjit S. Jutla, Anindya C. Patthak
Security Analysis of KEA Authenticated Key Exchange Protocol
Kristin Lauter, Anton Mityagin
Kristin Lauter, Anton Mityagin
On an authentication scheme based on the Root Problem in the braid group
Boaz Tsaban
Boaz Tsaban
Wang's sufficient conditions of MD5 are not sufficient
Jun Yajima, Takeshi Shimoyama
Jun Yajima, Takeshi Shimoyama
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Ivan Damgård, Yuval Ishai
Ivan Damgård, Yuval Ishai
The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model
Alexander W. Dent
Alexander W. Dent
Powered Tate Pairing Computation
Bo Gyeong Kang, Je Hong Park
Bo Gyeong Kang, Je Hong Park
Efficient Delegation of Pairing Computation
Bo Gyeong Kang, Moon Sung Lee, Je Hong Park
Bo Gyeong Kang, Moon Sung Lee, Je Hong Park
Relations Among Notions of Security for Identity Based Encryption Schemes
Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang
Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
Jin Hong, Woo-Hwan Kim
Jin Hong, Woo-Hwan Kim
Fuzzy Universal Hashing and Approximate Authentication
Reihaneh Safavi-Naini, Dongvu Tonien
Reihaneh Safavi-Naini, Dongvu Tonien
Inoculating Multivariate Schemes Against Differential Attacks
Jintai Ding, Jason E. Gower
Jintai Ding, Jason E. Gower
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
Security Notions for Identity Based Encryption
David Galindo, Ichiro Hasuo
David Galindo, Ichiro Hasuo
Faster Pairings using an Elliptic Curve with an Efficient Endomorphism
Michael Scott
Michael Scott
Feistel Schemes and Bi-Linear Cryptanalysis
Nicolas Courtois
Nicolas Courtois
The topology of covert conflict
Shishir Nagaraja, Ross Anderson
Shishir Nagaraja, Ross Anderson
Efficient Certificateless Public Key Encryption
Yijuan Shi, Jianhua Li
Yijuan Shi, Jianhua Li
Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing
Michael Szydlo, Yiqun Lisa Yin
Michael Szydlo, Yiqun Lisa Yin
A Simple and Provably Good Code for SHA Message Expansion
Charanjit S. Jutla, Anindya C. Patthak
Charanjit S. Jutla, Anindya C. Patthak
A Verifiable Secret Shuffle of Homomorphic Encryptions
Jens Groth
Jens Groth
On the Algebraic Immunity of Symmetric Boolean Functions
An Braeken, Bart Preneel
An Braeken, Bart Preneel
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
Boaz Tsaban
Boaz Tsaban
Cryptanalysis of Sfinks
Nicolas T. Courtois
Nicolas T. Courtois
Private Searching On Streaming Data
Rafail Ostrovsky, William E. Skeith III
Rafail Ostrovsky, William E. Skeith III
On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities
Hao Chen, Liqing Xu
Hao Chen, Liqing Xu
Attack on Okamoto et al.'s New Short Signature Schemes
Fangguo Zhang, Xiaofeng Chen
Fangguo Zhang, Xiaofeng Chen
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto
Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto
Simple and Provable Secure Strong Designated Verifier Signature Schemes
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
Henri Gilbert, Matt Robshaw, Herve Sibert
Henri Gilbert, Matt Robshaw, Herve Sibert
Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves
Pu Duan, Shi Cui, Choong Wah Chan
Pu Duan, Shi Cui, Choong Wah Chan
Tree Parity Machine Rekeying Architectures for Embedded Security
Markus Volkmer, Sebastian Wallner
Markus Volkmer, Sebastian Wallner
LILI-II is not Broken
William Millan, Ed Dawson
William Millan, Ed Dawson
On the Entropy of Arcfour Keys
Luke O'Connor
Luke O'Connor
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
Markus Volkmer, Sebastian Wallner
Markus Volkmer, Sebastian Wallner
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Boaz Tsaban
Boaz Tsaban
Yet Another Short Signatures Without Random Oracles from Bilinear Pairings
Fangguo Zhang, Xiaofeng Chen
Fangguo Zhang, Xiaofeng Chen
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
Efficient Doubling on Genus 3 Curves over Binary Fields
Xinxin Fan, Thomas Wollinger, Yumin Wang
Xinxin Fan, Thomas Wollinger, Yumin Wang
Threshold Ring Signatures Efficient for Large Sets of Signers
K. Maneva-Jakimoska, G. Jakimoski, M. Burmester
K. Maneva-Jakimoska, G. Jakimoski, M. Burmester
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Liqun Chen, Zhaohui Cheng
Liqun Chen, Zhaohui Cheng
Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving
Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
L. Chen, Z. Cheng, J. Malone-Lee, N. P. Smart
L. Chen, Z. Cheng, J. Malone-Lee, N. P. Smart
Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
Ayan Mahalanobis
Ayan Mahalanobis
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
Min Feng, Bin B. Zhu, Maozhi Xu, Shipeng Li
Min Feng, Bin B. Zhu, Maozhi Xu, Shipeng Li
Constant Round Dynamic Group Key Agreement
Ratna Dutta, Rana Barua
Ratna Dutta, Rana Barua
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
Michael Backes, Birgit Pfitzmann
Michael Backes, Birgit Pfitzmann
Cryptanalysis of a 32-bit RC4-like Stream Cipher
Hongjun Wu
Hongjun Wu
The conjugacy problem and related problems in lattice-ordered groups
W. Charles Holland, Boaz Tsaban
W. Charles Holland, Boaz Tsaban
Efficient Identity-Based Key Encapsulation to Multiple Parties
M. Barbosa, P. Farshim
M. Barbosa, P. Farshim
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret
Hassan Jameel, Sungyoung Lee
Hassan Jameel, Sungyoung Lee
Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes
Jason E. Holt
Jason E. Holt
TMTO With Multiple Data: Analysis and New Single Table Trade-offs
Sourav Mukhopadhyay, Palash Sarkar
Sourav Mukhopadhyay, Palash Sarkar
A Counter-based MAC Revisited: Towards Better Security
Eonkyung Lee
Eonkyung Lee
Probability distributions of Correlation and Differentials in Block Ciphers
Joan Daemen, Vincent Rijmen
Joan Daemen, Vincent Rijmen
Games and the Impossibility of Realizable Ideal Functionality
Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
John Black
John Black
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
Jin Wook Byun, Dong Hoon Lee
Jin Wook Byun, Dong Hoon Lee
On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm
Daniel R. L. Brown
Daniel R. L. Brown
Some Thoughts on Time-Memory-Data Tradeoffs
Alex Biryukov
Alex Biryukov
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Another look at HMQV
Alfred Menezes
Alfred Menezes
An Algebraic Masking Method to Protect AES Against Power Attacks
Nicolas Courtois, Louis Goubin
Nicolas Courtois, Louis Goubin
On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions
Nicolas Courtois, Blandine Debraize, Eric Garrido
Nicolas Courtois, Blandine Debraize, Eric Garrido
The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
Nicolas Courtois
Nicolas Courtois
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
Zhaohui Cheng, Liqun Chen
Zhaohui Cheng, Liqun Chen
Block ciphers sensitive to Groebner Basis Attacks
Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann
Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann
Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security
Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
Universally Composable Time-Stamping Schemes with Audit
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
Weaknesses in two group Diffie-Hellman key exchange protocols
Qiang Tang, Liqun Chen
Qiang Tang, Liqun Chen
Universally Composable Password-Based Key Exchange
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip MacKenzie
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip MacKenzie
Twin RSA
Arjen K. Lenstra, Benjamin M. M. de Weger
Arjen K. Lenstra, Benjamin M. M. de Weger
Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography
Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu
Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu
VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini, Arjen K. Lenstra, Ron Steinfeld
Scott Contini, Arjen K. Lenstra, Ron Steinfeld
On the security and the efficiency of the Merkle signature scheme
Carlos Coronado
Carlos Coronado
Public Key Encryption with Keyword Search Revisited
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"
SeongHan Shin, Kazukuni Kobara, Hideki Imai
SeongHan Shin, Kazukuni Kobara, Hideki Imai
A Weak-Randomizer Attack on RSA-OAEP with e = 3
Daniel R. L. Brown
Daniel R. L. Brown
Group Signature where Group Manager, Members and Open Authority are Identity-Based
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
How To Exchange Secrets with Oblivious Transfer
Michael O. Rabin
Michael O. Rabin
Linkability of Several Blind Signature Schemes
Xuesheng Zhong
Xuesheng Zhong
Security properties of two provably secure conference key agreement protocols
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families
Dongvu Tonien, Reihaneh Safavi-Naini
Dongvu Tonien, Reihaneh Safavi-Naini
PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
Thierry Moreau
Thierry Moreau
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol
Chih-I Wang, Chun-I Fan, D. J. Guan
Chih-I Wang, Chun-I Fan, D. J. Guan
A plausible approach to computer-aided cryptographic proofs
Shai Halevi
Shai Halevi
A Note on Secure Key Issuing in ID-based Cryptography
XU Chunxiang, ZHOU Junhui, QIN Zhiguang
XU Chunxiang, ZHOU Junhui, QIN Zhiguang
Intrusion-Resilience via the Bounded-Storage Model
Stefan Dziembowski
Stefan Dziembowski
Analyzing Unlinkability of Some Group Signatures
Zhou Sujing, Lin Dongdai
Zhou Sujing, Lin Dongdai
Secret sharing on the $d$-dimensional cube
Laszlo Csirmaz
Laszlo Csirmaz
HMQV: A High-Performance Secure Diffie-Hellman Protocol
Hugo Krawczyk
Hugo Krawczyk
A 32-bit RC4-like Keystream Generator
Yassir Nawaz, Kishan Chand Gupta, Guang Gong
Yassir Nawaz, Kishan Chand Gupta, Guang Gong
On the Automatic Construction of Indistinguishable Operations
Manuel Barbosa, Dan Page
Manuel Barbosa, Dan Page
Weaknesses in a leakage-resilient authenticated key transport protocol
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy
Radu Sion, Bogdan Carbunar
Radu Sion, Bogdan Carbunar
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta, Vitaly Shmatikov
Prateek Gupta, Vitaly Shmatikov
Unclonable Group Identification
Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
Shai Halevi, Paul A. Karger, Dalit Naor
Shai Halevi, Paul A. Karger, Dalit Naor
Dynamic k-Times Anonymous Authentication
Lan Nguyen, Rei Safavi-Naini
Lan Nguyen, Rei Safavi-Naini
Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems
YoungJu Choie, Jaemyung Kim, Eunjeong Lee
YoungJu Choie, Jaemyung Kim, Eunjeong Lee
Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems
Eunjeong Lee, Yoonjin Lee
Eunjeong Lee, Yoonjin Lee
CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER
Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito
Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito
A Distinguish attack on COSvd Ciphers
Mohammad Ali Orumiehchi ha, Dr. R. Mirghadri
Mohammad Ali Orumiehchi ha, Dr. R. Mirghadri
Modeling Insider Attacks on Group Key-Exchange Protocols
Jonathan Katz, Ji Sun Shin
Jonathan Katz, Ji Sun Shin
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
Multiple forgery attacks against Message Authentication Codes
David A. McGrew, Scott R. Fluhrer
David A. McGrew, Scott R. Fluhrer
First Steps Toward a Cryptography-Aware Language and Compiler
M. Barbosa, R. Noad, D. Page, N. P. Smart
M. Barbosa, R. Noad, D. Page, N. P. Smart
On Constructing Parallel Pseudorandom Generators from One-Way Functions
Emanuele Viola
Emanuele Viola
Geometric Cryptosystem
Arkady Berenstein, Leon Chernyak
Arkady Berenstein, Leon Chernyak
FOX Algorithm Implementation: a hardware design approach
Colm O'Keeffe, Emanuel Popovici
Colm O'Keeffe, Emanuel Popovici
On the security of some password-based key agreement schemes
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays
Eli Biham, Jennifer Seberry
Eli Biham, Jennifer Seberry
Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol
Marius C. Silaghi, Gerhard Friedrich
Marius C. Silaghi, Gerhard Friedrich
On Security of Koyama Schemes
Sahadeo Padhye
Sahadeo Padhye
On High-Rate Cryptographic Compression Functions
Richard Ostertag, Martin Stanek
Richard Ostertag, Martin Stanek
Improved Collision Attack on MD4
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
Secure Delegation of Elliptic-Curve Pairing
Benoit Chevallier-Mames, Jean-Sebastien Coron, Noel McCullagh, David Naccache, Michael Scott
Benoit Chevallier-Mames, Jean-Sebastien Coron, Noel McCullagh, David Naccache, Michael Scott
Conditionally Verifiable Signatures
Aldar C-F. Chan, Ian F. Blake
Aldar C-F. Chan, Ian F. Blake
On Universal Composable Security of Time-Stamping Protocols
Toshihiko Matsuo, Shin'ichiro Matsuo
Toshihiko Matsuo, Shin'ichiro Matsuo
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware
Jong Youl Choi, Philippe Golle, Markus Jakobsson
Jong Youl Choi, Philippe Golle, Markus Jakobsson
A High Speed Architecture for Galois/Counter Mode of Operation (GCM)
Bo Yang, Sambit Mishra, Ramesh Karri
Bo Yang, Sambit Mishra, Ramesh Karri
Small Secure Sketch for Point-Set Difference
Ee-Chien Chang, Qiming Li
Ee-Chien Chang, Qiming Li
Kaweichel, an Extension of Blowfish for 64-Bit Architectures
Dieter Schmidt
Dieter Schmidt
Multiparty Computation Based on Connectivity of Graphs
Liangliang Xiao, Mulan Liu, Zhifang Zhang
Liangliang Xiao, Mulan Liu, Zhifang Zhang
Broadcast Encryption with Random Key Pre-distribution Schemes
Mahalingam Ramkumar
Mahalingam Ramkumar
Enhanced password-based key establishment protocol
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
How to Split a Shared Secret into Shared Bits in Constant-Round
Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft
Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft
Scaling security in pairing-based protocols
Michael Scott
Michael Scott
I-HARPS: An Efficient Key Pre-distribution Scheme
Mahalingam Ramkumar
Mahalingam Ramkumar
A Sender Verifiable Mix-Net and a New Proof of a Shuffle
Douglas Wikström
Douglas Wikström
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
Jung Hee Cheon, Nam-su Jho, Myung-Hwan Kim, Eun Sun Yoo
Jung Hee Cheon, Nam-su Jho, Myung-Hwan Kim, Eun Sun Yoo
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
Jacques Patarin, Paul Camion
Jacques Patarin, Paul Camion
Broadcast Authentication With Hashed Random Preloaded Subsets
Mahalingam Ramkumar
Mahalingam Ramkumar
Pairing-Friendly Elliptic Curves of Prime Order
Paulo S. L. M. Barreto, Michael Naehrig
Paulo S. L. M. Barreto, Michael Naehrig
Formal Notions of Anonymity for Peer-to-peer Networks
Jiejun Kong
Jiejun Kong
Dynamic Group Key Agreement in Tree-Based Setting
Ratna Dutta, Rana Barua
Ratna Dutta, Rana Barua
Results on Rotation Symmetric Boolean Functions on Even Number Variable
pinhui ke, changzhu ling, wenqiao yan
pinhui ke, changzhu ling, wenqiao yan
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu
Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu
Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials
Xijin Tang, Yong Feng
Xijin Tang, Yong Feng
Browser Model for Security Analysis of Browser-Based Protocols
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator
Shahram Khazaei, Mahmood Salmasizadeh, Javad Mohajeri
Shahram Khazaei, Mahmood Salmasizadeh, Javad Mohajeri
SPA Resistant Left-to-Right Integer Recodings
Nicolas Thériault
Nicolas Thériault
Append-Only Signatures
Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan
Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan
Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
Lan Nguyen
Lan Nguyen
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004
Xinyi Huang, Willy Susilo, Yi Mu
Xinyi Huang, Willy Susilo, Yi Mu
Pass-thoughts: Authenticating With Our Minds
Julie Thorpe, P. C. van Oorschot, Anil Somayaji
Julie Thorpe, P. C. van Oorschot, Anil Somayaji
On Designatedly Verified (Non-interactive) Watermarking Schemes
Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamato
Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamato
Index Calculus in Class Groups of Plane Curves of Small Degree
Claus Diem
Claus Diem
Results on Rotation Symmetric Bent Functions
Deepak Kumar Dalai, Subhamoy Maitra
Deepak Kumar Dalai, Subhamoy Maitra
Boneh-Franklin Identity Based Encryption Revisited
David Galindo
David Galindo
On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems
Nigel Smart, Frederik Vercauteren
Nigel Smart, Frederik Vercauteren
Characteristics of Key-Dependent S-Boxes: the Case of Twofish
Marco Macchetti
Marco Macchetti
Intrusion-Resilient Secure Channels
Gene Itkis, Robert McNerney Jr., Scott W. Russell
Gene Itkis, Robert McNerney Jr., Scott W. Russell
Partially Fixed Point Multiplication
Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava
Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava
On the relationship between squared pairings and plain pairings
Bo Gyeong Kang, Je Hong Park
Bo Gyeong Kang, Je Hong Park
Weak Composite Diffie-Hellman is not Weaker than Factoring
Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh
Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh
Diffie-Hellman key exchange protocol and non-abelian nilpotent groups.
Ayan Mahalanobis
Ayan Mahalanobis
A Public Key Cryptosystem Based on Singular Cubic Curve
Sahadeo Padhye
Sahadeo Padhye
Efficient Identity-Based and Authenticated Key Agreement Protocol
Yongge Wang
Yongge Wang
A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher
Ophir Levy, Avishai Wool
Ophir Levy, Avishai Wool
How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation
Boaz Barak, Amit Sahai
Boaz Barak, Amit Sahai
On Error Correction in the Exponent
Chris Peikert
Chris Peikert
On estimating the lattice security of NTRU
Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, William Whyte
Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, William Whyte
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
Fangguo Zhang, Xiaofeng Chen
Fangguo Zhang, Xiaofeng Chen
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications
Vlastimil Klima
Vlastimil Klima
Soundness and Completeness of Formal Logics of Symmetric Encryption
Gergei Bana
Gergei Bana
almost enumeration of 8-variable bent functions
Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang
Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes
Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme
Yassine Lakhnech, Laurent Mazare
Yassine Lakhnech, Laurent Mazare
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation
Yassine Lakhnech, Laurent Mazare
Yassine Lakhnech, Laurent Mazare
Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$
David Jedlicka
David Jedlicka
Security and Privacy Issues in E-passports
Ari Juels, David Molnar, David Wagner
Ari Juels, David Molnar, David Wagner
A Survey on ID-Based Cryptographic Primitives
M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena
M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena
An ID-Based Key Agreement Scheme from pairing
Guohong Xie
Guohong Xie
PRF Domain Extension Using DAGs
Charanjit Jutla
Charanjit Jutla
Distributed Phishing Attacks
Markus Jakobsson, Adam Young
Markus Jakobsson, Adam Young
Rediscovery of Time Memory Tradeoffs
Jin Hong, Palash Sarkar
Jin Hong, Palash Sarkar
Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions
Hans Dobbertin, Gregor Leander
Hans Dobbertin, Gregor Leander
The MAC function Pelican 2.0
Joan Daemen, Vincent Rijmen
Joan Daemen, Vincent Rijmen
AES side channel attack protection using random isomorphisms
A. G. Rostovtsev, O. V. Shemyakina
A. G. Rostovtsev, O. V. Shemyakina
Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)
Henry Ng
Henry Ng
A new structural attack for GPT and variants
R. Overbeck
R. Overbeck
On Resistance of DES to Related-Key Differential Cryptanalysis
Goce Jakimoski, Yvo Desmedt
Goce Jakimoski, Yvo Desmedt
Security notions for disk encryption
Kristian Gjøsteen
Kristian Gjøsteen
Some properties of an FSE 2005 Hash Proposal
Lars R. Knudsen
Lars R. Knudsen
Smashing SMASH
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification
R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan
R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism
Marius C Silaghi
Marius C Silaghi
Duality between Multiplication and Modular Reduction
Wieland Fischer, Jean-Pierre Seifert
Wieland Fischer, Jean-Pierre Seifert
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations
Christopher Wolf, Bart Preneel
Christopher Wolf, Bart Preneel
Pairing-Based Cryptography at High Security Levels
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Finding MD5 Collisions – a Toy For a Notebook
Vlastimil Klima
Vlastimil Klima
Computationally sound implementations of equational theories against passive adversaries
Mathieu Baudet, Vëronique Cortier, Steve Kremer
Mathieu Baudet, Vëronique Cortier, Steve Kremer
BROADCAST ENCRYPTION $\pi$
Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo
Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo
Practical Lattice Basis Sampling Reduction
Johannes Buchmann, Christoph Ludwig
Johannes Buchmann, Christoph Ludwig
A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields
Dabi Zou, Dongdai Lin
Dabi Zou, Dongdai Lin
On public-key cryptosystems based on combinatorial group theory
Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka
Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka
Fast Elliptic Curve Point Multiplication using Double-Base Chains
V. S. Dimitrov, L. Imbert, P. K. Mishra
V. S. Dimitrov, L. Imbert, P. K. Mishra
N-adic Summation-Shrinking Generator. Basic properties and empirical evidences.
Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov
Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov
Colliding X.509 Certificates
Arjen Lenstra, Xiaoyun Wang, Benne de Weger
Arjen Lenstra, Xiaoyun Wang, Benne de Weger
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
Eike Kiltz
Eike Kiltz
Efficient hardware for the Tate pairing calculation in characteristic three
T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
On Efficient Key Agreement Protocols
Anish Mathuria, Vipul Jain
Anish Mathuria, Vipul Jain
On the Key Schedule of Blowfish
Dieter Schmidt
Dieter Schmidt
Cryptanalysis of One Fair E-cash System
LiHua Liu, Zhengjun Cao
LiHua Liu, Zhengjun Cao
Key Derivation and Randomness Extraction
Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
Compact E-Cash
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
Secret sharing schemes on graphs
Laszlo Csirmaz
Laszlo Csirmaz
Generic Constructions of Identity-Based and Certificateless KEMs
K. Bentahar, P. Farshim, J. Malone-Lee, N. P. Smart
K. Bentahar, P. Farshim, J. Malone-Lee, N. P. Smart
Tight Reductions among Strong Diffie-Hellman Assumptions
Victor K. Wei
Victor K. Wei
Deniable Authentication with RSA and Multicasting
Daniel R. L. Brown
Daniel R. L. Brown
Untraceability of Two Group Signature Schemes
Zhengjun Cao
Zhengjun Cao
Comment on cryptanalysis of Tseng et al.¡¦s authenticated encryption schemes
Yi-Hwa Chen, Jinn-Ke Jan
Yi-Hwa Chen, Jinn-Ke Jan
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
Hung-Min Sun, Mu-En Wu
Hung-Min Sun, Mu-En Wu
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
Ziv Kfir, Avishai Wool
Ziv Kfir, Avishai Wool
A Note on Shor's Quantum Algorithm for Prime Factorization
Zhengjun Cao
Zhengjun Cao
David Chaum's Voter Verification using Encrypted Paper Receipts
Poorvi L. Vora
Poorvi L. Vora
Adversarial Model for Radio Frequency Identification
Gildas Avoine
Gildas Avoine
Cryptanalysis of two identification schemes based on an ID-based cryptosystem
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
New Approaches for Deniable Authentication
Mario Di Raimondo, Rosario Gennaro
Mario Di Raimondo, Rosario Gennaro
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
On the affine classification of cubic bent functions
Sergey Agievich
Sergey Agievich
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption
Hsiao-Ying Lin, Wen-Guey Tzeng
Hsiao-Ying Lin, Wen-Guey Tzeng
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
O. A. Logachev, A. A. Salnikov, V. V. Yaschenko
O. A. Logachev, A. A. Salnikov, V. V. Yaschenko
On the Security of a Group Signature Scheme with Strong Separability
Lihua Liu, Zhengjun Cao
Lihua Liu, Zhengjun Cao
Unfairness of a protocol for certified delivery
Juan M. Estevez-Tapiador, Almudena Alcaide
Juan M. Estevez-Tapiador, Almudena Alcaide
Distinguishing Stream Ciphers with Convolutional Filters
Joan Daemen, Gilles Van Assche
Joan Daemen, Gilles Van Assche
Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants
Yi-Hwa Chen, Jinn-Ke Jan
Yi-Hwa Chen, Jinn-Ke Jan
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
Claude Castelluccia, Einar Mykletun, Gene Tsudik
Claude Castelluccia, Einar Mykletun, Gene Tsudik
Concurrent Composition of Secure Protocols in the Timing Model
Yael Kalai, Yehuda Lindell, Manoj Prabhakaran
Yael Kalai, Yehuda Lindell, Manoj Prabhakaran
An Efficient CDH-based Signature Scheme With a Tight Security Reduction
Benoit Chevallier-Mames
Benoit Chevallier-Mames
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication)
Gene Tsudik, Shouhuai Xu
Gene Tsudik, Shouhuai Xu
An Attack on CFB Mode Encryption As Used By OpenPGP
Serge Mister, Robert Zuccherato
Serge Mister, Robert Zuccherato
On the Notion of Statistical Security in Simulatability Definitions
Dennis Hofheinz, Dominique Unruh
Dennis Hofheinz, Dominique Unruh
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
Iwan Duursma, Negar Kiyavash
Iwan Duursma, Negar Kiyavash
Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves.
A. A. Kalele, V. R. Sule
A. A. Kalele, V. R. Sule
A model and architecture for pseudo-random generation with applications to /dev/random
Boaz Barak, Shai Halevi
Boaz Barak, Shai Halevi
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Masayuki ABE, Rosario Gennaro, Kaoru Kurosawa
Masayuki ABE, Rosario Gennaro, Kaoru Kurosawa
Techniques for random maskin in hardware
Jovan Dj. Golic
Jovan Dj. Golic
Analysis of Affinely Equivalent Boolean Functions
Meng Qing-shu, Yang min, Zhang Huan-guo, Liu Yu-zhen
Meng Qing-shu, Yang min, Zhang Huan-guo, Liu Yu-zhen
Weak keys of the Diffe Hellman key exchange I
A. A. Kalele, V. R. Sule
A. A. Kalele, V. R. Sule
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
Masao Kasahara
Masao Kasahara
An Improved and Efficient Countermeasure against Power Analysis Attacks
ChangKyun Kim, JaeCheol Ha, SangJae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim
ChangKyun Kim, JaeCheol Ha, SangJae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim
Partial Hiding in Public-Key Cryptography
Eabhnat N\'ı Fhloinn, Michael Purser
Eabhnat N\'ı Fhloinn, Michael Purser
(De)Compositions of Cryptographic Schemes and their Applications to Protocols
R. Janvier, Y. Lakhnech, L. Mazare
R. Janvier, Y. Lakhnech, L. Mazare
The Full Abstraction of the UC Framework
Jesüs F. Almansa
Jesüs F. Almansa
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Dan Boneh, Craig Gentry, Brent Waters
Dan Boneh, Craig Gentry, Brent Waters
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
Roberto M. Avanzi
Roberto M. Avanzi
Narrow T-functions
Magnus Daum
Magnus Daum
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Dan Boneh, Xavier Boyen, Eu-Jin Goh
Dan Boneh, Xavier Boyen, Eu-Jin Goh
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
Ludovic Perret
Ludovic Perret
Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols
Hung-Yu Chien
Hung-Yu Chien
Efficient Certificateless Public Key Encryption
Zhaohui Cheng, Richard Comley
Zhaohui Cheng, Richard Comley
An Improved Elegant Method to Re-initialize Hash Chains
Yuanchao Zhao, Daoben Li
Yuanchao Zhao, Daoben Li
Update on SHA-1
Vincent Rijmen, Elisabeth Oswald
Vincent Rijmen, Elisabeth Oswald
Mixing properties of triangular feedback shift registers
Bernd Schomburg
Bernd Schomburg
Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
J. Wu, R. Wei
J. Wu, R. Wei
The Misuse of RC4 in Microsoft Word and Excel
Hongjun Wu
Hongjun Wu
A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$.
Pradeep Kumar Mishra, Kishan Chand Gupta
Pradeep Kumar Mishra, Kishan Chand Gupta
A sufficient condition for key-privacy
Shai Halevi
Shai Halevi
Benes and Butterfly schemes revisited
Jacques Patarin, Audrey Montreuil
Jacques Patarin, Audrey Montreuil
Cryptanalysis of Hiji-bij-bij (HBB)
Vlastimil Klima
Vlastimil Klima
Logcrypt: Forward Security and Public Verification for Secure Audit Logs
Jason E. Holt, Kent E. Seamons
Jason E. Holt, Kent E. Seamons
On Obfuscating Point Functions
Hoeteck Wee
Hoeteck Wee
New Distributed Ring Signatures for General Families of Signing Subsets
Javier Herranz, Germán Sáez
Javier Herranz, Germán Sáez
Cryptanalysis of RCES/RSES Image Encryption Scheme
Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo
Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo
Efficient Pairing Computation on Supersingular Abelian Varieties
Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, Michael Scott
Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, Michael Scott
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo
Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs
Chunming Tang, Dingyi Pei, Zhuojun Liu
Chunming Tang, Dingyi Pei, Zhuojun Liu
On The Security of Two Key-Updating Signature Schemes
Xingyang Guo
Xingyang Guo
Construction and Traversal of Hash Chain with Public Links
Vipul Goyal
Vipul Goyal
Tracing-by-Linking Group Signautres
Victor K. Wei
Victor K. Wei
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
Filipe Rosado da-Fonseca
Filipe Rosado da-Fonseca
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
Patrick Felke
Patrick Felke
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
Ordinary abelian varieties having small embedding degree
Steven D. Galbraith, J. McKee, P. Valenca
Steven D. Galbraith, J. McKee, P. Valenca
Finding good differential patterns for attacks on SHA-1
Krystian Matusiewicz, Josef Pieprzyk
Krystian Matusiewicz, Josef Pieprzyk
Rethinking the security of some authenticated group key agreement schemes
Qiang Tang, Chris J. Mitchell
Qiang Tang, Chris J. Mitchell
A new security proof for Damgård's ElGamal
Kristian Gjøsteen
Kristian Gjøsteen
Superfluous Keys in Multivariate Quadratic Asymmetric Systems
Christopher Wolf, Bart Preneel
Christopher Wolf, Bart Preneel
Equivalent Keys in HFE, C$^*$, and variations
Christopher Wolf, Bart Preneel
Christopher Wolf, Bart Preneel
Secure Computation of the Mean and Related Statistics
Eike Kiltz, Gregor Leander, John Malone-Lee
Eike Kiltz, Gregor Leander, John Malone-Lee
Reusable Cryptographic Fuzzy Extractors
Xavier Boyen
Xavier Boyen
MD5 To Be Considered Harmful Someday
Dan Kaminsky
Dan Kaminsky
Practical Attacks on Digital Signatures Using MD5 Message Digest
Ondrej Mikle
Ondrej Mikle
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates
Pei-yih Ting, Po-Yueh Hung
Pei-yih Ting, Po-Yueh Hung
Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra
Alexander Maximov
Alexander Maximov
Direct Division in Factor Rings
Patrick Fitzpatrick, Christopher Wolf
Patrick Fitzpatrick, Christopher Wolf
Practical Cryptography in High Dimensional Tori
Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David Woodruff
Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David Woodruff
Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security
ZhenFeng ZHANG, YongBin ZHOU, DengGuo FENG
ZhenFeng ZHANG, YongBin ZHOU, DengGuo FENG
Multivariable public--key cryptosystems
Jintai Ding, Dieter Schmidt
Jintai Ding, Dieter Schmidt
A DPA Attack on the Improved Ha-Moon Algorithm
Dong Jin PARK, Pil Joong LEE
Dong Jin PARK, Pil Joong LEE
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Junghyun Nam, Seungjoo Kim, Dongho Won
Junghyun Nam, Seungjoo Kim, Dongho Won
Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields''
Marco Macchetti
Marco Macchetti
Random Switching Logic: A Countermeasure against DPA based on Transition Probability
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures
Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
Kim-Kwang Raymond Choo
Kim-Kwang Raymond Choo
A comb method to render ECC resistant against Side Channel Attacks
Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli
Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli
Request for Review of Key Wrap Algorithms
Morris Dworkin
Morris Dworkin
Divisors in Residue Classes, Constructively
Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj
Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
Security on Generalized Feistel Scheme with SP Round Function
Wu Wenling, Zhang Wentao, Lin Dongdai
Wu Wenling, Zhang Wentao, Lin Dongdai
Oblivious Transfer Is Symmetric
Stefan Wolf, Jürg Wullschleger
Stefan Wolf, Jürg Wullschleger
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions
Haitner Iftach, Shaltiel Ronen
Haitner Iftach, Shaltiel Ronen
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)
Ran Canetti, Jonathan Herzog
Ran Canetti, Jonathan Herzog
Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem
Marius-Calin Silaghi
Marius-Calin Silaghi
Sequences of games: a tool for taming complexity in security proofs
Victor Shoup
Victor Shoup
Code-Based Game-Playing Proofs and the Security of Triple Encryption
Mihir Bellare, Phillip Rogaway
Mihir Bellare, Phillip Rogaway
Multicollision Attacks on Generalized Hash Functions
M. Nandi, D. R. Stinson
M. Nandi, D. R. Stinson
Hardness amplification of weakly verifiable puzzles
Ran Canetti, Shai Halevi, Michael Steiner
Ran Canetti, Shai Halevi, Michael Steiner
Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee
Efficient Identity Based Ring Signature
Sherman S. M. Chow, S. M. Yiu, Lucas C. K. Hui
Sherman S. M. Chow, S. M. Yiu, Lucas C. K. Hui
Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme
Zhengjun Cao
Zhengjun Cao
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules
Mitsuhiro HATTORI, Shoichi HIROSE, Susumu YOSHIDA
Mitsuhiro HATTORI, Shoichi HIROSE, Susumu YOSHIDA
On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions
G. Laccetti, G. Schmid
G. Laccetti, G. Schmid
A note on López-Dahab coordinates
Tanja Lange
Tanja Lange
Separable and Anonymous Identity-Based Key Issuing
Ai-fen Sui, Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, H. W. Chan
Ai-fen Sui, Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, H. W. Chan
The conjugacy search problem in public key cryptography: unnecessary and insufficient
Vladimir Shpilrain, Alexander Ushakov
Vladimir Shpilrain, Alexander Ushakov
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
Alfonso De Gregorio
Alfonso De Gregorio
Badger - A Fast and Provably Secure MAC
Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner
Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Martin Hirt, Jesper Buus Nielsen
Martin Hirt, Jesper Buus Nielsen
Adaptively-Secure, Non-Interactive Public-Key Encryption
Ran Canetti, Shai Halevi, Jonathan Katz
Ran Canetti, Shai Halevi, Jonathan Katz
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme
Zhengjun Cao
Zhengjun Cao
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
Qin Wang, Zhenfu Cao
Qin Wang, Zhenfu Cao
A Technical Comparison of IPSec and SSL
AbdelNasir Alshamsi, Takamichi Saito
AbdelNasir Alshamsi, Takamichi Saito
Cryptanalysis of a threshold proxy signature with known signers
Fuw-Yi Yang, Jinn-Ke Jan, Woei-Jiunn Jeng
Fuw-Yi Yang, Jinn-Ke Jan, Woei-Jiunn Jeng
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
David Jao, Stephen D. Miller, Ramarathnam Venkatesan
David Jao, Stephen D. Miller, Ramarathnam Venkatesan
Hierarchical Group Signatures
Marten Trolin, Douglas Wikstrom
Marten Trolin, Douglas Wikstrom
A Verifiable Random Function With Short Proofs and Keys
Yevgeniy Dodis, Aleksandr Yampolskiy
Yevgeniy Dodis, Aleksandr Yampolskiy
The Power of Verification Queries in Message Authentication and Authenticated Encryption
Mihir Bellare, Oded Goldreich, Anton Mityagin
Mihir Bellare, Oded Goldreich, Anton Mityagin
Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement
Guohong Xie
Guohong Xie
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme
Zhengjun Cao
Zhengjun Cao
The Static Diffie-Hellman Problem
Daniel R. L. Brown, Robert P. Gallant
Daniel R. L. Brown, Robert P. Gallant
A note on efficient computation of cube roots in characteristic 3
Paulo S. L. M. Barreto
Paulo S. L. M. Barreto
Second Preimages on n-bit Hash Functions for Much Less than 2^n Work
John Kelsey, Bruce Schneier
John Kelsey, Bruce Schneier
Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields
Soonhak Kwon
Soonhak Kwon
Security of Wang-Li Threshold Signature Scheme
Lifeng Guo
Lifeng Guo
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
Bartosz Zoltak
Bartosz Zoltak
Relating Symbolic and Cryptographic Secrecy
Michael Backes, Birgit Pfitzmann
Michael Backes, Birgit Pfitzmann
Security Flaws in a Pairing-based Group Signature Scheme
Zhengjun Cao, Sherman S. M. Chow
Zhengjun Cao, Sherman S. M. Chow
Nominative Proxy Signature Schemes
Zuo-Wen Tan, Zhuo-Jun Liu
Zuo-Wen Tan, Zhuo-Jun Liu
Post-Quantum Signatures
Johannes Buchmann, Carlos Coronado, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann
Johannes Buchmann, Carlos Coronado, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann
Designs of Efficient Secure Large Hash Values
Mridul Nandi
Mridul Nandi
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
Jiang Wu, Ruizhong Wei
Jiang Wu, Ruizhong Wei
Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher
Souradyuti Paul, Bart Preneel
Souradyuti Paul, Bart Preneel
Provably Secure Authentication of Digital Media Through Invertible Watermarks
Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
Asynchronous Proactive RSA
Ruishan Zhang, Kefei Chen
Ruishan Zhang, Kefei Chen
The Rabbit Stream Cipher - Design and Security Analysis
Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner
Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
Fault attack on the DVB Common Scrambling Algorithm
Kai Wirt
Kai Wirt
A New Designated Confirmer Signature Variant with Intended Recipient
Yong Li, Dingyi Pei
Yong Li, Dingyi Pei
Almost Ideal Contrast Visual Cryptography with Reversing
Duong Quang Viet, Kaoru Kurosawa
Duong Quang Viet, Kaoru Kurosawa
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
Daniele Micciancio
Daniele Micciancio
Generation of random Picard curves for cryptography
Annegret Weng
Annegret Weng
ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS
Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
Fault and Side-Channel Attacks on Pairing Based Cryptography
D. Page, F. Vercauteren
D. Page, F. Vercauteren
New Monotone Span Programs from Old
Ventzislav Nikov, Svetla Nikova
Ventzislav Nikov, Svetla Nikova
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Patrick P. Tsang, Victor K. Wei
Patrick P. Tsang, Victor K. Wei
Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme
Zhengjun Cao
Zhengjun Cao
Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic
Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien
Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien
The Extended Codebook (XCB) Mode of Operation
David A. McGrew, Scott R. Fluhrer
David A. McGrew, Scott R. Fluhrer
Experimenting with Faults, Lattices and the DSA
David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
C. Carlet
C. Carlet
An e-Voting Scheme with Improved Resistance to Bribe and Coercion
Wei-Chi Ku, Chun-Ming Ho
Wei-Chi Ku, Chun-Ming Ho
A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS
Meng Qing-shu, Yang min, Zhang huan-guo, Cui jing-song
Meng Qing-shu, Yang min, Zhang huan-guo, Cui jing-song
Cryptanalysis of Threshold-Multisignature schemes
Lifeng Guo
Lifeng Guo
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
Tom Shrimpton
Tom Shrimpton
The Mundja Streaming MAC
Philip Hawkes, Michael Paddon, Gregory G. Rose
Philip Hawkes, Michael Paddon, Gregory G. Rose
An Enhanced and Secure Protocol for Authenticated Key Exchange
Fuw-Yi Yang, Jinn-Ke Jan
Fuw-Yi Yang, Jinn-Ke Jan
Cryptanalysis of Threshold-Multisignature Schemes
Lifeng Guo
Lifeng Guo
Untraceability of Wang-Fu Group Signature Scheme
Zhengjun Cao, Lihua Liu
Zhengjun Cao, Lihua Liu
Separable Linkable Threshold Ring Signatures
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
M. Khabbazian, T. A. Gulliver
M. Khabbazian, T. A. Gulliver
sSCADA: Securing SCADA Infrastructure Communications
Yongge Wang, Bei-Tseng Chu
Yongge Wang, Bei-Tseng Chu
Musings on the Wang et al. MD5 Collision
Philip Hawkes, Michael Paddon, Gregory G. Rose
Philip Hawkes, Michael Paddon, Gregory G. Rose
Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
Christopher Wolf, Bart Preneel
Christopher Wolf, Bart Preneel
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
Lihua Liu, Zhengjun Cao
Lihua Liu, Zhengjun Cao
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
Dan Boneh, Jonathan Katz
Dan Boneh, Jonathan Katz
Secure Group Communications over Combined Wired/Wireless Networks
Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won
Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won
On Boolean Functions with Generalized Cryptographic Properties
An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
Escrow-Free Encryption Supporting Cryptographic Workflow
S. S. Al-Riyami, J. Malone-Lee, N. P. Smart
S. S. Al-Riyami, J. Malone-Lee, N. P. Smart
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Junghyun Nam, Seungjoo Kim, Dongho Won
Junghyun Nam, Seungjoo Kim, Dongho Won
On the supports of the Walsh transforms of Boolean functions
Claude Carlet, Sihem Mesnager
Claude Carlet, Sihem Mesnager
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
New paradigms for digital generation and post-processing of random data
Jovan Dj. Golic
Jovan Dj. Golic
Design Principles for Iterated Hash Functions
Stefan Lucks
Stefan Lucks
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare, Chanathip Namprempre, Gregory Neven
Mihir Bellare, Chanathip Namprempre, Gregory Neven
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
Junghyun Nam, Seungjoo Kim, Dongho Won
Junghyun Nam, Seungjoo Kim, Dongho Won
Identity Based Threshold Proxy Signature
Jing Xu, Zhenfeng Zhang, Dengguo Feng
Jing Xu, Zhenfeng Zhang, Dengguo Feng
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
Zhaohui Cheng, Richard Comley
Zhaohui Cheng, Richard Comley
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties
An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
Vectorial fast correlation attacks
Jovan Dj. Golic, Guglielmo Morgari
Jovan Dj. Golic, Guglielmo Morgari
Upper and Lower Bounds on Black-Box Steganography
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell
On codes, matroids and secure multi-party computation from linear secret sharing schemes
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimenez Urroz, Gregor Leander, Jaume Marti-Farre, Carles Padro
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimenez Urroz, Gregor Leander, Jaume Marti-Farre, Carles Padro
Signcryption in Hierarchical Identity Based Cryptosystem
Sherman S. M. Chow, Tsz Hon Yuen, Lucas C. K. Hui, S. M. Yiu
Sherman S. M. Chow, Tsz Hon Yuen, Lucas C. K. Hui, S. M. Yiu
On the Key Exposure Problem in Chameleon Hashes
Giuseppe Ateniese, Breno de Medeiros
Giuseppe Ateniese, Breno de Medeiros
Combinatorial group theory and public key cryptography
Vladimir Shpilrain, Gabriel Zapata
Vladimir Shpilrain, Gabriel Zapata
A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2
Colm O hEigeartaigh
Colm O hEigeartaigh
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura
Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura
Geometric Key Establishment
Arkady Berenstein, Leon Chernyak
Arkady Berenstein, Leon Chernyak
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme
Amit K Awasthi, Sunder Lal
Amit K Awasthi, Sunder Lal
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
Christopher Wolf, An Braeken, Bart Preneel
Christopher Wolf, An Braeken, Bart Preneel
Forgery Attacks on Chang et al.'s signature scheme with message recovery
FU Xiaotong, XU Chunxiang, XIAO Guozhen
FU Xiaotong, XU Chunxiang, XIAO Guozhen
Cryptographic Implications of Hess' Generalized GHS Attack
Alfred Menezes, Edlyn Teske
Alfred Menezes, Edlyn Teske
On the security of some nonrepudiable threshold proxy signature schemes with known signers
Zuo-Wen Tan, Zhuo-Jun Liu
Zuo-Wen Tan, Zhuo-Jun Liu
Password-Based Authenticated Key Exchange in the Three-Party Setting
Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
Extending the Resynchronization Attack
Frederik Armknecht, Joseph Lano, Bart Preneel
Frederik Armknecht, Joseph Lano, Bart Preneel
Timed-Release and Key-Insulated Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
A Provable Secure Scheme for Partially Blind Signatures
Fuw-Yi Yang, Jinn-Ke Jan
Fuw-Yi Yang, Jinn-Ke Jan
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes
Xin Lu, Zhi Ma, Dengguo Feng
Xin Lu, Zhi Ma, Dengguo Feng
DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$
Honggang Hu, Dengguo Feng
Honggang Hu, Dengguo Feng
Sign Change Fault Attacks On Elliptic Curve Cryptosystems
Johannes Blömer, Martin Otto, Jean-Pierre Seifert
Johannes Blömer, Martin Otto, Jean-Pierre Seifert
Lower Bounds for Non-Black-Box Zero Knowledge
Boaz Barak, Yehuda Lindell, Salil Vadhan
Boaz Barak, Yehuda Lindell, Salil Vadhan
Vectorial Boolean functions and induced algebraic equations
Jovan Dj. Golic
Jovan Dj. Golic
The Polynomial Composition Problem in (Z/nZ)[X]
Marc Joye, David Naccache, Stephanie Porte
Marc Joye, David Naccache, Stephanie Porte
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves
Xinxin Fan, Yumin Wang
Xinxin Fan, Yumin Wang
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
An Braeken, Christopher Wolf, Bart Preneel
An Braeken, Christopher Wolf, Bart Preneel
Towards Plaintext-Aware Public-Key Encryption without Random Oracles
Mihir Bellare, Adriana Palacio
Mihir Bellare, Adriana Palacio
On Oleshchuk's Public Key Cryptosystem
Heiko Stamer, Friedrich Otto
Heiko Stamer, Friedrich Otto
Entropic Security and the Encryption of High Entropy Messages
Yevgeniy Dodis, Adam Smith
Yevgeniy Dodis, Adam Smith
Plaintext-Simulatability
Eiichiro Fujisaki
Eiichiro Fujisaki
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
Aggelos Kiayias, Moti Yung
Aggelos Kiayias, Moti Yung
Tree Parity Machine Rekeying Architectures
Markus Volkmer, Sebastian Wallner
Markus Volkmer, Sebastian Wallner
Transitive Signatures: New Schemes and Proofs
Mihir Bellare, Gregory Neven
Mihir Bellare, Gregory Neven
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality
An Braeken, Christopher Wolf, Bart Preneel
An Braeken, Christopher Wolf, Bart Preneel
Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery
Fangguo Zhang
Fangguo Zhang
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
Ian F. Blake, Aldar C-F. Chan
Ian F. Blake, Aldar C-F. Chan
Hybrid Cryptography
Alexander W. Dent
Alexander W. Dent
The Security and Efficiency of Micciancio's Cryptosystem
Christoph Ludwig
Christoph Ludwig
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
Jean-Sebastien Coron, Alexander May
Jean-Sebastien Coron, Alexander May
On Corrective Patterns for the SHA-2 Family
Philip Hawkes, Michael Paddon, Gregory G. Rose
Philip Hawkes, Michael Paddon, Gregory G. Rose
ID-Based Proxy Signature Using Bilinear Pairings
Jing Xu, Zhenfeng Zhang, Dengguo Feng
Jing Xu, Zhenfeng Zhang, Dengguo Feng
Direct Anonymous Attestation
Ernie Brickell, Jan Camenisch, Liqun Chen
Ernie Brickell, Jan Camenisch, Liqun Chen
Authenticated tree parity machine key exchange
Markus Volkmer, Andre Schaumburg
Markus Volkmer, Andre Schaumburg
How to Cheat at Chess: A Security Analysis of the Internet Chess Club
John Black, Martin Cochran, Ryan Gardner
John Black, Martin Cochran, Ryan Gardner
Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions
Yuri Borissov, An Braeken, Svetla Nikova
Yuri Borissov, An Braeken, Svetla Nikova
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing
Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He
Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He
On Cheating Immune Secret Sharing
An Braeken, Svetla Nikova, Ventzislav Nikov
An Braeken, Svetla Nikova, Ventzislav Nikov
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu
Long Modular Multiplication for Cryptographic Applications
Laszlo Hars
Laszlo Hars
SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
Helmut Kahl
Helmut Kahl
Password Based Key Exchange with Mutual Authentication
Shaoquan Jiang, Guang Gong
Shaoquan Jiang, Guang Gong
Signed Binary Representations Revisited
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
A Note on An Encryption Scheme of Kurosawa and Desmedt
Rosario Gennaro, Victor Shoup
Rosario Gennaro, Victor Shoup
The Security and Performance of the Galois/Counter Mode of Operation (Full Version)
David A. McGrew, John Viega
David A. McGrew, John Viega
Security Pitfalls of an efficient remote user authentication scheme using smart cards
Manoj Kumar
Manoj Kumar
Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations
Pradeep Kumar Mishra
Pradeep Kumar Mishra
Distributed Ring Signatures for Identity-Based Scenarios
Javier Herranz, Germán Sáez
Javier Herranz, Germán Sáez
Computing Modular Polynomials
Denis Charles, Kristin Lauter
Denis Charles, Kristin Lauter
Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version
Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater
Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater
A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
Manoj Kumar
Manoj Kumar
On the Existence of low-degree Equations for Algebraic Attacks
Frederik Armknecht
Frederik Armknecht
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Amit K Awasthi, Sunder Lal
Amit K Awasthi, Sunder Lal
A New Forward Secure Signature Scheme
Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn
Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn
Simpler Session-Key Generation from Short Random Passwords
Minh-Huyen Nguyen, Salil Vadhan
Minh-Huyen Nguyen, Salil Vadhan
On the Composition of Authenticated Byzantine Agreement
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
Efficient Identity-Based Encryption Without Random Oracles
Brent R. Waters
Brent R. Waters
Identity Based Threshold Ring Signature
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
Optimal Updating of Ideal Threshold Schemes
S. G. Barwick, W. -A. Jackson, K. M. Martin, C. M. O'Keefe
S. G. Barwick, W. -A. Jackson, K. M. Martin, C. M. O'Keefe
Updating the Parameters of a Threshold Scheme by Minimal Broadcast
S. G. Barwick, W. -A. Jackson, K. M. Martin
S. G. Barwick, W. -A. Jackson, K. M. Martin
A Biometric Identity Based Signature Scheme
Andrew Burnett, Adam Duffy, Tom Dowling
Andrew Burnett, Adam Duffy, Tom Dowling
A Proof of Yao's Protocol for Secure Two-Party Computation
Yehuda Lindell, Benny Pinkas
Yehuda Lindell, Benny Pinkas
Short Group Signatures
Dan Boneh, Xavier Boyen, Hovav Shacham
Dan Boneh, Xavier Boyen, Hovav Shacham
Secure Identity Based Encryption Without Random Oracles
Dan Boneh, Xavier Boyen
Dan Boneh, Xavier Boyen
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
Dan Boneh, Xavier Boyen
Dan Boneh, Xavier Boyen
Short Signatures Without Random Oracles
Dan Boneh, Xavier Boyen
Dan Boneh, Xavier Boyen
Efficient Consistency Proofs for Generalized Queries on a Committed Database
Rafail Ostrovsky, Charles Rackoff, Adam Smith
Rafail Ostrovsky, Charles Rackoff, Adam Smith
Regional Blackouts: Protection of Broadcast Content on 3G Networks.
Alexander W. Dent, Allan Tomlinson
Alexander W. Dent, Allan Tomlinson
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack
T. Moh, J. M. Chen, Boyin Yang
T. Moh, J. M. Chen, Boyin Yang
A Secure and Efficient Key Exchange Protocol for Mobile Communications
Fuw-Yi Yang, Jinn-Ke Jan
Fuw-Yi Yang, Jinn-Ke Jan
FRMAC, a Fast Randomized Message Authentication Code
Eliane Jaulmes, Reynald Lercier
Eliane Jaulmes, Reynald Lercier
A comparison of MNT curves and supersingular curves
D. Page, N. P. Smart, F. Vercauteren
D. Page, N. P. Smart, F. Vercauteren
ID-based Cryptography from Composite Degree Residuosity
Man Ho Au, Victor K. Wei
Man Ho Au, Victor K. Wei
On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
Manoj Kumar
Manoj Kumar
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
Ivan Damgaard, Thomas Pedersen, Louis Salvail
Ivan Damgaard, Thomas Pedersen, Louis Salvail
Improvement of Thériault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus
Ko-ichi Nagao
Ko-ichi Nagao
Scalable Public-Key Tracing and Revoking
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
Gergely Acs, Levente Buttyan, Istvan Vajda
Gergely Acs, Levente Buttyan, Istvan Vajda
Mobile Terminal Security
Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan
Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
R. Granger, D. Page, M. Stam
R. Granger, D. Page, M. Stam
Quantum cryptography: a practical information security perspective
Kenneth G. Paterson, Fred Piper, Ruediger Schack
Kenneth G. Paterson, Fred Piper, Ruediger Schack
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
Amir Herzberg, Ahmad Gbara
Amir Herzberg, Ahmad Gbara
Controlling Spam by Secure Internet Content Selection
Amir Herzberg
Amir Herzberg
A double large prime variation for small genus hyperelliptic index calculus
P. Gaudry, E. Thomë, N. Thëriault, C. Diem
P. Gaudry, E. Thomë, N. Thëriault, C. Diem
Another Look at ``Provable Security''
Neal Koblitz, Alfred Menezes
Neal Koblitz, Alfred Menezes
Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$
Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi
Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi
An Authenticated Certificateless Public Key Encryption Scheme
Young-Ran Lee, Hyang-Sook Lee
Young-Ran Lee, Hyang-Sook Lee
Secure and Efficient AES Software Implementation for Smart Caards
E. Trichina, L. Korkishko
E. Trichina, L. Korkishko
Provably Secure Delegation-by-Certification Proxy Signature Schemes
Zuowen Tan, Zhuojun Liu
Zuowen Tan, Zhuojun Liu
Key Recovery Method for CRT Implementation of RSA
Matthew J. Campagna, Amit Sethi
Matthew J. Campagna, Amit Sethi
Near-Collisions of SHA-0
Eli Biham, Rafi Chen
Eli Biham, Rafi Chen
Electromagnetic Side Channels of an FPGA Implementation of AES
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables
Alexander Maximov, Martin Hell, Subhamoy Maitra
Alexander Maximov, Martin Hell, Subhamoy Maitra
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
Nicolas T. Courtois
Nicolas T. Courtois
Elliptic Curve based Signcryption and its Multi-party Schemes
Yiliang HAN, Xiaoyuan YANG
Yiliang HAN, Xiaoyuan YANG
Elastic AES
Debra L. Cook, Moti Yung, Angelos D. Keromytis
Debra L. Cook, Moti Yung, Angelos D. Keromytis
Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher
P. Kitsos, M. D. Galanis, O. Koufopavlou
P. Kitsos, M. D. Galanis, O. Koufopavlou
New Notions of Security: Achieving Universal Composability without Trusted Setup
Manoj Prabhakaran, Amit Sahai
Manoj Prabhakaran, Amit Sahai
How to Disembed a Program?
Benoit Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
Benoit Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
New GF(2n) Parallel Multiplier Using Redundant Representation
Haining Fan, Yiqi Dai
Haining Fan, Yiqi Dai
CompChall: Addressing Password Guessing Attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
More Efficient Server Assisted One Time Signatures
Vipul Goyal
Vipul Goyal
Secure and Efficient Masking of AES - A Mission Impossible?
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller
Secret Handshakes from CA-Oblivious Encryption
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
R. Granger, D. Page, M. Stam
R. Granger, D. Page, M. Stam
A New ID-based Signature with Batch Verification
Jung Hee Cheon, Yongdae Kim, Hyo Jin Yoon
Jung Hee Cheon, Yongdae Kim, Hyo Jin Yoon
Private Inference Control
David Woodruff, Jessica Staddon
David Woodruff, Jessica Staddon
Generalizing Kedlaya's order counting based on Miura Theory
Joe Suzuki
Joe Suzuki
Elastic Block Ciphers
Debra L. Cook, Moti Yung, Angelos D. Keromytis
Debra L. Cook, Moti Yung, Angelos D. Keromytis
DDH-based Group Key Agreement in a Mobile Environment
Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
Two Software Normal Basis Multiplication Algorithms for GF(2n)
Haining Fan, Yiqi Dai
Haining Fan, Yiqi Dai
EME*: extending EME to handle arbitrary-length messages with associated data
Shai Halevi
Shai Halevi
Universally Composable DKG with Linear Number of Exponentiations
Douglas Wikström
Douglas Wikström
On security of XTR public key cryptosystems against Side Channel Attacks
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
A New Two-Party Identity-Based Authenticated Key Agreement
Noel McCullagh, Paulo S. L. M. Barreto
Noel McCullagh, Paulo S. L. M. Barreto
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
Tsz Hon Yuen, Victor K. Wei
Tsz Hon Yuen, Victor K. Wei
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup
Bartosz Zoltak
Bartosz Zoltak
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
Masayuki Abe, Serge Fehr
Masayuki Abe, Serge Fehr
Fast addition on non-hyperelliptic genus $3$ curves
Stéphane Flon, Roger Oyono, Christophe Ritzenthaler
Stéphane Flon, Roger Oyono, Christophe Ritzenthaler
Efficient and Forward-Secure Identity-Based Signcryption
Noel McCullagh, Paulo S. L. M. Barreto
Noel McCullagh, Paulo S. L. M. Barreto
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won
Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won
Improved Identity-Based Signcryption
Liqun Chen, John Malone-Lee
Liqun Chen, John Malone-Lee
On the Security and Composability of the One Time Pad
Dominik Raub, Rainer Steinwandt, Joern Mueller-Quade
Dominik Raub, Rainer Steinwandt, Joern Mueller-Quade
Relation between XL algorithm and Groebner Bases Algorithms
M. Sugita, M. Kawazoe, H. Imai
M. Sugita, M. Kawazoe, H. Imai
The Vulnerability of SSL to Chosen Plaintext Attack
Gregory V. Bard
Gregory V. Bard
Designing Against the `Overdefined System of Equations' Attack
Carlisle Adams
Carlisle Adams
Concealing Complex Policies with Hidden Credentials
Robert Bradshaw, Jason Holt, Kent Seamons
Robert Bradshaw, Jason Holt, Kent Seamons
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic
Bertrand BYRAMJEE, Sylvain DUQUESNE
Bertrand BYRAMJEE, Sylvain DUQUESNE
Capacity and Examples of Template Protecting Biometric Authentication Systems
P. Tuyls, J. Goseling
P. Tuyls, J. Goseling
Receipt-Free Homomorphic Elections and Write-in Ballots
Alessandro Acquisti
Alessandro Acquisti
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
Lan Nguyen, Rei Safavi-Naini
Lan Nguyen, Rei Safavi-Naini
Cryptanalysis of SFlash v3
Jintai Ding, Dieter Schmidt
Jintai Ding, Dieter Schmidt
The Exact Security of an Identity Based Signature and its Applications
Benoît Libert, Jean-Jacques Quisquater
Benoît Libert, Jean-Jacques Quisquater
Provably Secure Masking of AES
Johannes Blömer, Jorge Guajardo Merchan, Volker Krummel
Johannes Blömer, Jorge Guajardo Merchan, Volker Krummel
The Sorcerer’s Apprentice Guide to Fault Attacks
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan
Secure Hashed Diffie-Hellman over Non-DDH Groups
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
Attacking a Public Key Cryptosystem Based on Tree Replacement
María Isabel González Vasco, David Pérez García
María Isabel González Vasco, David Pérez García
How To Re-initialize a Hash Chain
Vipul Goyal
Vipul Goyal
On the Ambiguity of Concurrent Signatures
Yi Mu, Fangguo Zhang, Willy Susilo
Yi Mu, Fangguo Zhang, Willy Susilo
GNFS Factoring Statistics of RSA-100, 110, ..., 150
Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda
Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda
Block Ciphers and Stream Ciphers: The State of the Art
Alex Biryukov
Alex Biryukov
A Provably Secure Nyberg-Rueppel Signature Variant with Applications
Giuseppe Ateniese, Breno de Medeiros
Giuseppe Ateniese, Breno de Medeiros
A New Stream Cipher HC-256
Hongjun Wu
Hongjun Wu
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Einar Mykletun, Maithili Narasimha, Gene Tsudik
Einar Mykletun, Maithili Narasimha, Gene Tsudik
Provably Secure Authenticated Tree Based Group Key Agreement Protocol
Ratna Dutta, Rana Barua, Palash Sarkar
Ratna Dutta, Rana Barua, Palash Sarkar
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance
Mahalingam Ramkumar, Nasir Memon
Mahalingam Ramkumar, Nasir Memon
Efficient Batch Verification of Signature Schemes based on Bilinear Maps
Noel McCullagh
Noel McCullagh
Using primitive subgroups to do more with fewer bits
K. Rubin, A. Silverberg
K. Rubin, A. Silverberg
Fuzzy Identity Based Encryption
Amit Sahai, Brent Waters
Amit Sahai, Brent Waters
The CS2 Block Cipher
Tom St Denis
Tom St Denis
Evaluating elliptic curve based KEMs in the light of pairings
David Galindo, Sebastia Martin, Jorge L. Villar
David Galindo, Sebastia Martin, Jorge L. Villar
Scan Based Side Channel Attack on Data Encryption Standard
Bo Yang, Kaijie Wu, Ramesh Karri
Bo Yang, Kaijie Wu, Ramesh Karri
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
Michael Backes, Birgit Pfitzmann, Michael Waidner
Michael Backes, Birgit Pfitzmann, Michael Waidner
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
Philip Hawkes, Gregory G. Rose
Philip Hawkes, Gregory G. Rose
HENKOS Stream Cipher
Marius Oliver Gheorghita
Marius Oliver Gheorghita
Pairing-Based One-Round Tripartite Key Agreement Protocols
Zhaohui Cheng, Luminita Vasiu, Richard Comley
Zhaohui Cheng, Luminita Vasiu, Richard Comley
Analysis of the WinZip encryption method
Tadayoshi Kohno
Tadayoshi Kohno
Foundations of Group Signatures: The Case of Dynamic Groups
Mihir Bellare, Haixia Shi, Chong Zhang
Mihir Bellare, Haixia Shi, Chong Zhang
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders
Aggelos Kiayias, Moti Yung
Aggelos Kiayias, Moti Yung
An Hybrid Mode of Operation
Alexis W. Machado
Alexis W. Machado
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
Liam Keliher, Henk Meijer, Stafford Tavares
Liam Keliher, Henk Meijer, Stafford Tavares
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
Pierrick Gaudry
Pierrick Gaudry
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf, Bart Preneel
Christopher Wolf, Bart Preneel
An IBE Scheme to Exchange Authenticated Secret Keys
Waldyr Benits Jr, Routo Terada
Waldyr Benits Jr, Routo Terada
Easy decision-Diffie-Hellman groups
Steven D Galbraith, Victor Rotger
Steven D Galbraith, Victor Rotger
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
Synthesis of Secure FPGA Implementations
Kris Tiri, Ingrid Verbauwhede
Kris Tiri, Ingrid Verbauwhede
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis
Kris Tiri, Ingrid Verbauwhede
Kris Tiri, Ingrid Verbauwhede
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.
Kris Tiri, Ingrid Verbauwhede
Kris Tiri, Ingrid Verbauwhede
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
Ian Blake, Kumar Murty, Guangwu Xu
Ian Blake, Kumar Murty, Guangwu Xu
Pairing-Based Cryptographic Protocols : A Survey
Ratna Dutta, Rana Barua, Palash Sarkar
Ratna Dutta, Rana Barua, Palash Sarkar
An Oblivious Transfer Protocol with Log-Squared Communication
Helger Lipmaa
Helger Lipmaa
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black, Martin Cochran, Thomas Shrimpton
John Black, Martin Cochran, Thomas Shrimpton
TTS: Rank Attacks in Tame-Like Multivariate PKCs
Bo-Yin Yang, Jiun-Ming Chen
Bo-Yin Yang, Jiun-Ming Chen
Positive Results and Techniques for Obfuscation
Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Michael Backes, Birgit Pfitzmann
Michael Backes, Birgit Pfitzmann
Generating more MNT elliptic curves
Michael Scott, Paulo S. L. M Barreto
Michael Scott, Paulo S. L. M Barreto
On Multiple Linear Approximations
Alex Biryukov, Christophe De Cannière, Michael Quisquater
Alex Biryukov, Christophe De Cannière, Michael Quisquater
Redundant Trinomials for Finite Fields of Characteristic $2$
Christophe Doche
Christophe Doche
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Efficient and Universally Composable Committed Oblivious Transfer and Applications
Juan Garay, Philip MacKenzie, Ke Yang
Juan Garay, Philip MacKenzie, Ke Yang
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Tal Malkin, Satoshi Obana, Moti Yung
Tal Malkin, Satoshi Obana, Moti Yung
Privacy Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang, Michael Mitzenmacher
Yan-Cheng Chang, Michael Mitzenmacher
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
Christophe Clavier
Christophe Clavier
Tail-MAC: A Message Authentication Scheme for Stream Ciphers
Bartosz Zoltak
Bartosz Zoltak
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
Yodai Watanabe
Yodai Watanabe
Revision of Tractable Rational Map Cryptosystem
Lih-Chung Wang, Fei-Hwang Chang
Lih-Chung Wang, Fei-Hwang Chang
Lower Bounds and Impossibility Results for Concurrent Self Composition
Yehuda Lindell
Yehuda Lindell
Transitive Signatures Based on Non-adaptive Standard Signatures
Zhou Sujing
Zhou Sujing
Multi-sequences with d-perfect property
Xiutao Feng, Quanlong Wang, Zongduo Dai
Xiutao Feng, Quanlong Wang, Zongduo Dai
Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
Cheng-Kang Chu, Wen-Guey Tzeng
Cheng-Kang Chu, Wen-Guey Tzeng
Cryptanalysis of a timestamp-based password authentication scheme
Lizhen Yang, Kefei Chen
Lizhen Yang, Kefei Chen
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
Victor K. Wei
Victor K. Wei
Chameleon Hashing without Key Exposure
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
A Provably Secure Scheme for Restrictive Partially Blind Signatures
Fuw-Yi Yang, Jinn-Ke Jan
Fuw-Yi Yang, Jinn-Ke Jan
Single Database Private Information Retrieval with Logarithmic Communication
Yan-Cheng Chang
Yan-Cheng Chang
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
Phillip Rogaway, Thomas Shrimpton
Phillip Rogaway, Thomas Shrimpton
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
Gideon Samid
Gideon Samid
New Approaches to Password Authenticated Key Exchange based on RSA
Muxiang Zhang
Muxiang Zhang
Compressed Pairings
Michael Scott, Paulo S. L. M. Barreto
Michael Scott, Paulo S. L. M. Barreto
Summation polynomials and the discrete logarithm problem on elliptic curves
Igor Semaev
Igor Semaev
Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.
Colin Stahlke
Colin Stahlke
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
Guido Bertoni, Luca Breveglieri, Thomas Wollinger, Christof Paar
Guido Bertoni, Luca Breveglieri, Thomas Wollinger, Christof Paar
Custodian-Hiding Verifiable Encryption
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
Joseph K. Liu, Victor K. Wei, Duncan S. Wong
The CSQUARE Transform
Tom St Denis
Tom St Denis
Clarifying Obfuscation: Improving the Security of White-Box Encoding
Hamilton E. Link, William D. Neumann
Hamilton E. Link, William D. Neumann
Exponential S-boxes
Sergey Agievich, Andrey Afonenko
Sergey Agievich, Andrey Afonenko
RDS: Remote Distributed Scheme for Protecting Mobile Agents
Asnat Dadon-Elichai
Asnat Dadon-Elichai
Privacy-Enhanced Searches Using Encrypted Bloom Filters
Steven M. Bellovin, William R. Cheswick
Steven M. Bellovin, William R. Cheswick
Externalized Fingerprint Matching
Claude Barral, Jean-Sébastien Coron, David Naccache
Claude Barral, Jean-Sébastien Coron, David Naccache
Optimal Signcryption from Any Trapdoor Permutation
Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu Iwata, Tadayoshi Kohno
Tetsu Iwata, Tadayoshi Kohno
Corrections of the NIST Statistical Test Suite for Randomness
Song-Ju Kim, Ken Umeno, Akio Hasegawa
Song-Ju Kim, Ken Umeno, Akio Hasegawa
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
M. Scott
M. Scott
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
Dennis Hofheinz, Joern Mueller-Quade
Dennis Hofheinz, Joern Mueller-Quade
An AGM-type elliptic curve point counting algorithm in characteristic three
Trond Stølen Gustavsen, Kristian Ranestad
Trond Stølen Gustavsen, Kristian Ranestad
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
Sugata Gangopadhyay, Subhamoy Maitra
Sugata Gangopadhyay, Subhamoy Maitra
Cryptanalysis of a Provably Secure Cryptographic Hash Function
Jean-Sebastien Coron, Antoine Joux
Jean-Sebastien Coron, Antoine Joux
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Known-Plaintext Attack Against a Permutation Based Video
Adam J. Slagell
Adam J. Slagell
Fast Pseudo-Hadamard Transforms
Tom St Denis
Tom St Denis
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
Juan A. Garay, Philip MacKenzie, Ke Yang
Juan A. Garay, Philip MacKenzie, Ke Yang
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
Mihir Bellare, Adriana Palacio
Mihir Bellare, Adriana Palacio
Traceable Signatures
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
Protocol Initialization for the Framework of Universal Composability
Boaz Barak, Yehuda Lindell, Tal Rabin
Boaz Barak, Yehuda Lindell, Tal Rabin
Universal Undeniable Signatures
Huafei Zhu
Huafei Zhu
None
--withdrawn--
--withdrawn--
On the Role of the Inner State Size in Stream Ciphers
Erik Zenner
Erik Zenner
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
Yuichi Komano, Kazuo Ohta
Yuichi Komano, Kazuo Ohta
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications
Yunlei ZHAO
Yunlei ZHAO
Inversion of Several Field Elements: A New Parallel Algorithm
Pradeep Kumar Mishra, Palash Sarkar
Pradeep Kumar Mishra, Palash Sarkar
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Manik Lal Das, Ashutosh Saxena, V P Gulati
Manik Lal Das, Ashutosh Saxena, V P Gulati
A Secure Modified ID-Based Undeniable Signature Scheme
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
A provably secure ID-based ring signature scheme
Javier Herranz, Germán Sáez
Javier Herranz, Germán Sáez
An Improved ID-based Authenticated Group Key Agreement Scheme
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Attack on Two ID-based Authenticated Group Key Agreement Schemes
Fangguo Zhang, Xiaofeng Chen
Fangguo Zhang, Xiaofeng Chen
Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.
Marcin Rogawski
Marcin Rogawski
Trading Inversions for Multiplications in Elliptic Curve Cryptography
Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery
Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery
On the Security of a Multi-Party Certified Email Protocol
Jianying Zhou
Jianying Zhou
Improved Constructions for Universal Re-encryption.
Peter Fairbrother
Peter Fairbrother
Committing Encryption and Publicly-Verifiable SignCryption
Yitchak Gertner, Amir Herzberg
Yitchak Gertner, Amir Herzberg
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
Roberto Maria Avanzi
Roberto Maria Avanzi
On Simulation-Sound Trapdoor Commitments
Philip MacKenzie, Ke Yang
Philip MacKenzie, Ke Yang
Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields
EunKyung Jeong
EunKyung Jeong
Breaking the Stream Cipher Whitenoise
Hongjun Wu
Hongjun Wu
Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)
Stephen Boren, Andre Brisson
Stephen Boren, Andre Brisson
Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n)
Izuru Kitamura, Masanobu Katagi
Izuru Kitamura, Masanobu Katagi
ID-based Authenticated Two Round Multi-Party Key Agreement
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Quantum Digital Signature Based on Quantum One-way Functions
Xin L¨¹, Deng-Guo Feng
Xin L¨¹, Deng-Guo Feng
A Key Substitution Attack on SFLASH^{v3}
Willi Geiselmann, Rainer Steinwandt
Willi Geiselmann, Rainer Steinwandt
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks
Tri Van Le, Kaoru Kurosawa
Tri Van Le, Kaoru Kurosawa
An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures
Guilin Wang
Guilin Wang
Improved Weil and Tate pairings for elliptic and hyperelliptic curves
Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
Hybrid Broadcast Encryption and Security Analysis
Shaoquan Jiang, Guang Gong
Shaoquan Jiang, Guang Gong
How to Break and Repair a Universally Composable Signature Functionality
Michael Backes, Dennis Hofheinz
Michael Backes, Dennis Hofheinz
Universally Composable Signatures, Certification and Authentication
Ran Canetti
Ran Canetti
Chameleon Signature from Bilinear Pairing
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
Benoit Chevallier-Mames, Mathieu Ciet, Marc Joye
Benoit Chevallier-Mames, Mathieu Ciet, Marc Joye
Combinational Logic Design for AES SubByte Transformation on Masked Data
Elena Trichina
Elena Trichina
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Gene Itkis, Peng Xie
Gene Itkis, Peng Xie
Public Key Steganography
Luis von Ahn, Nicholas J. Hopper
Luis von Ahn, Nicholas J. Hopper
The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm
Chunming Tang, Zhuojun Liu, Jinwang Liu
Chunming Tang, Zhuojun Liu, Jinwang Liu
Public-Key Steganography with Active Attacks
Michael Backes, Christian Cachin
Michael Backes, Christian Cachin
A Fast Provably Secure Cryptographic Hash Function
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
Algebraic Attacks on Summation Generators
Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
Verifiably Committed Signatures Provably Secure in The Standard Complexity Model
Huafei Zhu
Huafei Zhu
Attacks on a Secure Group Communication Scheme With Hierarchical Access Control
Willi Geiselmann, Rainer Steinwandt
Willi Geiselmann, Rainer Steinwandt
On the Security of a Group Signature Scheme with Forward Security
Guilin Wang
Guilin Wang
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
Palash Sarkar
Palash Sarkar
--Withdrawn--
Noel McCullagh, Michael Scott
Noel McCullagh, Michael Scott
Cryptanalysis of a Cryptosystem based on Drinfeld modules
Simon R. Blackburn, Carlos Cid, Steven D. Galbraith
Simon R. Blackburn, Carlos Cid, Steven D. Galbraith
A Verifiable Secret Sharing Scheme with Statistical zero-knowledge
Chunming Tang, Zhuojun Liu, Mingsheng Wang
Chunming Tang, Zhuojun Liu, Mingsheng Wang
A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism
Jung Hee Cheon, Hyun Soo Nam
Jung Hee Cheon, Hyun Soo Nam
A short comment on the affine parts of SFLASH^{v3}
Willi Geiselmann, Rainer Steinwandt
Willi Geiselmann, Rainer Steinwandt
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
Jean-Sebastien Coron
Jean-Sebastien Coron
A Security Evaluation of Whitenoise
David Wagner
David Wagner
Chemical Combinatorial Attacks on Keyboards
Eric Brier, David Naccache, Pascal Paillier
Eric Brier, David Naccache, Pascal Paillier
Secure Indexes
Eu-Jin Goh
Eu-Jin Goh
Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC
Bo Yang, Ramesh Karri, David Mcgrew
Bo Yang, Ramesh Karri, David Mcgrew
Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols
Rosario Gennaro
Rosario Gennaro
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$
Y. Choie, E. Jeong
Y. Choie, E. Jeong
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
Jan Pelzl, Thomas Wollinger, Christof Paar
Jan Pelzl, Thomas Wollinger, Christof Paar
SFLASHv3, a fast asymmetric signature scheme
Nicolas T. Courtois, Louis Goubin, Jacques Patarin
Nicolas T. Courtois, Louis Goubin, Jacques Patarin
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
Ventzislav Nikov, Svetla Nikova
Ventzislav Nikov, Svetla Nikova
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
Daniel Augot, Matthieu Finiasz, Pierre Loidreau
Daniel Augot, Matthieu Finiasz, Pierre Loidreau
ID-Based Chameleon Hashes from Bilinear Pairings
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
Security Flaws in Several Group Signatures Proposed by Popescu
Guilin Wang, Sihan Qing
Guilin Wang, Sihan Qing
Identity Based Undeniable Signatures
Benoît Libert, Jean-Jacques Quisquater
Benoît Libert, Jean-Jacques Quisquater
Improved Cryptanalysis of SecurID
Scott Contini, Yiqun Lisa Yin
Scott Contini, Yiqun Lisa Yin
A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials
ZENG Xiangyong, HU Lei
ZENG Xiangyong, HU Lei
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
Yet Another Sieving Device
Willi Geiselmann, Rainer Steinwandt
Willi Geiselmann, Rainer Steinwandt
an attack on a multisignature scheme
Zheng Dong, Kefei Chen
Zheng Dong, Kefei Chen
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
Zheng Dong, Shengli Liu, kefei Chen
Zheng Dong, Shengli Liu, kefei Chen
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
Simon R. Blackburn, Kenneth G. Paterson
Simon R. Blackburn, Kenneth G. Paterson
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
Kishan Chand Gupta, Palash Sarkar
Kishan Chand Gupta, Palash Sarkar
Revisiting fully distributed proxy signature schemes
Javier Herranz, German Saez
Javier Herranz, German Saez
Security Analysis of Some Proxy Signatures
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Public Key Encryption with keyword Search
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
Security Analysis of Several Group Signature Schemes
Guilin Wang
Guilin Wang
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
Universal Designated-Verifier Signatures
Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
Projective Coordinates Leak
David Naccache, Nigel Smart, Jacques Stern
David Naccache, Nigel Smart, Jacques Stern
Extending Joux's Protocol to Multi Party Key Agreement
Rana Barua, Ratna Dutta, Palash Sarkar
Rana Barua, Ratna Dutta, Palash Sarkar
Cryptanalysis of publicly verifiable authenticated encryption
Zuhua Shao
Zuhua Shao
A New Forward Secure Signature Scheme using Bilinear Maps
Fei Hu, Chwan-Hwa Wu, J. D. Irwin
Fei Hu, Chwan-Hwa Wu, J. D. Irwin
Resource Bounded Unprovability of Computational Lower Bounds
Tatsuaki Okamoto, Ryo Kashima
Tatsuaki Okamoto, Ryo Kashima
Safe Prime Generation with a Combined Sieve
Michael J. Wiener
Michael J. Wiener
VMPC Stream Cipher
Bartosz Zoltak
Bartosz Zoltak
What do DES S-boxes Say to Each Other ?
Nicolas T. Courtois, Guilhem Castagnos, Louis Goubin
Nicolas T. Courtois, Guilhem Castagnos, Louis Goubin
Certificate-Based Encryption and the Certificate Revocation Problem
Craig Gentry
Craig Gentry
Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti, Shai Halevi, Jonathan Katz
Ran Canetti, Shai Halevi, Jonathan Katz
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai
Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
Pradeep Kumar Mishra, Palash Sarkar
Pradeep Kumar Mishra, Palash Sarkar
VMPC One-Way Function
Bartosz Zoltak
Bartosz Zoltak
Constructing Optimistic Fair Exchange Protocols from Committed Signatures
Huafei Zhu
Huafei Zhu
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Tadayoshi Kohno, Adriana Palacio, John Black
Tadayoshi Kohno, Adriana Palacio, John Black
Patterson-Wiedemann Construction Revisited
S. Gangopadhyay, P. H. Keskar, S. Maitra
S. Gangopadhyay, P. H. Keskar, S. Maitra
Double-Speed Safe Prime Generation
David Naccache
David Naccache
Relaxing Chosen-Ciphertext Security
Ran Canetti, Hugo Krawczyk, Jesper Nielsen
Ran Canetti, Hugo Krawczyk, Jesper Nielsen
Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration
Palash Sarkar
Palash Sarkar
NAEP: Provable Security in the Presence of Decryption Failures
Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
Scalable Protocols for Authenticated Group Key Exchange
Jonathan Katz, Moti Yung
Jonathan Katz, Moti Yung
HARPS: HAshed Random Preloaded Subset Key Distribution
Mahalingam Ramkumar, Nasir Memon
Mahalingam Ramkumar, Nasir Memon
Properties of the Transformation Semigroup of the Solitaire Stream Cipher
Boris Pogorelov, Marina Pudovkina
Boris Pogorelov, Marina Pudovkina
Robust discretization, with an application to graphical passwords
Jean-Camille Birget, Dawei Hong, Nasir Memon
Jean-Camille Birget, Dawei Hong, Nasir Memon
Identity-based Chameleon Hash and Applications
Giuseppe Ateniese, Breno de Medeiros
Giuseppe Ateniese, Breno de Medeiros
A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves
Igor Semaev
Igor Semaev
Commitment Capacity of Discrete Memoryless Channels
Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
Identity-Based Threshold Decryption
Joonsang Baek, Yuliang Zheng
Joonsang Baek, Yuliang Zheng
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography
Xavier Boyen
Xavier Boyen
Cryptanalysis of the Alleged SecurID Hash Function
Alex Biryukov, Joseph Lano, Bart Preneel
Alex Biryukov, Joseph Lano, Bart Preneel
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
Ueli Maurer, Renato Renner, Clemens Holenstein
Ueli Maurer, Renato Renner, Clemens Holenstein
A More Secure and Efficacious TTS Signature Scheme
Jiun-Ming Chen, Bo-Yin Yang
Jiun-Ming Chen, Bo-Yin Yang
An efficient variant of the RSA cryptosystem
Cesar Alison Monteiro Paixão
Cesar Alison Monteiro Paixão
A Sufficient Condition and Optimal Domain Extension of UOWHF
Mridul Nandi
Mridul Nandi
Some RSA-based Encryption Schemes with Tight Security Reduction
Kaoru Kurosawa, Tsuyoshi Takagi
Kaoru Kurosawa, Tsuyoshi Takagi
Efficient Provably Secure Public Key Steganography
Tri Van Le
Tri Van Le
A Formal Proof of Zhu's Signature Scheme
huafei zhu
huafei zhu
ManTiCore: Encryption with Joint Cipher-State Authentication
Cheryl Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
Cheryl Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
Zhen-Feng ZHANG, Jing XU, Deng-Guo FENG
Zhen-Feng ZHANG, Jing XU, Deng-Guo FENG
Optimal Statistical Power Analysis
Eric Brier, Christophe Clavier, Francis Olivier
Eric Brier, Christophe Clavier, Francis Olivier
Secret sharing schemes on sparse homogeneous access structures with rank three
Jaume Martí-Farré, Carles Padró
Jaume Martí-Farré, Carles Padró
On the random-oracle methodology as applied to length-restricted signature schemes
Ran Canetti, Oded Goldreich, Shai Halevi
Ran Canetti, Oded Goldreich, Shai Halevi
Forward-Secure Hierarchical ID-Based Cryptography
Danfeng Yao, Anna Lysyanskaya
Danfeng Yao, Anna Lysyanskaya
A Tweakable Enciphering Mode
Shai Halevi, Phillip Rogaway
Shai Halevi, Phillip Rogaway
A Parallelizable Enciphering Mode
Shai Halevi, Phillip Rogaway
Shai Halevi, Phillip Rogaway
Breaking and Repairing Optimistic Fair Exchange from PODC 2003
Yevgeniy Dodis, Leonid Reyzin
Yevgeniy Dodis, Leonid Reyzin
Symmetric Authentication Within a Simulatable Cryptographic Library
Michael Backes, Birgit Pfitzmann, Michael Waidner
Michael Backes, Birgit Pfitzmann, Michael Waidner
ID-based tripartite key agreement with signatures
Divya Nalla
Divya Nalla
Elliptic curves suitable for pairing based cryptography
Friederike Brezing, Annegret Weng
Friederike Brezing, Annegret Weng
A New Tree based Domain Extension of UOWHF
Mridul Nandi
Mridul Nandi
General Composition and Universal Composability in Secure Multiparty Computation
Yehuda Lindell
Yehuda Lindell
Trading-Off Type-Inference Memory Complexity Against Communication
Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
On the Randomness of the Editing Generator
Enjian Bai, Guozhen Xiao
Enjian Bai, Guozhen Xiao
Permutation graphs, fast forward permutations, and
Boaz Tsaban
Boaz Tsaban
Bernoulli numbers and the probability of a birthday surprise
Boaz Tsaban
Boaz Tsaban
Efficient linear feedback shift registers with maximal period
Boaz Tsaban, Uzi Vishne
Boaz Tsaban, Uzi Vishne
Collision Attack on Reduced-Round Camellia
Wen-Ling Wu, Deng-Guo Feng
Wen-Ling Wu, Deng-Guo Feng
Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions
Sugata Gangopadhyay, Subhamoy Maitra
Sugata Gangopadhyay, Subhamoy Maitra
Minimum Distance between Bent and 1-resilient Boolean Functions
Soumen Maity, Subhamoy Maitra
Soumen Maity, Subhamoy Maitra
Guaranteeing the diversity of number generators
Adi Shamir, Boaz Tsaban
Adi Shamir, Boaz Tsaban
Homomorphic public-key systems based on subgroup membership problems
Kristian Gjøsteen
Kristian Gjøsteen
On the Pseudorandomness of KASUMI Type Permutations
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
Weak Fields for ECC
Alfred Menezes, Edlyn Teske, Annegret Weng
Alfred Menezes, Edlyn Teske, Annegret Weng
Using Information Theory Approach to Randomness Testing
B. Ya. Ryabko, V. A. Monarev
B. Ya. Ryabko, V. A. Monarev
Certificateless Public Key Cryptography
Sattam S. Al-Riyami, Kenneth G. Paterson
Sattam S. Al-Riyami, Kenneth G. Paterson
Algebraic Attacks on Combiners with Memory and Several Outputs
Nicolas T. Courtois
Nicolas T. Courtois
A General Correlation Theorem
Kishan Chand Gupta, Palash Sarkar
Kishan Chand Gupta, Palash Sarkar
Assessing security of some group based cryptosystems
Vladimir Shpilrain
Vladimir Shpilrain
Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols
Kyungah Shim
Kyungah Shim
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
Michael Backes, Birgit Pfitzmann
Michael Backes, Birgit Pfitzmann
Physically Observable Cryptography
Silvio Micali, Leonid Reyzin
Silvio Micali, Leonid Reyzin
How Secure Are FPGAs in Cryptographic Applications?
Thomas Wollinger, Christof Paar
Thomas Wollinger, Christof Paar
Visual Crypto Displays Enabling Secure Communications
Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
An identity-based ring signature scheme from bilinear pairings
Chih-Yin Lin, Tzong-Chen Wu
Chih-Yin Lin, Tzong-Chen Wu
A New ID-based Group Signature Scheme from Bilinear Pairings
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
Kyungah Shim
Kyungah Shim
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
Michael Backes
Michael Backes
Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
Hung-Min Sun, Bin-Tsan Hsieh
Hung-Min Sun, Bin-Tsan Hsieh
Accumulating Composites and Improved Group Signing
Gene Tsudik, Shouhuai Xu
Gene Tsudik, Shouhuai Xu
Further Cryptanalysis of some Proxy Signature Schemes
Jiqiang Lv, Jingwei Liu, Xinmei Wang
Jiqiang Lv, Jingwei Liu, Xinmei Wang
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key
Yukio Itakura, Shigeo Tsujii
Yukio Itakura, Shigeo Tsujii
Crytanalysis of SAFER++
Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
Novel Cyclic and Algebraic Properties of AES
Tri Van Le
Tri Van Le
Fujisaki-Okamoto IND-CCA hybrid encryption revisited
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
CWC: A high-performance conventional authenticated encryption mode
Tadayoshi Kohno, John Viega, Doug Whiting
Tadayoshi Kohno, John Viega, Doug Whiting
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
Helger Lipmaa
Helger Lipmaa
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin
Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin
Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
Zhongliang Chen
Zhongliang Chen
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
J. Hughes, A. Tannenbaum
J. Hughes, A. Tannenbaum
Cryptanalysis of HFE
Ilia Toli
Ilia Toli
Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
Yehuda Lindell
Yehuda Lindell
Algorithms in Braid Groups
Matthew J. Campagna
Matthew J. Campagna
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
Vlastimil Klima, Tomas Rosa
Vlastimil Klima, Tomas Rosa
Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves
Jan Pelzl, Thomas Wollinger, Christof Paar
Jan Pelzl, Thomas Wollinger, Christof Paar
Secure Proxy Signature Schemes for Delegation of Signing Rights
Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi
Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Yevgeniy Dodis, Nelly Fazio
Yevgeniy Dodis, Nelly Fazio
Trace Zero Subvariety for Cryptosystems
Tanja Lange
Tanja Lange
Simple Stateless Steganography
Leonid Reyzin, Scott Russell
Leonid Reyzin, Scott Russell
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
Muxiang Zhang
Muxiang Zhang
Sequential Aggregate Signatures from Trapdoor Permutations
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang
Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang
Efficient Public Key Generation for Multivariate Cryptosystems
Christopher Wolf
Christopher Wolf
Elliptic Curve Point Multiplication
A. G. Rostovtsev, E. B. Makhovenko
A. G. Rostovtsev, E. B. Makhovenko
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
huafei zhu
huafei zhu
On the Selection of Pairing-Friendly Groups
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
A defect of the implementation schemes of the TTM cryptosystem
Jintai Ding, Dieter Schmidt
Jintai Ding, Dieter Schmidt
Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
Jintai Ding, Timonthy Hodges
Jintai Ding, Timonthy Hodges
A Forward-Secure Public-Key Encryption Scheme
Ran Canetti, Shai Halevi, Jonathan Katz
Ran Canetti, Shai Halevi, Jonathan Katz
Stronger Security Bounds for OMAC, TMAC and XCBC
Tetsu Iwata, Kaoru Kurosawa
Tetsu Iwata, Kaoru Kurosawa
Primitive Specification for SOBER-128
Philip Hawkes, Greg Rose
Philip Hawkes, Greg Rose
Non-interactive and Reusable Non-malleable Commitment Schemes
Ivan Damgård, Jens Groth
Ivan Damgård, Jens Groth
Fast arithmetic on Jacobians of Picard curves
Stéphane Flon, Roger Oyono
Stéphane Flon, Roger Oyono
Relation among simulator-based and comparison-based definitions of semantic security
Yodai Watanabe, Junji Shikata
Yodai Watanabe, Junji Shikata
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem
Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
Goldbach’s Conjecture on ECDSA Protocols
N. Vijayarangan, Nitin Agarwal, S. Kasilingam
N. Vijayarangan, Nitin Agarwal, S. Kasilingam
Almost Security of Cryptographic Boolean Functions
Kaoru Kurosawa
Kaoru Kurosawa
Divisible Voting Scheme
Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
Sunder Lal, Amit K Awasthi
Sunder Lal, Amit K Awasthi
Proxy Blind Signature Scheme
Amit K Awasthi, Sunder Lal
Amit K Awasthi, Sunder Lal
How to Protect Against a Militant Spammer
Markus Jakobsson, John Linn, Joy Algesheimer
Markus Jakobsson, John Linn, Joy Algesheimer
A Critique of CCM
P. Rogaway, D. Wagner
P. Rogaway, D. Wagner
EAX: A Conventional Authenticated-Encryption Mode
M. Bellare, P. Rogaway, D. Wagner
M. Bellare, P. Rogaway, D. Wagner
On the Security of Some Proxy Signature Schemes
Hung-Min Sun, Bin-Tsan Hsieh
Hung-Min Sun, Bin-Tsan Hsieh
Forking Lemmas in the Ring Signatures' Scenario
Javier Herranz, Germán Sáez
Javier Herranz, Germán Sáez
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K. C. Reddy
Divya Nalla, K. C. Reddy
Hash Function Balance and its Impact on Birthday Attacks
Mihir Bellare, Tadayoshi Kohno
Mihir Bellare, Tadayoshi Kohno
On the Optimality of Linear, Differential and Sequential Distinguishers
Pascal Junod
Pascal Junod
Initiator-Resilient Universally Composable Key Exchange
Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
Extending Joux's Protocol to Multi Party Key Agreement
Rana Barua, Ratna Dutta, Palash Sarkar
Rana Barua, Ratna Dutta, Palash Sarkar
Hidden Polynomial Cryptosystems
Ilia Toli
Ilia Toli
Isomorphism Classes of Picard Curves over Finite Fields
Jong Won Lee
Jong Won Lee
A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack
Huafei Zhu, Bao Feng, Robert H. Deng
Huafei Zhu, Bao Feng, Robert H. Deng
An Elliptic Curve Trapdoor System
Edlyn Teske
Edlyn Teske
Secure Multiplication of Shared Secrets in the Exponent
Mario Di Raimondo, Rosario Gennaro
Mario Di Raimondo, Rosario Gennaro
Computing of Trust in Distributed Networks
Huafei Zhu, Bao Feng, Robert H. Deng
Huafei Zhu, Bao Feng, Robert H. Deng
A New Approach to Prevent Blackmailing in E-Cash
Xiaofeng Chen, Fangguo Zhang, Yumin Wang
Xiaofeng Chen, Fangguo Zhang, Yumin Wang
ID based Cryptosystems with Pairing on Elliptic Curve
Ryuichi SAKAI, Masao KASAHARA
Ryuichi SAKAI, Masao KASAHARA
Tate-pairing implementations for tripartite key agreement
Iwan Duursma, Hyang-Sook Lee
Iwan Duursma, Hyang-Sook Lee
Attacking RSA-based Sessions in SSL/TLS
Vlastimil Klima, Ondrej Pokorny, Tomas Rosa
Vlastimil Klima, Ondrej Pokorny, Tomas Rosa
How to Predict the Output of a Hardware Random Number Generator
Markus Dichtl
Markus Dichtl
Concealment and its Applications to Authenticated Encryption
Yevgeniy Dodis, Jee Hea An
Yevgeniy Dodis, Jee Hea An
Hidden Number Problem in Small Subgroups
Igor Shparlinski, Arne Winterhof
Igor Shparlinski, Arne Winterhof
Compounding Secret Sharing Schemes
E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme
Masao KASAHARA, Ryuichi SAKAI
Masao KASAHARA, Ryuichi SAKAI
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers
Guilin Wang, Bo Zhu
Guilin Wang, Bo Zhu
An algorithm to obtain an RSA modulus with a large private key
L. Hernández Encinas, J. Muñoz Masqué, A. Queiruga Dios
L. Hernández Encinas, J. Muñoz Masqué, A. Queiruga Dios
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K. C. Reddy
Divya Nalla, K. C. Reddy
Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings
Yevgeniy Dodis, Michael J. Freedman, Shabsi Walfish
Yevgeniy Dodis, Michael J. Freedman, Shabsi Walfish
Timed Fair Exchange of Standard Signatures
Juan A. Garay, Carl Pomerance
Juan A. Garay, Carl Pomerance
A new statistical distinguisher for the shrinking generator
Jovan Dj. Golic, Renato Menicocci
Jovan Dj. Golic, Renato Menicocci
Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function
Kishan Chand Gupta, Palash Sarkar
Kishan Chand Gupta, Palash Sarkar
Torus-based cryptography
Karl Rubin, Alice Silverberg
Karl Rubin, Alice Silverberg
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
Kazukuni Kobara, Hideki Imai
Kazukuni Kobara, Hideki Imai
Strengthening Zero-Knowledge Protocols using Signatures
Juan A. Garay, Philip MacKenzie, Ke Yang
Juan A. Garay, Philip MacKenzie, Ke Yang
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
Jean-Sebastien Coron
Jean-Sebastien Coron
On alternative approach for verifiable secret sharing
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
On the (In)security of the Fiat-Shamir Paradigm
Shafi Goldwasser, Yael Tauman
Shafi Goldwasser, Yael Tauman
Integral Cryptanalysis on reduced-round Safer++
Gilles Piret, Jean-Jacques Quisquater
Gilles Piret, Jean-Jacques Quisquater
A Framework for Password-Based Authenticated Key Exchange
Rosario Gennaro, Yehuda Lindell
Rosario Gennaro, Yehuda Lindell
Cryptographic Tamper Evidence
Gene Itkis
Gene Itkis
Efficient Multi-Party Computation over Rings
Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery
Wenbo Mao, John Malone-Lee
Wenbo Mao, John Malone-Lee
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Mathieu Ciet, Marc Joye
Mathieu Ciet, Marc Joye
Cryptographic Randomized Response Techniques
Andris Ambainis, Markus Jakobsson, Helger Lipmaa
Andris Ambainis, Markus Jakobsson, Helger Lipmaa
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)
Jan Pelzl, Thomas Wollinger, Jorge Guajardo, Christof Paar
Jan Pelzl, Thomas Wollinger, Jorge Guajardo, Christof Paar
Homomorphic public-key cryptosystems and encrypting boolean circuits
D. Grigoriev., I. Ponomarenko
D. Grigoriev., I. Ponomarenko
On Modeling IND-CCA Security in Cryptographic Protocols
Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
New identity based signcryption schemes from pairings
Benoît Libert, Jean-Jacques Quisquater
Benoît Libert, Jean-Jacques Quisquater
Did Filiol Break AES ?
Nicolas T. Courtois, Robert T. Johnson, Pascal Junod, Thomas Pornin, Michael Scott
Nicolas T. Courtois, Robert T. Johnson, Pascal Junod, Thomas Pornin, Michael Scott
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions
Edith Elkind, Helger Lipmaa
Edith Elkind, Helger Lipmaa
Attacks based on Conditional Correlations against the Nonlinear Filter Generator
Bernhard Löhlein
Bernhard Löhlein
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
Jung Hee Cheon, Byungheup Jun
Jung Hee Cheon, Byungheup Jun
An Authenticated Group Key Agreement Protocol on Braid groups
HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
Perfect Hash Families with Few Functions
Simon R. Blackburn
Simon R. Blackburn
A Threshold GQ Signature Scheme
Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng
Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng
A Universally Composable Cryptographic Library
Michael Backes, Birgit Pfitzmann, Michael Waidner
Michael Backes, Birgit Pfitzmann, Michael Waidner
Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation
Palash Sarkar
Palash Sarkar
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
Colin D. Walter
Colin D. Walter
The number of initial states of the RC4 cipher with the same cycle structure
Marina Pudovkina
Marina Pudovkina
Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
Fangguo Zhang, Kwangjo Kim
Fangguo Zhang, Kwangjo Kim
Differential Fault Analysis on A.E.S.
P. Dusart, G. Letourneux, O. Vivolo
P. Dusart, G. Letourneux, O. Vivolo
Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
Palash Sarkar
Palash Sarkar
DFA on AES
Christophe Giraud
Christophe Giraud
A Price Negotiable Transaction System
Huafei Zhu
Huafei Zhu
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case
Ventzislav Nikov, Svetla Nikova, Bart Preneel
Ventzislav Nikov, Svetla Nikova, Bart Preneel
Distributing the Encryption and Decryption of a Block Cipher
Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
ID-based tripartite Authenticated Key Agreement Protocols from pairings
Divya Nalla, K. C. Reddy
Divya Nalla, K. C. Reddy
Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case
Eric FILIOL
Eric FILIOL
Imperfect Decryption and an Attack on the NTRU Encryption Scheme
John Proos
John Proos
A Mode of Operation with Partial Encryption and Message Integrity
Philip Hawkes, Gregory G. Rose
Philip Hawkes, Gregory G. Rose
An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes
H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen, P. Tuyls
H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen, P. Tuyls
A polarisation based Visual Crypto System and its Secret Sharing Schemes
P. Tuyls, H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen
P. Tuyls, H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen
A Note on Ideal Tripartite Access Structures
Michael J. Collins
Michael J. Collins
Security Proofs for an Efficient Password-Based Key Exchange
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
A Linearization Attack on the Bluetooth Key Stream Generator
Frederik Armknecht
Frederik Armknecht
Parallelizable Authentication Trees
Eric Hall, Charanjit S. Jutla
Eric Hall, Charanjit S. Jutla
Bit-Slice Auction Circuit
Kaoru Kurosawa, Wakaha Ogata
Kaoru Kurosawa, Wakaha Ogata
Key recovery attacks on NTRU without ciphertext validation routine
Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
Entity Authentication Schemes Using Braid Word Reduction
Hervé SIBERT, Patrick DEHORNOY, Marc GIRAULT
Hervé SIBERT, Patrick DEHORNOY, Marc GIRAULT
Zero-Knowledge twenty years after its invention
Oded Goldreich
Oded Goldreich
Turing, a fast stream cipher
Greg Rose, Philip Hawkes
Greg Rose, Philip Hawkes
Identity Based Authenticated Key Agreement Protocols from Pairings
Liqun Chen, Caroline Kudla
Liqun Chen, Caroline Kudla
Simple backdoors to RSA key generation
Claude Crépeau, Alain Slakmon
Claude Crépeau, Alain Slakmon
Oblivious Keyword Search
Wakaha Ogata, Kaoru Kurosawa
Wakaha Ogata, Kaoru Kurosawa
Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields
Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi
Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi
OMAC: One-Key CBC MAC
Tetsu Iwata, Kaoru Kurosawa
Tetsu Iwata, Kaoru Kurosawa
Parallel Algorithm for Multiplication on Elliptic Curves
Juan Manuel Garcia Garcia, Rolando Menchaca Garcia
Juan Manuel Garcia Garcia, Rolando Menchaca Garcia
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)
Fangguo Zhang, Shengli Liu, Kwangjo Kim
Fangguo Zhang, Shengli Liu, Kwangjo Kim
two attacks on xia-you Group Signature
Jianhong Zhang, Jilin Wang, Yumin Wang
Jianhong Zhang, Jilin Wang, Yumin Wang
Theoretical Analysis of ``Correlations in RC6''
Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
A Designer's Guide to KEMs
Alexander W. Dent
Alexander W. Dent
Efficient Group Signatures without Trapdoors
Giuseppe Ateniese, Breno de Medeiros
Giuseppe Ateniese, Breno de Medeiros
PECDSA. How to build a DL-based digital signature scheme with the best proven security
Louis Granboulan
Louis Granboulan
Statistical weaknesses in the alleged RC4 keystream generator
Marina Pudovkina
Marina Pudovkina
An Analysis of RMAC
Jack Lloyd
Jack Lloyd
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
D. Page
D. Page
New Signature Scheme Using Conjugacy Problem
Ki Hyoung Ko, Doo Ho Choi, Mi Sung Cho, Jang Won Lee
Ki Hyoung Ko, Doo Ho Choi, Mi Sung Cho, Jang Won Lee
Cryptanalysis of Two New Signature Schemes
Fangguo Zhang, Kwangjo Kim
Fangguo Zhang, Kwangjo Kim
Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms
Ho-Kyu Lee, Hyang-Sook Lee, Young-Ran Lee
Ho-Kyu Lee, Hyang-Sook Lee, Young-Ran Lee
Coercion-Resistant Electronic Elections
Ari Juels, Dario Catalano, Markus Jakobsson
Ari Juels, Dario Catalano, Markus Jakobsson
Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
Mike Scott
Mike Scott
Man-in-the-Middle in Tunnelled Authentication Protocols
N. Asokan, Valtteri Niemi, Kaisa Nyberg
N. Asokan, Valtteri Niemi, Kaisa Nyberg
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
Salil P. Vadhan
Salil P. Vadhan
Practical Verifiable Encryption and Decryption of Discrete Logarithms
Jan Camenisch, Victor Shoup
Jan Camenisch, Victor Shoup
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Matt Blaze
Matt Blaze
Related-Key and Key-Collision Attacks Against RMAC
Tadayoshi Kohno
Tadayoshi Kohno
The Book of Rijndaels
Elad Barkan, Eli Biham
Elad Barkan, Eli Biham
In How Many Ways Can You Write Rijndael?
Elad Barkan, Eli Biham
Elad Barkan, Eli Biham
Validating Digital Signatures without Time-Stamping and Certificate Revocation
Jianying Zhou, Feng Bao, Robert Deng
Jianying Zhou, Feng Bao, Robert Deng
Secure Bilinear Diffie-Hellman Bits
Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
On multi-exponentiation in cryptography
Roberto M. Avanzi
Roberto M. Avanzi
Weighted Coordinates on Genus 2 Hyperelliptic Curves
Tanja Lange
Tanja Lange
A note on Weak Keys of PES, IDEA and some Extended Variants
Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
Selective disclosure credential sets
Jason E. Holt, Kent E. Seamons
Jason E. Holt, Kent E. Seamons
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
Guilin Wang, Jianying Zhou, Robert H. Deng
Guilin Wang, Jianying Zhou, Robert H. Deng
About Filliol's Observations on DES, AES and Hash Functions (draft)
Nicolas T. Courtois
Nicolas T. Courtois
The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)
Phillip Rogaway
Phillip Rogaway
Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
Tanja Lange
Tanja Lange
Bauer-Berson-Feiertag attack revisited
Jun-Bum Shin, Kwang H. Lee
Jun-Bum Shin, Kwang H. Lee
Cryptanalysis of MQV with partially known nonces
P. J. Leadbitter, N. P. Smart
P. J. Leadbitter, N. P. Smart
On Some Algebraic Structures in the AES Round Function
A. M. Youssef, S. E. Tavares
A. M. Youssef, S. E. Tavares
An Attack on the Isomorphisms of Polynomials Problem with One Secret
Willi Geiselmann, Willi Meier, Rainer Steinwandt
Willi Geiselmann, Willi Meier, Rainer Steinwandt
On the Applicability of Distinguishing Attacks Against Stream Ciphers
Greg Rose, Philip Hawkes
Greg Rose, Philip Hawkes
Applying General Access Structure to Proactive Secret Sharing Schemes
Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
Universally Composable Two-Party and Multi-Party Secure Computation
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai
Reaction Attacks on Public Key Cryptosystems Based on the Word Problem
Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Maria Isabel Gonzalez Vasco, Rainer Steinwandt
On the Security of HFE, HFEv- and Quartz
Nicolas T. Courtois, Magnus Daum, Patrick Felke
Nicolas T. Courtois, Magnus Daum, Patrick Felke
Provably Secure Steganography
Nicholas J. Hopper, John Langford, Luis von Ahn
Nicholas J. Hopper, John Langford, Luis von Ahn
Practical Non-Interactive Key Distribution Based on Pairings
Régis Dupont, Andreas Enge
Régis Dupont, Andreas Enge
Folklore, Practice and Theory of Robust Combiners
Amir Herzberg
Amir Herzberg
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
Efficient Construction of (Distributed) Verifiable Random Functions
Yevgeniy Dodis
Yevgeniy Dodis
Tight Lower Bound on Linear Authenticated Encryption
Charanjit S. Jutla
Charanjit S. Jutla
An Improved Pseudorandom Generator Based on Hardness of Factoring
Nenad Dedic, Leonid Reyzin, Salil Vadhan
Nenad Dedic, Leonid Reyzin, Salil Vadhan
OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives
Kazukuni Kobara, Hideki Imai
Kazukuni Kobara, Hideki Imai
Key-collisions in (EC)DSA: Attacking Non-repudiation
Tomas Rosa
Tomas Rosa
Perfectly Secure Message Transmission Revisited
Yvo Desmedt, Yongge Wang
Yvo Desmedt, Yongge Wang
Power of a Public Random Permutation and its Application to Authenticated-Encryption
Kaoru Kurosawa
Kaoru Kurosawa
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
Ahmad-Reza Sadeghi, Michael Steiner
Ahmad-Reza Sadeghi, Michael Steiner
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
Olivier Billet, Marc Joye
Olivier Billet, Marc Joye
On Optimal Hash Tree Traversal for Interval Time-Stamping
Helger Lipmaa
Helger Lipmaa
New covering radius of Reed-Muller codes for $t$-resilient functions
Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara
Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
Fangguo Zhang, Shengli Liu, Kwangjo Kim
Fangguo Zhang, Shengli Liu, Kwangjo Kim
Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae
Tanja Lange
Tanja Lange
Security Analysis of IKE's Signature-based Key-Exchange Protocol
Ran Canetti, Hugo Krawczyk
Ran Canetti, Hugo Krawczyk
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes
Bodo Möller
Bodo Möller
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme
Alexandra Boldyreva
Alexandra Boldyreva
Diffie-Hellman Problems and Bilinear Maps
Jung Hee Cheon, Dong Hoon Lee
Jung Hee Cheon, Dong Hoon Lee
How to convert any ID-based Signature Schemes
Claude Castelluccia
Claude Castelluccia
Universal Padding Schemes for RSA
Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three
N. P. Smart, J. Westwood
N. P. Smart, J. Westwood
A Note on the Bilinear Diffie-Hellman Assumption
Yacov Yacobi
Yacov Yacobi
An Efficient Procedure to Double and Add Points on an Elliptic Curve
Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
On Linear Redundancy in the AES S-Box
Joanne Fuller, William Millan
Joanne Fuller, William Millan
The GGM Construction does NOT yield Correlation Intractable Function Ensembles
Oded Goldreich
Oded Goldreich
A New Class of Unsafe Primes
Qi Cheng
Qi Cheng
Clock-Controlled Alternating Step Generator
Ali Adel Kanso
Ali Adel Kanso
Efficient Arithmetic on Hyperelliptic Curves
Tanja Lange
Tanja Lange
Secret sharing schemes on access structures with intersection number equal to one
Jaume Marti-Farre, Carles Padro
Jaume Marti-Farre, Carles Padro
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
Jan Denef, Frederik Vercauteren
Jan Denef, Frederik Vercauteren
Forward-Secure Signatures with Fast Key Update
Anton Kozlov, Leonid Reyzin
Anton Kozlov, Leonid Reyzin
On the Power of Claw-Free Permutations
Yevgeniy Dodis, Leonid Reyzin
Yevgeniy Dodis, Leonid Reyzin
Applying General Access Structure to Metering Schemes
Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property
Simon R. Blackburn
Simon R. Blackburn
Encryption-Scheme Security in the Presence of Key-Dependent Messages
J. Black, P. Rogaway, T. Shrimpton
J. Black, P. Rogaway, T. Shrimpton
A New Statistical Testing for Symmetric Ciphers and Hash Functions
Eric Filiol
Eric Filiol
Identity-Based Signcryption
John Malone-Lee
John Malone-Lee
A new public key encryption scheme provably secure against adaptive chosen cipher-text attack
Huafei Zhu
Huafei Zhu
Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank
James Xiao, Yongxin Zhou
James Xiao, Yongxin Zhou
The (a, b)-Shrinking Generator
Ali Adel Kanso
Ali Adel Kanso
Building curves with arbitrary small MOV degree over finite prime fields
R. Dupont, A. Enge, F. Morain
R. Dupont, A. Enge, F. Morain
A Fuzzy Vault Scheme
Ari Juels, Madhu Sudan
Ari Juels, Madhu Sudan
TMAC: Two-Key CBC MAC
Kaoru Kurosawa, Tetsu Iwata
Kaoru Kurosawa, Tetsu Iwata
Multiplicative Masking and Power Analysis of AES
Jovan Dj. Golić
Jovan Dj. Golić
Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol
Daniele Micciancio, Erez Petrank
Daniele Micciancio, Erez Petrank
On Chosen Ciphertext Security of Multiple Encryptions
Oded Goldreich, Yoad Lustig, Moni Naor
Oded Goldreich, Yoad Lustig, Moni Naor
Constructing Elliptic Curves with Prescribed Embedding Degrees
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
Nicolas T. Courtois
Nicolas T. Courtois
Adapting the weaknesses of the Random Oracle model to the Generic Group model.
Alexander W. Dent
Alexander W. Dent
Efficient and Player-Optimal Strong Consensus
Matthias Fitzi, Juan A. Garay
Matthias Fitzi, Juan A. Garay
Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer
Amir Herzberg
Amir Herzberg
A semantically secure elliptic curve RSA scheme with small expansion factor
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
Authentication of Quantum Messages
Howard Barnum, Claude Crepeau, Daniel Gottesman, Adam Smith, Alain Tapp
Howard Barnum, Claude Crepeau, Daniel Gottesman, Adam Smith, Alain Tapp
Some Applications of Threshold Signature Schemes to Distributed Protocols
Vanesa Daza, Javier Herranz, Germán Sáez
Vanesa Daza, Javier Herranz, Germán Sáez
Applications of Multilinear Forms to Cryptography
Dan Boneh, Alice Silverberg
Dan Boneh, Alice Silverberg
On the efficiency of the Clock Control Guessing Attack
Erik Zenner
Erik Zenner
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
Key-Insulated Public-Key Cryptosystems
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP
Vlastimil Klima, Tomas Rosa
Vlastimil Klima, Tomas Rosa
Fault based cryptanalysis of the Advanced Encryption Standard
J. Blöemer, J. -P. Seifert
J. Blöemer, J. -P. Seifert
How to repair ESIGN
Louis Granboulan
Louis Granboulan
Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures
C. Aumüller, P. Bier, P. Hofreiter, W. Fischer, J. -P. Seifert
C. Aumüller, P. Bier, P. Hofreiter, W. Fischer, J. -P. Seifert
Authenticated Identity-Based Encryption
Ben Lynn
Ben Lynn
Further Results and Considerations on Side Channel Attacks on RSA
Vlastimil Klima, Tomas Rosa
Vlastimil Klima, Tomas Rosa
Weak Keys in MST1
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
A Distributed and Computationally Secure Key Distribution Scheme
Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
Improved key recovery of level 1 of the Bluetooth Encryption System
Scott Fluhrer
Scott Fluhrer
(Not So) Random Shuffles of RC4
Ilya Mironov
Ilya Mironov
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
John Black, Phillip Rogaway, Thomas Shrimpton
John Black, Phillip Rogaway, Thomas Shrimpton
Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization
Chanathip Namprempre
Chanathip Namprempre
Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold
Mihir Bellare, Adriana Palacio
Mihir Bellare, Adriana Palacio
On some Attacks on Multi-prime RSA
M Jason Hinek, Mo King Low, Edlyn Teske
M Jason Hinek, Mo King Low, Edlyn Teske
ABC - A Block Cipher
Dieter Schmidt
Dieter Schmidt
Strengthened Encryption in the CBC Mode
Vlastimil Klima, Tomas Rosa
Vlastimil Klima, Tomas Rosa
A Forward-Secure Public-Key Encryption Scheme
Jonathan Katz
Jonathan Katz
Universally Composable Notions of Key Exchange and Secure Channels
Ran Canetti, Hugo Krawczyk
Ran Canetti, Hugo Krawczyk
Construction of UOWHF: Tree Hashing Revisited
Palash Sarkar
Palash Sarkar
A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
Yehuda Lindell
Yehuda Lindell
Hierarchical ID-Based Cryptography
Craig Gentry, Alice Silverberg
Craig Gentry, Alice Silverberg
Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity
Manoj Prabhakaran, Amit Sahai
Manoj Prabhakaran, Amit Sahai
SiBIR: Signer-Base Intrusion-Resilient Signatures
Gene Itkis, Leonid Reyzin
Gene Itkis, Leonid Reyzin
Extended Validity and Consistency in Byzantine Agreement
Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order
Stefan Lucks
Stefan Lucks
Fully Distributed Proxy Signature Schemes
Javier Herranz, Germán Sáez
Javier Herranz, Germán Sáez
Secret sharing schemes with three or four minimal qualified subsets
Jaume Martí-Farré, Carles Padró
Jaume Martí-Farré, Carles Padró
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
Alexander Kholosha, Henk C. A. van Tilborg
Alexander Kholosha, Henk C. A. van Tilborg
Towards a Uniform Description of Several Group Based Cryptographic Primitives
Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
Universal Composition with Joint State
Ran Canetti, Tal Rabin
Ran Canetti, Tal Rabin
On the Security of Joint Signature and Encryption
Jee Hea An, Yevgeniy Dodis, Tal Rabin
Jee Hea An, Yevgeniy Dodis, Tal Rabin
Cryptanalysis of S-DES
Dr. K. S. Ooi, Brain Chin Vito
Dr. K. S. Ooi, Brain Chin Vito
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Nicolas Courtois, Josef Pieprzyk
Nicolas Courtois, Josef Pieprzyk
Strict Polynomial-time in Simulation and Extraction
Boaz Barak, Yehuda Lindell
Boaz Barak, Yehuda Lindell
A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack
Edith Elkind, Amit Sahai
Edith Elkind, Amit Sahai
New Results on Boomerang and Rectangle Attack
Eli Biham, Orr Dunkelman, Nathan Keller
Eli Biham, Orr Dunkelman, Nathan Keller
Secure Computation Without Agreement
Shafi Goldwasser, Yehuda Lindell
Shafi Goldwasser, Yehuda Lindell
Partial Key Escrow Monitoring Scheme
Jiang Shaoquan, Zhang Yufeng
Jiang Shaoquan, Zhang Yufeng
A Distributed RSA Signature Scheme for General Access Structures
Javier Herranz, Carles Padró, Germán Sáez
Javier Herranz, Carles Padró, Germán Sáez
An efficient semantically secure elliptic curve cryptosystem based on KMOV
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
Ronald Cramer, Serge Fehr
Ronald Cramer, Serge Fehr
Tripartite Authenticated Key Agreement Protocols from Pairings
Sattam S. Al-Riyami, Kenneth G. Paterson
Sattam S. Al-Riyami, Kenneth G. Paterson
An OAEP Variant With a Tight Security Proof
Jakob Jonsson
Jakob Jonsson
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
Yodai Watanabe, Junji Shikata, Hideki Imai
Yodai Watanabe, Junji Shikata, Hideki Imai
Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields
Y. Choie, E. Jeong, E. Lee
Y. Choie, E. Jeong, E. Lee
A Parallelizable Design Principle for Cryptographic Hash Functions
Palash Sarkar, Paul J. Schellenberg
Palash Sarkar, Paul J. Schellenberg
Adaptive chi-square test and its application to some cryptographic problems.
Boris Ryabko
Boris Ryabko
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
Joy Algesheimer, Jan Camenisch, Victor Shoup
Joy Algesheimer, Jan Camenisch, Victor Shoup
A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack
Jung Hee Cheon
Jung Hee Cheon
Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications
Jonathan Katz
Jonathan Katz
Generic Groups, Collision Resistance, and ECDSA
Daniel R. L. Brown
Daniel R. L. Brown
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking
Markus Jakobsson, Ari Juels, Ron Rivest
Markus Jakobsson, Ari Juels, Ron Rivest
Timed Release of Standard Digital Signatures
Juan Garay, Markus Jakobsson
Juan Garay, Markus Jakobsson
Almost Optimal Hash Sequence Traversal
Don Coppersmith, Markus Jakobsson
Don Coppersmith, Markus Jakobsson
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
Spectral Analysis of Boolean Functions under Non-uniformity of Arguments
Kanstantsin Miranovich
Kanstantsin Miranovich
Cryptanalysis of stream ciphers with linear masking
Don Coppersmith, Shai Halevi, Charanjit Jutla
Don Coppersmith, Shai Halevi, Charanjit Jutla
Scream: a software-efficient stream cipher
Shai Halevi, Don Coppersmith, Charanjit Jutla
Shai Halevi, Don Coppersmith, Charanjit Jutla
An Identity-Based Signature from Gap Diffie-Hellman Groups
Jae Choon Cha, Jung Hee Cheon
Jae Choon Cha, Jung Hee Cheon
The Cramer-Shoup Strong-RSA Signature Scheme Revisited
Marc Fischlin
Marc Fischlin
Content Extraction Signatures
Ron Steinfeld, Laurence Bull, Yuliang Zheng
Ron Steinfeld, Laurence Bull, Yuliang Zheng
Security proofs of cryptographic protocols
Eva Jencusova
Eva Jencusova
Better than BiBa: Short One-time Signatures with Fast Signing and Verifying
Leonid Reyzin, Natan Reyzin
Leonid Reyzin, Natan Reyzin
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
Ivan Damgard, Maciej Koprowski
Ivan Damgard, Maciej Koprowski
Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings
F. Hess
F. Hess
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages
Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
Cut and Paste Attacks with Java
Serge Lefranc, David Naccache
Serge Lefranc, David Naccache
Tree-based Group Key Agreement
Yongdae Kim, Adrian Perrig, Gene Tsudik
Yongdae Kim, Adrian Perrig, Gene Tsudik
Efficient Algorithms for Pairing-Based Cryptosystems
Paulo S. L. M. Barreto, Hae Y. Kim, Ben Lynn, Michael Scott
Paulo S. L. M. Barreto, Hae Y. Kim, Ben Lynn, Michael Scott
Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert
Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert
The best and worst of supersingular abelian varieties in cryptology
Karl Rubin, Alice Silverberg
Karl Rubin, Alice Silverberg
Cryptanalysis of Stream Cipher COS (2,128) Mode I
Hongjun Wu, Feng Bao
Hongjun Wu, Feng Bao
ID-based Signatures from Pairings on Elliptic Curves
Kenneth G. Paterson
Kenneth G. Paterson
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
Evaluating Security of Voting Schemes in the Universal Composability Framework
Jens Groth
Jens Groth
Fractal Hash Sequence Representation and Traversal
Markus Jakobsson
Markus Jakobsson
Efficient Revocation of Anonymous Group Membership
Jan Camenisch, Anna Lysyanskaya
Jan Camenisch, Anna Lysyanskaya
A Proposal for an ISO Standard for Public Key Encryption
Victor Shoup
Victor Shoup
An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
N. P. Smart
N. P. Smart
RSA hybrid encryption schemes
Louis Granboulan
Louis Granboulan
New Notions of Soundness and Simultaneous Resettability in the Public-Key Model
Yunlei ZHAO
Yunlei ZHAO
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
Ronald Cramer, Victor Shoup
Ronald Cramer, Victor Shoup
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
Yehuda Lindell
Yehuda Lindell
Cryptanalysis of the COS (2,128) Stream Ciphers
Steve Babbage
Steve Babbage
Universal Arguments and their Applications
Boaz Barak, Oded Goldreich
Boaz Barak, Oded Goldreich
Concurrent Zero-Knowledge With Timing, Revisited
Oded Goldreich
Oded Goldreich
Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems
Antonio Bellezza
Antonio Bellezza
An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates
Ivan Damgård, Gudmund Frandsen
Ivan Damgård, Gudmund Frandsen
Quasi-Efficient Revocation of Group Signatures
Giuseppe Ateniese, Dawn Song, Gene Tsudik
Giuseppe Ateniese, Dawn Song, Gene Tsudik
A Note on Girault's Self-Certified Model
Shahrokh Saeednia
Shahrokh Saeednia
Linear Code Implies Public-Key Traitor Tracing
Kaoru Kurosawa, Takuya Yoshida
Kaoru Kurosawa, Takuya Yoshida
Fast hashing onto elliptic curves over fields of characteristic 3
Paulo S. L. M. Barreto, Hae Yong Kim
Paulo S. L. M. Barreto, Hae Yong Kim
An Efficient MAC for Short Messages
Sarvar Patel
Sarvar Patel
Constructing elliptic curves with a given number of points over a finite field
Amod Agashe, Kristin Lauter, Ramarathnam Venkatesan
Amod Agashe, Kristin Lauter, Ramarathnam Venkatesan
Secure Vickrey Auctions without Threshold Trust
Helger Lipmaa, N. Asokan, Valtteri Niemi
Helger Lipmaa, N. Asokan, Valtteri Niemi
Slope packings and coverings, and generic algorithms for the discrete logarithm problem
M. Chateauneuf, A. C. H. Ling, D. R. Stinson
M. Chateauneuf, A. C. H. Ling, D. R. Stinson
Threshold Cryptosystems Based on Factoring
Jonathan Katz, Moti Yung
Jonathan Katz, Moti Yung
BDD-based Cryptanalysis of Keystream Generators
Matthias Krause
Matthias Krause
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
Ivan Damgård, Jesper B. Nielsen
Ivan Damgård, Jesper B. Nielsen
Identity Based Encryption From the Weil Pairing
Dan Boneh, Matthew Franklin
Dan Boneh, Matthew Franklin
Linear broadcast encryption schemes
Carles Padró, Ignacio Gracia, Sebastià Martín, Paz Morillo
Carles Padró, Ignacio Gracia, Sebastià Martín, Paz Morillo
Improving the trade-off between storage and communication in broadcast encryption schemes
Ignacio Gracia, Sebastià Martín, Carles Padró
Ignacio Gracia, Sebastià Martín, Carles Padró
A Linear Algebraic Approach to Metering Schemes
C. Blundo, S. Martìn, B. Masucci, C. Padrò
C. Blundo, S. Martìn, B. Masucci, C. Padrò
Statistical Zero-Knowledge Proofs from Diophantine Equations
Helger Lipmaa
Helger Lipmaa
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Ronald Cramer, Victor Shoup
Ronald Cramer, Victor Shoup
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
Markus Maurer, Alfred Menezes, Edlyn Teske
Markus Maurer, Alfred Menezes, Edlyn Teske
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
Maria Fedorova, Yuriy Tarannikov
Maria Fedorova, Yuriy Tarannikov
A Description of Protocols for Private Credentials
Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic
Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic
A Sufficient Condition for Secure Ping--Pong Protocols
Masao Mori
Masao Mori
COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers
Eric Filiol, Caroline Fontaine
Eric Filiol, Caroline Fontaine
Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses
Jee Hea An
Jee Hea An
The COS Stream Ciphers are Extremely Weak
Steve Babbage
Steve Babbage
A Time-Memory Tradeoff Attack Against LILI-128
Markku-Juhani Olavi Saarinen
Markku-Juhani Olavi Saarinen
Communication Complexity and Secure Function Evaluation
Moni Naor, Kobbi Nissim
Moni Naor, Kobbi Nissim
Pseudo-Random Functions and Factoring
Moni Naor, Omer Reingold, Alon Rosen
Moni Naor, Omer Reingold, Alon Rosen
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction
Eliane Jaulmes, Antoine Joux, Frederic Valette
Eliane Jaulmes, Antoine Joux, Frederic Valette
Efficient oblivious transfer schemes
Wen-Guey Tzeng
Wen-Guey Tzeng
On the Goubin-Courtois Attack on TTM
T. Moh, Jiun-Ming Chen
T. Moh, Jiun-Ming Chen
Multi-Recipient Public-Key Encryption with Shortened Ciphertext
Kaoru Kurosawa
Kaoru Kurosawa
Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract)
Kenji Ohkuma, Hideo Shimizu, Fumihiko Sano, Shinichi Kawamura
Kenji Ohkuma, Hideo Shimizu, Fumihiko Sano, Shinichi Kawamura
On the (Im)possibility of Obfuscating Programs
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
J. Nakahara Jr, P. S. L. M. Barreto, B. Preneel, J. Vandewalle, H. Y. Kim
J. Nakahara Jr, P. S. L. M. Barreto, B. Preneel, J. Vandewalle, H. Y. Kim
An Attack on A Traitor Tracing Scheme
Jeff Jianxin Yan, Yongdong Wu
Jeff Jianxin Yan, Yongdong Wu
IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS
SEONG-HUN PAENG, DAESUNG KWON, KIL-CHAN HA, JAE HEON KIM
SEONG-HUN PAENG, DAESUNG KWON, KIL-CHAN HA, JAE HEON KIM
Analysis of chosen plaintext attacks on the WAKE Stream Cipher
Marina Pudovkina
Marina Pudovkina
An Integer Commitment Scheme based on Groups with Hidden Order
Ivan Damgard, Eiichiro Fujisaki
Ivan Damgard, Eiichiro Fujisaki
Resettably-Sound Zero-Knowledge and its Applications
Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell
Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell
Optimal security proofs for PSS and other signature schemes
Jean-Sébastien Coron
Jean-Sébastien Coron
Clock-Controlled Shift Registers for Key-Stream Generation
Alexander Kholosha
Alexander Kholosha
The Security of Practical Two-Party RSA Signature Schemes
Mihir Bellare, Ravi Sandhu
Mihir Bellare, Ravi Sandhu
Revocation and Tracing Schemes for Stateless Receivers
Dalit Naor, Moni Naor, Jeff Lotspiech
Dalit Naor, Moni Naor, Jeff Lotspiech
Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank
Nicolas T. Courtois
Nicolas T. Courtois
On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
Philip MacKenzie
Philip MacKenzie
On the Complexity of Matsui's Attack
P. Junod
P. Junod
Universally Composable Commitments
Ran Canetti, Marc Fischlin
Ran Canetti, Marc Fischlin
Extending the GHS Weil Descent Attack
S. D. Galbraith, F. Hess, N. P. Smart
S. D. Galbraith, F. Hess, N. P. Smart
Security Proofs for the RSA-PSS Signature Scheme and Its Variants
Jakob Jonsson
Jakob Jonsson
Differential Probability of Modular Addition with a Constant Operand
Alexis Warner Machado
Alexis Warner Machado
Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds
Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
Elliptic curve Paillier schemes
Steven D Galbraith
Steven D Galbraith
A known plaintext attack on the ISAAC keystream generator
Marina Pudovkina
Marina Pudovkina
Forward-Secure Signatures with Optimal Signing and Verifying
Gene Itkis, Leonid Reyzin
Gene Itkis, Leonid Reyzin
ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM
T. MOH
T. MOH
The simple ideal cipher system
Boris Ryabko
Boris Ryabko
The order of encryption and authentication for protecting communications (Or: how secure is SSL?)
Hugo Krawczyk
Hugo Krawczyk
Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds
Birgit Baum-Waidner
Birgit Baum-Waidner
Cryptanalysis of the Vesta-2M Stream Cipher
Marina Pudovkina
Marina Pudovkina
Simple Forward-Secure Signatures From Any Signature Scheme
Hugo Krawczyk
Hugo Krawczyk
Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent
Michael Jacobson, Alfred Menezes, Andreas Stein
Michael Jacobson, Alfred Menezes, Andreas Stein
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Ran Canetti, Hugo Krawczyk
Ran Canetti, Hugo Krawczyk
Robust Software Tokens: Towards Securing a Digital Identity
Taekyoung Kwon
Taekyoung Kwon
Flaws in differential cryptanalysis of Skipjack
Louis Granboulan
Louis Granboulan
EMpowering Side-Channel Attacks
Josyula R. Rao, Pankaj Rohatgi
Josyula R. Rao, Pankaj Rohatgi
Anti-persistence: History Independent Data Structures
Moni Naor, Vanessa Teague
Moni Naor, Vanessa Teague
Forward-Security in Private-Key Cryptography
Mihir Bellare, Bennet Yee
Mihir Bellare, Bennet Yee
Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures
Tal Malkin, Daniele Micciancio, Sara Miner
Tal Malkin, Daniele Micciancio, Sara Miner
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs
Liam Keliher, Henk Meijer, Stafford Tavares
Liam Keliher, Henk Meijer, Stafford Tavares
Efficient and Non-Interactive Non-Malleable Commitment
Giovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam Smith
Giovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam Smith
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
Jonathan Katz, Rafail Ostrovsky, Moti Yung
Jonathan Katz, Rafail Ostrovsky, Moti Yung
On the Power of Nonlinear Secret-Sharing
Amos Beimel, Yuval Ishai
Amos Beimel, Yuval Ishai
On multivariate signature-only public key cryptosystems
Nicolas T. Courtois
Nicolas T. Courtois
Efficient Encryption for Rich Message Spaces Under General Assumptions
Alexander Russell, Hong Wang
Alexander Russell, Hong Wang
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
John Black, Phillip Rogaway
John Black, Phillip Rogaway
OCB Mode
Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
Cryptanalysis of some elliptic curve based cryptosystems of Paillier
Steven D. Galbraith
Steven D. Galbraith
Secure Multiparty Computation of Approximations
Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
Robustness for Free in Unconditional Multi-Party Computation
Martin Hirt, Ueli Maurer
Martin Hirt, Ueli Maurer
Optimistic Asynchronous Atomic Broadcast
Klaus Kursawe, Victor Shoup
Klaus Kursawe, Victor Shoup
The Rectangle Attack - Rectangling the Serpent
Biham Eli, Orr Dunkelman, Nathan Keller
Biham Eli, Orr Dunkelman, Nathan Keller
Some observations on the theory of cryptographic hash functions
D. R. Stinson
D. R. Stinson
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
Jan Camenisch, Anna Lysyanskaya
Jan Camenisch, Anna Lysyanskaya
Analysis of a Subset Sum Randomizer
Peter Gemmell, Anna Johnston
Peter Gemmell, Anna Johnston
On adaptive vs. non-adaptive security of multiparty protocols
Ran Canetti, Ivan Damgard, Stefan Dziembowski, Yuval Ishai, Tal Malkin
Ran Canetti, Ivan Damgard, Stefan Dziembowski, Yuval Ishai, Tal Malkin
Efficient Traitor Tracing Algorithms using List Decoding
Alice Silverberg, Jessica Staddon, Judy Walker
Alice Silverberg, Jessica Staddon, Judy Walker
An observation regarding Jutla's modes of operation
Shai Halevi
Shai Halevi
Timed-Release Cryptography
Wenbo Mao
Wenbo Mao
Digitally Watermarking RSA Moduli
Anna M. Johnston
Anna M. Johnston
Ciphers with Arbitrary Finite Domains
John Black, Phillip Rogaway
John Black, Phillip Rogaway
New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation
Wenbo Mao
Wenbo Mao
How to achieve a McEliece-based Digital Signature Scheme
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier
Robust key-evolving public key encryption schemes
Wen-Guey Tzeng, Zhi-Jia Tzeng
Wen-Guey Tzeng, Zhi-Jia Tzeng
Fully Distributed Threshold RSA under Standard Assumptions
Pierre-Alain Fouque, Jacques Stern
Pierre-Alain Fouque, Jacques Stern
Are 'Strong' Primes Needed for RSA
Ron Rivest, Robert Silverman
Ron Rivest, Robert Silverman
Secure and Efficient Asynchronous Broadcast Protocols
Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme
Ilya Mironov
Ilya Mironov
MinRank problem and Zero-knowledge authentication
Nicolas T. Courtois
Nicolas T. Courtois
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
Antoine Joux, Kim Nguyen
Antoine Joux, Kim Nguyen
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme
M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko
M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko
Efficient Algorithms for Computing Differential Properties of Addition
Helger Lipmaa, Shiho Moriai
Helger Lipmaa, Shiho Moriai
New constructions of resilient Boolean functions with maximal nonlinearity
Yuriy Tarannikov
Yuriy Tarannikov
A Content Certified E-mail Protocol with a Public Mailbox
Tak-Ming Law
Tak-Ming Law
Universally Composable Security: A New Paradigm for Cryptographic Protocols
Ran Canetti
Ran Canetti
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
Birgit Pfitzmann, Michael Waidner
Birgit Pfitzmann, Michael Waidner
How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes
Masashi Mitomo, Kaoru Kurosawa
Masashi Mitomo, Kaoru Kurosawa
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
Oded Goldreich, Vered Rosen
Oded Goldreich, Vered Rosen
Candidate One-Way Functions Based on Expander Graphs
Oded Goldreich
Oded Goldreich
Non-Deforming Digital Watermarks
Gideon Samid
Gideon Samid
RSA-OAEP is Secure under the RSA Assumption
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
OAEP Reconsidered
Victor Shoup
Victor Shoup
Essential Shannon Security with Keys Smaller Than the Encrypted Message
Gideon Samid
Gideon Samid
Graph-Based Authentication of Digital Streams
Sara Miner, Jessica Staddon
Sara Miner, Jessica Staddon
Session-Key Generation using Human Passwords Only
Oded Goldreich, Yehuda Lindell
Oded Goldreich, Yehuda Lindell
A Complete Problem for Statistical Zero Knowledge
Amit Sahai, Salil Vadhan
Amit Sahai, Salil Vadhan
Multiparty Computation from Threshold Homomorphic Encryption
Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen
Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen
Correlation Immune Boolean Functions with Very High Nonlinearity
Subhamoy Maitra
Subhamoy Maitra
A Construction of Resilient Functions with High Nonlinearity
Thomas Johansson, Enes Pasalic
Thomas Johansson, Enes Pasalic
CRYPTANALYSIS OF THE A5/2 ALGORITHM
Slobodan Petrovic, Amparo Fúster-Sabater
Slobodan Petrovic, Amparo Fúster-Sabater
Reducing the Gate Count of Bitslice DES
Matthew Kwan
Matthew Kwan
Spectral Analysis of High Order Correlation Immune Functions
Yuriy Tarannikov, Denis Kirienko
Yuriy Tarannikov, Denis Kirienko
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
Palash Sarkar
Palash Sarkar
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity
Enes Pasalic, Thomas Johansson, Subhamoy Maitra, Palash Sarkar
Enes Pasalic, Thomas Johansson, Subhamoy Maitra, Palash Sarkar
Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property
Subhamoy Maitra
Subhamoy Maitra
The Saturation Attack - a Bait for Twofish
Stefan Lucks
Stefan Lucks
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions
Ronald Cramer, Ivan Damgård, Philip MacKenzie
Ronald Cramer, Ivan Damgård, Philip MacKenzie
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Victor Boyko, Philip MacKenzie, Sarvar Patel
Victor Boyko, Philip MacKenzie, Sarvar Patel
Constructions and Bounds for Unconditionally Secure Commitment Schemes
C. Blundo, B. Masucci, D. R. Stinson, R. Wei
C. Blundo, B. Masucci, D. R. Stinson, R. Wei
Constructing Pseudo-Random Permutations with a Prescribed Structure
Moni Naor, Omer Reingold
Moni Naor, Omer Reingold
On Symmetrically Private Information Retrieval
Sanjeev Kumar Mishra
Sanjeev Kumar Mishra
Decimation Attack of Stream Ciphers
Eric FILIOL
Eric FILIOL
Encryption Modes with Almost Free Message Integrity
Charanjit S. Jutla
Charanjit S. Jutla
On the Complexity of Verifiable Secret Sharing and Multi-Party Computation
Ronald Cramer, Ivan Damgård, Stefan Dziembowski
Ronald Cramer, Ivan Damgård, Stefan Dziembowski
General Secure Multi-Party Computation from any Linear Secret Sharing Scheme
Ronald Cramer, Ivan Damgård, Ueli Maurer
Ronald Cramer, Ivan Damgård, Ueli Maurer
Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation
Jean-Pierre Seifert
Jean-Pierre Seifert
Electronic Jury Voting Protocols
Alejandro Hevia, Marcos Kiwi
Alejandro Hevia, Marcos Kiwi
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography
Christian Cachin, Klaus Kursawe, Victor Shoup
Christian Cachin, Klaus Kursawe, Victor Shoup
The Complete Distribution of Linear Probabilities of MARS' s-box
Kazumaro Aoki
Kazumaro Aoki
Anonymous Fingerprinting with Direct Non-Repudiation
Birgit Pfitzmann, Ahmad-Reza Sadeghi
Birgit Pfitzmann, Ahmad-Reza Sadeghi
Forward Security in Threshold Signature Schemes
Michel Abdalla, Sara Miner, Chanathip Namprempre
Michel Abdalla, Sara Miner, Chanathip Namprempre
Secure Multiparty Computation of Approximations
Joan Feigenbaum, Jessica Fong, Martin Strauss, Rebecca N. Wright
Joan Feigenbaum, Jessica Fong, Martin Strauss, Rebecca N. Wright
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Anand Desai, Sara Miner
Anand Desai, Sara Miner
An Information-Theoretic Model for Steganography
Christian Cachin
Christian Cachin
Accountable Certificate Management using Undeniable Attestations
Ahto Buldas, Peeter Laud, Helger Lipmaa
Ahto Buldas, Peeter Laud, Helger Lipmaa
Authentication and Key Agreement via Memorable Password
Taekyoung Kwon
Taekyoung Kwon
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
Mihir Bellare, Chanathip Namprempre
Mihir Bellare, Chanathip Namprempre
Security of the Most Significant Bits of the Shamir Message Passing Scheme
Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
Security of Polynomial Transformations of the Diffie--Hellman Key
Igor Shparlinski
Igor Shparlinski
ACE: The Advanced Cryptographic Engine
Thomas Schweinberger, Victor Shoup
Thomas Schweinberger, Victor Shoup
An Efficient Identification Scheme Based on Permuted Patterns
Shahrokh Saeednia
Shahrokh Saeednia
On the Security of Diffie--Hellman Bits
Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently
Anna Lysyanskaya
Anna Lysyanskaya
Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP
A. Aiello, S. Bhatt, R. Ostrovsky, S. Rajagopalan.
A. Aiello, S. Bhatt, R. Ostrovsky, S. Rajagopalan.
Lower Bounds on the Efficiency of Generic Cryptographic Constructions
Rosario Gennaro, Luca Trevisan
Rosario Gennaro, Luca Trevisan
Cryptanalysis of RSA with small prime difference
Benne de Weger
Benne de Weger
Identification Protocols Secure Against Reset Attacks
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
Authenticated Key Exchange Secure Against Dictionary Attacks
Mihir Bellare, David Pointcheval, Phillip Rogaway
Mihir Bellare, David Pointcheval, Phillip Rogaway
Concurrent Zero-Knowledge in Poly-logarithmic Rounds
Joe Kilian, Erez Petrank
Joe Kilian, Erez Petrank
Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature Scheme from Crypto'97
DaeHun Nyang, JooSeok Song
DaeHun Nyang, JooSeok Song
Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext
Gideon Samid
Gideon Samid
The Security of Chaffing and Winnowing
Mihir Bellare, Alexandra Boldyreva
Mihir Bellare, Alexandra Boldyreva
New Directions in Design of Resilient Boolean Functions
Palash Sarkar, Subhamoy Maitra
Palash Sarkar, Subhamoy Maitra
Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
Ivan Damgård, Mads Jurik
Ivan Damgård, Mads Jurik
Public Electronic Contract Protocol
Tak-Ming Law
Tak-Ming Law
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
Tak-Ming Law
Tak-Ming Law
On Resilient Boolean Functions with Maximal Possible Nonlinearity
Yuriy Tarannikov
Yuriy Tarannikov
Combinatorial Properties of Frameproof and Traceability Codes
J. N. Staddon, D. R. Stinson, R. Wei
J. N. Staddon, D. R. Stinson, R. Wei
Implications of the Nontriviality of Entropy Approximation
Marc Fischlin
Marc Fischlin
A New Forward-Secure Digital Signature Scheme
Michel Abdalla, Leonid Reyzin
Michel Abdalla, Leonid Reyzin
On Security Preserving Reductions -- Revised Terminology
Oded Goldreich
Oded Goldreich
A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion
M. Bellare, R. Impagliazzo
M. Bellare, R. Impagliazzo
Concurrent Zero-Knowledge
Cynthia Dwork, Moni Naor, Amit Sahai
Cynthia Dwork, Moni Naor, Amit Sahai
Resettable Zero-Knowledge
Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali
Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali
Public-Key Cryptography and Password Protocols: The Multi-User Case
Maurizio Kliban Boyarsky
Maurizio Kliban Boyarsky
Improving the Exact Security of Digital Signature Schemes
Silvio Micali, Leonid Reyzin
Silvio Micali, Leonid Reyzin
Security of all RSA and Discrete Log Bits
Johan Hastad, Mats Naslund
Johan Hastad, Mats Naslund
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
Mihir Bellare, Amit Sahai
Mihir Bellare, Amit Sahai
A Composition Theorem for Universal One-Way Hash Functions
Victor Shoup
Victor Shoup
A forward-secure digital signature scheme
Mihir Bellare, Sara Miner
Mihir Bellare, Sara Miner
Interleaved Zero-Knowledge in the Public-Key Model
Oded Goldreich, Shafi Goldwasser, Silvio Micali
Oded Goldreich, Shafi Goldwasser, Silvio Micali
Concurrent Zero-Knowledge is Easy in Practice
Ivan Damgard
Ivan Damgard
Secure Hash-and-Sign Signatures without the Random Oracle
Rosario Gennaro, Shai Halevi, Tal Rabin
Rosario Gennaro, Shai Halevi, Tal Rabin
On Formal Models for Secure Key Exchange
Victor Shoup
Victor Shoup
Practical Threshold Signatures
Victor Shoup
Victor Shoup
A Relationship between One-Wayness and Correlation Intractability
Satoshi Hada, Toshiaki Tanaka
Satoshi Hada, Toshiaki Tanaka
On the Existence of3-Round Zero-Knowledge Protocols
Satoshi Hada, Toshiaki Tanaka
Satoshi Hada, Toshiaki Tanaka
Verifiable Encryption and Applications to Group Signatures and Signature Sharing
Jan Camenisch, Ivan Damgaard
Jan Camenisch, Ivan Damgaard
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem
Michel Abdalla, Mihir Bellare, Phillip Rogaway
Michel Abdalla, Mihir Bellare, Phillip Rogaway
Fast Proof of Plaintext-Knowledge and Deniable Authentication Based on Chinese Remainder Theorem
Roger Fischlin
Roger Fischlin
Lattice Based Cryptography: A Global Improvement
Daniele Micciancio
Daniele Micciancio
Public-key cryptography and password protocols
Shai Halevi, Hugo Krawczyk
Shai Halevi, Hugo Krawczyk
An error in the mixed adversary protocol by Fitzi, Hirt and Maurer
Ivan Damgard
Ivan Damgard
Chinese Remaindering with Errors
Oded Goldreich, Dana Ron, Madhu Sudan
Oded Goldreich, Dana Ron, Madhu Sudan
Signature Schemes Based on the Strong RSA Assumption
Ronald Cramer, Victor Shoup
Ronald Cramer, Victor Shoup
Comparing Entropies in Statistical Zero-Knowledge with Applications to the Structure of SZK
Oded Goldreich, Salil Vadhan
Oded Goldreich, Salil Vadhan
Secure Distributed Storage and Retrieval
Juan A. Garay, Rosario Gennaro, Charanjit Jutla, Tal Rabin
Juan A. Garay, Rosario Gennaro, Charanjit Jutla, Tal Rabin
The Disparity between Work and Entropy in Cryptology
John Pliam
John Pliam
Security amplification by composition: The case of doubly-iterated, ideal ciphers
William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
Insecurity of Quantum Computations
Hoi-Kwong Lo
Hoi-Kwong Lo
Relations among Notions of Security for Public-Key Encryption Schemes
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway
Almost All Discrete Log Bits Are Simultaneously Secure
Claus P. Schnorr
Claus P. Schnorr
Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems
Mihir Bellare, Shai Halevi, Amit Sahai, Salil Vadhan
Mihir Bellare, Shai Halevi, Amit Sahai, Salil Vadhan
Security and Composition of Multi-party Cryptographic Protocols
Ran Canetti
Ran Canetti
Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment)
H. F. Chau, H. -K. Lo
H. F. Chau, H. -K. Lo
Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances
Hoi-Kwong Lo, H. F. Chau
Hoi-Kwong Lo, H. F. Chau
More on Proofs of Knowledge
Shai Halevi, Silvio Micali
Shai Halevi, Silvio Micali
Randomness versus Fault-Tolerance
Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosen
Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosen
A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication)
Yael Gertner, Shafi Goldwasser, Tal Malkin
Yael Gertner, Shafi Goldwasser, Tal Malkin
Maintaining Authenticated Communication in the Presence of Break-ins
Ran Canetti, Shai Halevi, Amir Herzberg
Ran Canetti, Shai Halevi, Amir Herzberg
The Random Oracle Methodology, Revisited
Ran Canetti, Oded Goldreich, Shai Halevi
Ran Canetti, Oded Goldreich, Shai Halevi
Chameleon Hashing and Signatures
Hugo Krawczyk, Tal Rabin
Hugo Krawczyk, Tal Rabin
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
Mihir Bellare, Ran Canetti, Hugo Krawczyk
Mihir Bellare, Ran Canetti, Hugo Krawczyk
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products
Rosario Gennaro, Daniele Micciancio, Tal Rabin
Rosario Gennaro, Daniele Micciancio, Tal Rabin
Fast Batch Verification for Modular Exponentiation and Digital Signatures
Mihir Bellare, Juan A. Garay, Tal Rabin
Mihir Bellare, Juan A. Garay, Tal Rabin
A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Ronald Cramer, Victor Shoup
Ronald Cramer, Victor Shoup
On the possibility of basing Cryptography on the assumption that $P \neq NP$
Oded Goldreich, Shafi Goldwasser
Oded Goldreich, Shafi Goldwasser
Universal Service Providers for Database Private Information Retrieval
Giovanni Di-Crescenzo, Yuval Ishai, Rafail Ostrovsky
Giovanni Di-Crescenzo, Yuval Ishai, Rafail Ostrovsky
Private Information Retrieval by Keywords
Benny Chor, Niv Gilboa, Moni Naor
Benny Chor, Niv Gilboa, Moni Naor
The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
A. De Santis, G. Di Crescenzo, O. Goldreich, G. Persiano.
A. De Santis, G. Di Crescenzo, O. Goldreich, G. Persiano.
On Protocol Divertibility
Gerrit Bleumer
Gerrit Bleumer
Optimistic fair Exchange of Digital Signatures
N. Asokan, V. Shoup, M. Waidner
N. Asokan, V. Shoup, M. Waidner
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
Eli Biham, Dan Boneh, Omer Reingold
Eli Biham, Dan Boneh, Omer Reingold
Visual Authentication and Identification
Moni Naor, Benny Pinkas.
Moni Naor, Benny Pinkas.
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
Identity Escrow
Joe Kilian, Erez Petrank
Joe Kilian, Erez Petrank
CBC MAC for Real-Time Data Sources
Erez Petrank, Charles Rackoff
Erez Petrank, Charles Rackoff
Collision-Resistant Hashing: Towards Making UOWHFs Practical
Mihir Bellare, Phillip Rogaway
Mihir Bellare, Phillip Rogaway
Factoring via Strong Lattice Reduction Algorithms
Harald Ritter, Carsten Roessner
Harald Ritter, Carsten Roessner
Towards realizing random oracles: Hash functions that hide all partial information
Ran Canetti
Ran Canetti
Protecting Data Privacy in Private Information Retrieval Schemes
Yuval Ishai, Eyal Kushilevitz
Yuval Ishai, Eyal Kushilevitz
A Probabilistic Error-Correcting Scheme
S. Decatur, O. Goldreich, D. Ron
S. Decatur, O. Goldreich, D. Ron
A note on negligible functions
Mihir Bellare
Mihir Bellare
Efficient Cryptographic Protocols Based on Noisy Channels.
Claude Crepeau
Claude Crepeau
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function
Mihir Bellare, Markus Jakobsson, Moti Yung
Mihir Bellare, Markus Jakobsson, Moti Yung
A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost
Mihir Bellare, Daniele Micciancio
Mihir Bellare, Daniele Micciancio
Public-Key Cryptosystems from Lattice Reduction Problems
Oded Goldreich, Shafi Goldwasser, Shai Halevi
Oded Goldreich, Shafi Goldwasser, Shai Halevi
Verifiable Partial Key Escrow
Mihir Bellare, Shafi Goldwasser
Mihir Bellare, Shafi Goldwasser
The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
Oded Goldreich
Oded Goldreich
On the Contrast in Visual Cryptography Schemes
Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
Proactive RSA
Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited
Moni Naor, Omer Reingold
Moni Naor, Omer Reingold
Oblivious Transfers and Intersecting Codes
Gilles Brassard, Claude Crepeau, Miklos Santha
Gilles Brassard, Claude Crepeau, Miklos Santha
Collision-Free Hashing from Lattice Problems
Oded Goldreich, Shafi Goldwasser, Shai Halevi
Oded Goldreich, Shafi Goldwasser, Shai Halevi
Access Control and Signatures via Quorum Secret Sharing
Moni Naor, Avishai Wool
Moni Naor, Avishai Wool
Visual Cryptography II: Improving the Contrast Via the Cover Base
Moni Naor, Adi Shamir
Moni Naor, Adi Shamir
Upper bound on the communication complexity of private information retrieval
Andris Ambainis
Andris Ambainis
Private Information Storage
Rafail Ostrovsky, Victor Shoup
Rafail Ostrovsky, Victor Shoup
Linear Zero-Knowledge - A note on Efficient Zero-Knowledge Proofs and Arguments
Ronald Cramer, Ivan Damgaard
Ronald Cramer, Ivan Damgaard
On Monotone Function Closure of Statistical Zero-Knowledge
Ronald Cramer, Ivan Damgaard
Ronald Cramer, Ivan Damgaard
Deniable Encryption
Ran Canetti, Cynthia Dwork, Moni Naor, Rafi Ostrovsky
Ran Canetti, Cynthia Dwork, Moni Naor, Rafi Ostrovsky
Incoercible Multiparty Computation
Ran Canetti, Rosario Gennaro
Ran Canetti, Rosario Gennaro