default search action
IACR Cryptology ePrint Archive, Volume 2020
Volume 2020, 2020
- Manoj Gyawali, Daniele Di Tullio:
Elliptic Curves of Nearly Prime Order. 1 - Qichun Wang:
On a Conjecture of O'Donnell. 2 - (Withdrawn) New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation. 3
- (Withdrawn) BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange. 4
- M. R. Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:
Lai-Massey Scheme Revisited. 5 - André Chailloux, Thomas Debris-Alazard:
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures. 6 - Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann:
On Lattice-Based Interactive Protocols with Aborts. 7 - Oriol Farràs:
Secret Sharing Schemes for Ports of Matroids of Rank 3. 8 - Thomas Pornin:
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions. 9 - Dmitrii I. Koshelev:
Double point compression for elliptic curves of j-invariant 0. 10 - Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo:
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain. 11 - Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard:
Cortex-M4 Optimizations for \{R, M\}LWE Schemes. 12 - Nir Bitansky, Idan Gerichter:
On the Cryptographic Hardness of Local Search. 13 - Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. 14 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. 15 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Short Threshold Dynamic Group Signatures. 16 - Daniel Gardham, Mark Manulis, Constantin Catalin Dragan:
Biometric-Authenticated Searchable Encryption. 17 - Sarang Noether, Brandon Goodell:
Triptych: logarithmic-sized linkable ring signatures with applications. 18 - Suhyeon Lee, Seungjoo Kim:
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains. 19 - Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. 20 - Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez:
eSIDH: the revenge of the SIDH. 21 - Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). 22 - Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
Threshold Multi-Signature with an Offline Recovery Party. 23 - Ethan Heilman, Sebastien Lipmann, Sharon Goldberg:
The Arwen Trading Protocols (Full Version). 24 - Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. 25 - Wen Wang, Marc Stöttinger:
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. 26 - Alexander Maximov:
On Roots Factorization for PQC Algorithms. 27 - Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja:
Verified Security of BLT Signature Scheme. 28 - Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich:
Differentially-Private Multi-Party Sketching for Large-Scale Statistics. 29 - Kuan Cheng, Xin Li, Yu Zheng:
Locally Decodable Codes with Randomized Encoding. 31 - Mahdi Sajadieh, Mohsen Mousavi:
A New Approach for the Implementation of Binary Matrices Using SLP Applications. 32 - Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. 33 - Tianjun Ma, Haixia Xu, Peili Li:
SkyEye: A Traceable Scheme for Blockchain. 34 - Rakyong Choi, Dongyeon Hong, Kwangjo Kim:
Constant-round Dynamic Group Key Exchange from RLWE Assumption. 35 - Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: asymmetrical and symmetrical. 36 - Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput. 37 - Michail Moraitis, Elena Dubrova:
Bitstream Modification Attack on SNOW 3G. 38 - Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard:
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis. 39 - Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. 40 - Aggelos Kiayias, Saad Quader, Alexander Russell:
Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders. 41 - Arpita Patra, Ajith Suresh:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning. 42 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Zone Encryption with Anonymous Authentication for V2V Communication. 43 - Alexander Chepurnoy, Amitabh Saxena:
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts. 44 - Haibat Khan, Benjamin Dowling, Keith M. Martin:
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6. 45 - Orhun Kara, Muhammed F. Esgin:
On Analysis of Lightweight Stream Ciphers with Keyed Update. 46 - Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan:
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version). 47 - Changshe Ma, Yiping Gu, Hongfei Li:
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage. 48 - Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri:
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V. 49 - Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa:
Delphi: A Cryptographic Inference Service for Neural Networks. 50 - Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson:
Low-Latency Hardware Masking with Application to AES. 51 - Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. 52 - Yasuhiko Ikematsu, Shuhei Nakamura:
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems". 53 - Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. 54 - Alejandro Cabrera Aldaya, Billy Bob Brumley:
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA. 55 - Zhengzhong Jin, Yunlei Zhao:
AKCN-E8: Compact and Flexible KEM from Ideal Lattice. 56 - Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet:
On the smoothing parameter and last minimum of random orthogonal lattices. 57 - Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis. 58 - Sato Shinichi:
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha. 59 - Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. 60 - Gary Yu:
Simple Schnorr Signature with Pedersen Commitment as Key. 61 - Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig:
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically. 62 - Aurélien Greuet, Simon Montoya, Guénaël Renault:
Attack on LAC Key Exchange in Misuse Situation. 63 - (Withdrawn) Dual System in Lattice: Fully Secure ABE from LWE Assumption. 64
- Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. 65 - Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. 66 - Taylor R. Campbell:
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse. 67 - Pranab Chakraborty, Subhamoy Maitra:
Further Clarification on Mantin's Digraph Repetition Bias in RC4. 68 - Dima Grigoriev, Vladimir Shpilrain:
RSA and redactable blockchains. 69 - Thomas Agrikola, Dennis Hofheinz, Julia Kastner:
On Instantiating the Algebraic Group Model from Falsifiable Assumptions. 70 - Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis:
Post-Quantum Authentication in TLS 1.3: A Performance Study. 71 - Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. 72 - Fabio Banfi, Ueli Maurer:
Anonymous Symmetric-Key Communication. 73 - Daniel R. L. Brown:
Rolling up sleeves when subversion's in a field? 74 - Rishiraj Bhattacharyya:
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms. 75 - Charbel Saliba, Laura Luzzi, Cong Ling:
Wyner-Ziv reconciliation for key exchange based on Ring-LWE. 76 - Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken:
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms. 77 - Kentaro Tamura, Yutaka Shikano:
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo. 78 - Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective. 79 - Benny Applebaum, Amos Beimel, Oded Nir, Naty Peter:
Better Secret-Sharing via Robust Conditional Disclosure of Secrets. 80 - Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Efficient polynomial commitment schemes for multiple points and polynomials. 81 - Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey:
Random Walks and Concurrent Zero-Knowledge. 82 - Weikeng Chen, Raluca Ada Popa:
Metal: A Metadata-Hiding File-Sharing System. 83 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA. 84 - Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. 85 - Daniele Micciancio, Yuriy Polyakov:
Bootstrapping in FHEW-like Cryptosystems. 86 - Elaine Shi:
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey). 87 - Benjamin Y. Chan, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. 88 - Chen-Dong Ye, Tian Tian, Fan-Yang Zeng:
The MILP-Aided Conditional Differential Attack and Its Application to Trivium. 89 - Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
Witness Maps and Applications. 90 - Jonathan Takeshita, Matthew M. Schoenbauer, Ryan Karl, Taeho Jung:
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption. 91 - Daniel Jost, Ueli Maurer:
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees. 92 - Romain Gay:
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. 93 - Michael Davidson, Tyler Diamond:
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms. 94 - Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang:
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors. 95 - David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong:
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons. 96 - Stanislav S. Malakhov:
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard. 97 - Novak Kaluderovic, Thorsten Kleinjung, Dusan Kostic:
Improved key recovery on the Legendre PRF. 98 - Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. 99 - Claude Carlet, Kwang Ho Kim, Sihem Mesnager:
A direct proof of APN-ness of the Kasami functions. 100 - Haibat Khan, Keith M. Martin:
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future. 101 - Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. 102 - Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. 103 - Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels:
On the Security Goals of White-Box Cryptography. 104 - Frank Schuhmacher:
MCU intrinsic group features for component authentication. 105 - Frank Schuhmacher:
Relaxed freshness in component authentication. 106 - Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry:
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication. 107 - Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical Forgeries for ORANGE. 108 - Lucca Hirschi, Lara Schmid, David A. Basin:
Fixing the Achilles Heel of E-Voting: The Bulletin Board. 109 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Blazing Fast OT for Three-Round UC OT Extension. 110 - Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. 111 - Patrick Karl, Michael Tempelmeier:
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography. 112 - Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thomé:
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve. 113 - Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. 114 - Xavier Boyen, Thomas Haines, Johannes Müller:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. 115 - Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan:
Separating Two-Round Secure Computation from Oblivious Transfer. 116 - Andrew H. Reinders, Rafael Misoczki, Santosh Ghosh, Manoj R. Sastry:
Efficient BIKE Hardware Design with Constant-Time Decoder. 117 - Saeid Sahraei, Salman Avestimehr:
InfoCommit: Information-Theoretic Polynomial Commitment and Verification. 118 - Zvika Brakerski, Nico Döttling:
Hardness of LWE on General Entropic Distributions. 119 - Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden:
The randomized slicer for CVPP: sharper, faster, smaller, batchier. 120 - Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead. 121 - Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. 122 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains. 123 - Ali El Kaafarani, Shuichi Katsumata, Federico Pintore:
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512. 124 - Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. 125 - Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. 126 - Véronique Cortier, Joseph Lallemand, Bogdan Warinschi:
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board. 127 - Ward Beullens, Cyprien Delpech de Saint Guilhem:
LegRoast: Efficient post-quantum signatures from the Legendre PRF. 128 - Juliane Krämer, Patrick Struck:
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security. 129 - Elette Boyle, Ran Cohen, Aarushi Goel:
Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement. 130 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Coin Tossing with Lazy Defense: Hardness of Computation Results. 131 - Dario Fiore, Anca Nitulescu, David Pointcheval:
Boosting Verifiable Computation on Encrypted Data. 132 - Souradyuti Paul, Ananya Shrivastava:
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware. 133 - Vipul Goyal, Yifan Song:
Malicious Security Comes Free in Honest-Majority MPC. 134 - Abida Haque, Alessandra Scafuro:
Threshold Ring Signatures: New Definitions and Post-Quantum Security. 135 - David Heath, Vladimir Kolesnikov:
Stacked Garbling for Disjunctive Zero-Knowledge Proofs. 136 - Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner:
Consistency for Functional Encryption. 137 - Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Smart Contract Derivatives. 138 - Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. 139 - Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. 140 - Hila Dahari, Yehuda Lindell:
Deterministic-Prover Zero-Knowledge Proofs. 141 - Erica Blum, Jonathan Katz, Julian Loss:
Network-Agnostic State Machine Replication. 142 - Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li:
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT. 143 - Wei Yu, Saud Al Musa, Bao Li:
Double-Base Chains for Scalar Multiplications on Elliptic Curves. 144 - Lars Tebelmann, Jean-Luc Danger, Michael Pehl:
Self-Secured PUF: Protecting the Loop PUF by Masking. 145 - Roman Langrehr, Jiaxin Pan:
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security. 146 - Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan:
Non-Malleability against Polynomial Tampering. 147 - Fatih Balli, Paul Rösler, Serge Vaudenay:
Determining the Core Primitive for Optimally Secure Ratcheting. 148 - Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo:
Vector Commitment Techniques and Applications to Verifiable Decentralized Storage. 149 - Varun Maram:
On the Security of NTS-KEM in the Quantum Random Oracle Model. 150 - Wouter Castryck, Jana Sotáková, Frederik Vercauteren:
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory. 151 - Thomas Attema, Ronald Cramer:
Compressed Σ-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics. 152 - Nicholas-Philip Brandt, Sven Maier, Tobias Müller, Jörn Müller-Quade:
Constructing Secure Multi-Party Computation with Identifiable Abort. 153 - Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. 154 - Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu:
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference. 155 - Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler:
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts. 156 - Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu:
Multi-Source Non-Malleable Extractors and Applications. 157 - Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi:
Jump index in T-functions for designing a new basic structure of stream ciphers. 158 - Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso:
Privacy-preserving collaborative machine learning on genomic data using TensorFlow. 159 - Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee:
Solving Some Affine Equations over Finite Fields. 160 - Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu:
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact. 161 - Ignacio Cascudo, Jaron Skovsted Gundersen:
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity. 162 - Akin Ünal:
Impossibility Results for Lattice-Based Functional Encryption Schemes. 163 - Alexander Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte:
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way? 164 - Aron Gohr, Sven Jacob, Werner Schindler:
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples. 165 - Stefan Dziembowski, Pawel Kedzior:
Ethna: Channel Network with Dynamic Internal Payment Splitting. 166 - Jinhyun So, Basak Guler, Amir Salman Avestimehr:
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning. 167 - Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. 168 - Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin:
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE). 169 - Saikrishna Badrinarayanan, James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee:
Reusable Two-Round MPC from DDH. 170 - Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. 171 - Daan Leermakers, Boris Skoric:
Qubit-based Unclonable Encryption with Key Recycling. 172 - Dimitris Karakostas, Aggelos Kiayias:
Securing Proof-of-Work Ledgers via Checkpointing. 173 - Mohammad Zaheri, Adam O'Neill:
On Selective-Opening Security of Deterministic Primitives. 174 - Stefan Dziembowski, Grzegorz Fabianski, Sebastian Faust, Siavash Riahi:
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma. 175 - Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas:
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version). 176 - Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito:
Revisiting (R)CCA Security and Replay Protection. 177 - Santosh Ghosh, Luis S. Kida, Soham Jayesh Desai, Reshma Lal:
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device. 178 - Nathan Keller, Asaf Rosemarin:
Mind the Middle Layer: The HADES Design Strategy Revisited. 179 - Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Multikey FHE in the Plain Model. 180 - Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi:
L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space. 181 - Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. 182 - Ignacio Cascudo, Reto Schnyder:
A Note on Secure Multiparty Computation via Higher Residue Symbol Techniques. 183 - Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein:
Fair and Decentralized Exchange of Digital Goods. 184 - Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert:
Hardware Private Circuits: From Trivial Composition to Full Verification. 185 - Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt:
Bitcoin Crypto - Bounties for Quantum Capable Adversaries. 186 - Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart:
Committing to Quantum Resistance, Better: A Speed - and - Risk - Configurable Defence for Bitcoin against a Fast Quantum Computing Attack. 187 - Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. 188 - Vipul Goyal, Yifan Song, Chenzhi Zhu:
Guaranteed Output Delivery Comes Free in Honest Majority MPC. 189 - Assimakis Kattis, Joseph Bonneau:
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees. 190 - Zvika Brakerski, Vinod Vaikuntanathan:
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE. 191 - (Withdrawn) Certificateless Homomorphic Signature Scheme for Network Coding. 192
- Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai:
PSI from PaXoS: Fast, Malicious Private Set Intersection. 193 - Junqing Gong, Hoeteck Wee:
Adaptively Secure ABE for DFA from k-Lin and More. 194 - Jonathan Lee, Kirill Nikitin, Srinath T. V. Setty:
Replicated state machines without replicated execution. 195 - Samuel Dobson, Steven D. Galbraith:
Trustless Groups of Unknown Order with Hyperelliptic Curves. 196 - Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Dynamic Decentralized Functional Encryption. 197 - Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. 198 - Seungkwang Lee, Myungchul Kim:
Improvement on a Masked White-box Cryptographic Implementation. 199 - Christoph Dobraunig, Bart Mennink, Robert Primas:
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice. 200 - Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava:
A Survey on Neural Trojans. 201 - Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Strong Anti-SAT: Secure and Effective Logic Locking. 202 - Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework. 203 - Chaya Ganesh, Bernardo Magri, Daniele Venturi:
Cryptographic Reverse Firewalls for Interactive Proof Systems. 204 - Shlomi Dolev, Ziyu Wang:
SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain. 205 - (Withdrawn) A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory. 206
- Carsten Baum, Bernardo David, Rafael Dowsley:
A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols. 207 - Gengran Hu, Lin You, Liqin Hu, Hui Wang:
Random Integer Lattice Generation via HNF. 208 - Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu:
Adaptive Simulation Security for Inner Product Functional Encryption. 209 - Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle-Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. 210 - Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle. 211 - Steve Thakur:
Isogenies of certain abelian varieties over finite fields with p-ranks zero. 212 - Akinori Hosoyamada, Yu Sasaki:
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound. 213 - Charlotte Bonte, Nigel P. Smart, Titouan Tanguy:
Thresholdizing HashEdDSA: MPC to the Rescue. 214 - Megumi Ando, Anna Lysyanskaya:
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption. 215 - Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti:
Black-Box Constructions of Bounded-Concurrent Secure Computation. 216 - M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar:
SynFi: Automatic Synthetic Fingerprint Generation. 217 - Ehsan Aerabi, Milad Bohlouli, Mohammad Hasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hély:
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs. 218 - Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner:
Multi-Client Functional Encryption for Separable Functions. 219 - Florian Tramèr, Dan Boneh, Kenneth G. Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. 220 - Fabrice Benhamouda, Huijia Lin:
Multiparty Reusable Non-Interactive Secure Computation. 221 - Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih:
Improving Speed and Security in Updatable Encryption Schemes. 222 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. 223 - Mihir Bellare, Igors Stepanovs:
Security under Message-Derived Keys: Signcryption in iMessage. 224 - Lior Rotem, Gil Segev, Ido Shahaf:
Generic-Group Delay Functions Require Hidden-Order Groups. 225 - Duggirala Meher Krishna, Duggirala Ravi, Pulugurtha Krishna Subba Rao:
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol. 226 - Yindong Chen, Limin Lin, Chuliang Wei:
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10. 227 - Shweta Agrawal, Shota Yamada:
Optimal Broadcast Encryption from Pairings and LWE. 228 - Itai Dinur:
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications. 229 - Changmin Lee, Alexandre Wallet:
Lattice analysis on MiNTRU problem. 230 - Junichi Tomida, Nuttapong Attrapadung:
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions. 231 - Bertram Poettering, Paul Rösler:
Combiners for AEAD. 232 - Sam Kim:
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus. 233 - Ruslan V. Skuratovskii, Aled Williams:
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol. 234 - Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Statistical Zaps and New Oblivious Transfer Protocols. 235 - Mridul Nandi:
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21. 236 - Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu:
On the Security Notions for Encryption in a Quantum World. 237 - Andrew Hone:
Efficient ECM factorization in parallel with the Lyness map. 238 - Edimar Veríssimo:
Viktoria: A new Paradigm for Hash Functions. 239 - T.-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi:
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. 240 - Mihir Bellare, Hannah Davis, Felix Günther:
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability. 241 - (Withdrawn) Practical and Secure Circular Range Search on Private Spatial Data. 242
- Benjamin Lipp:
An Analysis of Hybrid Public Key Encryption. 243 - Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol. 244 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. 245 - Jing Tian, Jun Lin, Zhongfeng Wang:
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography. 246 - (Withdrawn) Crooked Indifferentiability Revisited. 247
- Ittai Abraham, Benny Pinkas, Avishay Yanai:
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast. 248 - (Withdrawn) CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes. 249
- Ehsan Aerabi, Athanasios Papadimitriou, David Hély:
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations. 250 - Ivan Damgård, Nikolaj I. Schwartzbach:
Communication Lower Bounds for Perfect Maliciously Secure MPC. 251 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen:
Secure Non-interactive Simulation: Hardness & Feasibility. 252 - Hemanta K. Maji, Mingyuan Wang:
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing. 253 - Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan:
Formalizing Data Deletion in the Context of the Right to be Forgotten. 254 - Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima:
Novel Deception Techniques for Malware Detection on Industrial Control Systems. 255 - Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Statistical ZAPR Arguments from Bilinear Maps. 256 - Onur Günlü, Rafael F. Schaefer, H. Vincent Poor:
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication. 257 - Zvika Brakerski, Venkata Koppula, Tamer Mour:
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations. 258 - Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi:
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors. 259 - Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré:
Lattice-based (Partially) Blind Signature without Restart. 260 - Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. 261 - Christopher Leonardi:
A Note on the Ending Elliptic Curve in SIDH. 262 - Jihoon Kwon, ByeongHak Lee, Jooyoung Lee, Dukjae Moon:
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups. 263 - Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes. 264 - Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu:
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More. 265 - Tommaso Gagliardoni, Juliane Krämer, Patrick Struck:
Quantum Indistinguishability for Public Key Encryption. 266 - Tim Gellersen, Okan Seker, Thomas Eisenbarth:
Differential Power Analysis of the Picnic Signature Scheme. 267 - Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede:
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography. 268 - Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels:
Order-Fairness for Byzantine Consensus. 269 - Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. 270 - Marc Fischlin, Patrick Harasser, Christian Janson:
Signatures from Sequential-OR Proofs. 271 - Keita Arimitsu, Kazuki Otsuka:
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption. 272 - Pierrick Méaux:
On the Fast Algebraic Immunity of Threshold Functions. 273 - Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao:
An Optimal Relational Database Encryption Scheme. 274 - Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz:
Pholkos - Efficient Large-state Tweakable Block Ciphers from the AES Round Function. 275 - Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil D. Dutt:
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware. 276 - Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks. 277 - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song:
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 278 - Shashank Raghuraman, Leyla Nazhandali:
Impact of System-on-Chip Integration of AEAD Ciphers. 279 - Juliane Krämer, Patrick Struck:
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions. 280 - Dusan Klinec, Vashek Matyas:
Privacy-friendly Monero transaction signing on a hardware wallet, extended version. 281 - Jelle Don, Serge Fehr, Christian Majenz:
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More. 282 - István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari:
CryptoWills: How to Bequeath Cryptoassets. 283 - Evangelia Anna Markatou, Roberto Tamassia:
Database Reconstruction Attacks in Two Dimensions. 284 - Yaobin Shen, Chun Guo, Lei Wang:
Improved Security Bounds for Generalized Feistel Networks. 285 - Geoffroy Couteau, Dominik Hartmann:
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages. 286 - Sebastian Angel, Sampath Kannan, Zachary B. Ratliff:
Private resource allocators and their applications. 287 - Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure Key-Alternating Feistel Ciphers Without Key Schedule. 288 - Jonathan Lee:
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves. 289 - Reham Almukhlifi, Poorvi L. Vora:
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds. 290 - (Withdrawn) Unforgeability in the quantum world. 291
- Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi:
LWE with Side Information: Attacks and Concrete Security Estimation. 292 - Benjamin E. Diamond:
"Many-out-of-Many" Proofs with Applications to Anonymous Zether. 293 - Olivier Blazy, Patrick Towa, Damien Vergnaud:
Public-Key Generation with Verifiable Randomness. 294 - Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
Generalized Isotopic Shift Construction for APN Functions. 295 - Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern:
Multidimensional Database Reconstruction from Range Query Access Patterns. 296 - Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski:
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks. 297 - Nir Drucker, Shay Gueron, Dusan Kostic:
Fast polynomial inversion for post quantum QC-MDPC cryptography. 298 - Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Hydra: Fast Isomorphic State Channels. 299 - Yehuda Lindell:
Secure Multiparty Computation (MPC). 300 - Thomas Kaeding:
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext. 301 - Thomas Kaeding:
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. 302 - Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. 303 - Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Multiparty Homomorphic Encryption: From Theory to Practice. 304 - Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada:
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA. 305 - Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta:
Leakage Assessment in Fault Attacks: A Deep Learning Perspective. 306 - Claude Carlet:
Handling vectorial functions by means of their graph indicators. 307 - Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider:
Post-Quantum TLS on Embedded Systems. 308 - Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher:
Cryptanalysis Results on Spook. 309 - Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier:
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis. 310 - Tianjun Ma, Haixia Xu, Peili Li:
A Blockchain Traceable Scheme with Oversight Function. 311 - (Withdrawn) Triptych-2: efficient proofs for confidential transactions. 312
- Victor Shoup:
Security analysis of SPAKE2+. 313 - Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi:
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA. 314 - Ariel Gabizon, Zachary J. Williamson:
plookup: A simplified polynomial protocol for lookup tables. 315 - Rishab Goyal, Sam Kim, Brent Waters, David J. Wu:
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions. 316 - Archisman Ghosh, Debayan Das, Shreyas Sen:
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure. 317 - Huijia Lin, Ji Luo:
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL. 318 - Hayim Shaul, Dan Feldman, Daniela Rus:
Secure k-ish nearest neighbors classifier. 319 - Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. 320 - Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede:
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism. 321 - Andrew D. Loveless, Ronald G. Dreslinski, Baris Kasikci:
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution. 322 - Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol. 323 - Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Defeating CAS-Unlock. 324 - Robert Muth, Florian Tschorsch:
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts. 325 - John M. Schanck:
An upper bound on the decryption failure rate of static-key NewHope. 326 - Anita John, Rohit Lakra, Jimmy Jose:
On the design of stream ciphers with Cellular Automata having radius = 2. 327 - Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi:
Leveraging Weight Functions for Optimistic Responsiveness in Blockchains. 328 - Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot:
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields. 329 - Gil Segev, Ido Shahaf:
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective. 330 - Sergey Agievich:
The CTR mode with encrypted nonces and its extension to AE. 331 - Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov:
Implementation Study of Two Verifiable DelayFunctions. 332 - (Withdrawn) A Simpler and Modular Construction of Linkable Ring Signature. 333
- Christof Beierle, Gregor Leander:
4-Uniform Permutations with Null Nonlinearity. 334 - Yibin Xu, Yangyu Huang:
An n/2 byzantine node tolerated blockchain sharding approach. 335 - Santosh Ghosh, Michael E. Kounavis, Sergej Deutsch:
Gimli Encryption in 715.9 psec. 336 - Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter:
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography. 337 - Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl:
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits. 338 - George Teseleanu:
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics. 339 - Onur Günlü, Efe Bozkir, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci:
Differential Privacy for Eye Tracking with Temporal Correlations. 340 - Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith:
Faster computation of isogenies of large prime degree. 341 - Estuardo Alpirez Bock, Alexander Treff:
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge. 342 - Hiro Midas:
BSC: A Bitcoin Smart Contract Implementation. 343 - Yibin Xu, Yangyu Huang, Jianhua Shao:
Anchoring the Value of Cryptocurrency. 344 - Fengrong Zhang, Nastja Cepak, Enes Pasalic, Yongzhuang Wei:
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version. 345 - Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak/Xoodoo. 346 - Hongda Li, Peifang Ni, Dongxue Pan:
Some Low Round Zero Knowledge Protocols. 347 - Steve Thakur:
Constructing hidden order groups using genus three Jacobians. 348 - Siang Meng Sim:
Differential Power Analysis on (Non-)Linear Feedback Shift Registers. 349 - Murilo Coutinho, T. C. Souza Neto:
New Multi-bit Differentials to Improve Attacks Against ChaCha. 350 - Youssef El Housni, Aurore Guillevic:
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition. 351 - Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro:
Coda: Decentralized Cryptocurrency at Scale. 352 - Robert A. Threlfall:
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.1). 353 - Rajitha Ranasinghe, Pabasara Athukorala:
A Generalization of the ElGamal public-key cryptosystem. 354 - Benjamin Terner:
Permissionless Consensus in the Resource Model. 355 - Martin Hirt, Marta Mularczyk:
Efficient MPC with a Mixed Adversary. 356 - George Teseleanu:
Quasigroups and Substitution Permutation Networks: A Failed Experiment. 357 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q). 358 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes. 359 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields. 360 - Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin:
How Not to Create an Isogeny-Based PAKE. 361 - (Withdrawn) Another Look at CBC Casper Consensus Protocol. 362
- Qianhong Wan, Longjiang Qu, Chao Li:
On equivalence between known polynomial APN functions and power APN functions. 363 - Behzad Abdolmaleki, Daniel Slamanig:
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs. 364 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic. 365 - Hangwei Lu, Dhwani Mehta, Olivia P. Paradis, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard:
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection. 366 - Marcel Tiepelt, Jan-Pieter D'Anvers:
Exploiting Decryption Failures in Mersenne Number Cryptosystems. 367 - Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden:
Defeating NewHope with a Single Trace. 368 - David Knichel, Thorben Moos, Amir Moradi:
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs. 369 - Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat:
Multiparty Generation of an RSA Modulus. 370 - Matthias J. Kannwischer, Peter Pessl, Robert Primas:
Single-Trace Attacks on Keccak. 371 - Claude Carlet:
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions. 372 - Huanyu Wang, Elena Dubrova:
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES. 373 - Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. 374 - Leonie Reichert, Samuel Brack, Björn Scheuermann:
Privacy-Preserving Contact Tracing of COVID-19 Patients. 375 - Sarah Bordage, Julien Lavauzelle:
On the privacy of a code-based single-server computational PIR scheme. 376 - Samuel Dittmer, Rafail Ostrovsky:
Oblivious tight compaction in O(n) time with smaller constant. 377 - Kaushik Nath, Palash Sarkar:
Efficient 4-way Vectorizations of the Montgomery Ladder. 378 - Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann:
Post-quantum WireGuard. 379 - Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory. 380 - Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas:
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback. 381 - Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks:
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. 382 - Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez:
Parallel strategies for SIDH: Towards computing SIDH twice as fast. 383 - Quan Thoi Minh Nguyen:
A "Final" Security Bug. 384 - Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung:
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality. 385 - Ralf Küsters, Daniel Rausch, Mike Simon:
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric. 386 - Onur Günlü, Rafael F. Schaefer:
Low-complexity and Reliable Transforms for Physical Unclonable Functions. 387 - Hüseyin Hisil, Berkan Egrice, Mert Yassi:
Fast 4 way vectorized ladder for the complete set of Montgomery curves. 388 - Gideon Samid:
A One-Time-Pad Alternative: Mathematical Secrecy with one round of Transposition. 389 - Rémi Géraud-Stewart, David Naccache:
A French cipher from the late 19th century. 390 - Donghoe Heo, Suhri Kim, Kisoon Yoon, Youngho Park, Seokhie Hong:
Optimized CSIDH Implementation Using a 2-torsion Point. 391 - Sadegh Sadeghi, Nasour Bagheri:
An argument on the security of LRBC, a recently proposed lightweight block cipher. 392 - Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam:
LevioSA: Lightweight Secure Arithmetic Computation. 393 - Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta:
Candidate iO from Homomorphic Encryption Schemes. 394 - Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Cryptography from Information Loss. 395 - Donggeun Kwon, HeeSeok Kim, Seokhie Hong:
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing. 396 - Seong Gyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Classification of 4-bit S-boxes for BOGI-permutation. 397 - Samuel Brack, Leonie Reichert, Björn Scheuermann:
Decentralized Contact Tracing Using a DHT and Blind Signatures. 398 - Serge Vaudenay:
Analysis of DP3T. 399 - Jeroen Delvaux:
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis. 400 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Mining for Privacy: How to Bootstrap a Snarky Blockchain. 401 - István András Seres, Péter Burcsi:
A Note on Low Order Assumptions in RSA groups. 402 - David Derler, Kai Samelin, Daniel Slamanig:
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. 403 - Tassos Dimitriou:
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards. 404 - Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, Andreas Vogt:
Ordinos: A Verifiable Tally-Hiding E-Voting System. 405 - Atsuki Momose, Jason Paul Cruz, Yuichi Kaji:
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience. 406 - Aydin Abadi, Sotirios Terzis, Changyu Dong:
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection. 407 - Nir Drucker, Shay Gueron:
Speed up over the Rainbow. 408 - Loïs Huguenin-Dumittan, Serge Vaudenay:
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes. 409 - Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh:
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4. 410 - Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck:
Secure Two-Party Computation in a Quantum World. 411 - Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin:
Fixslicing: A New GIFT Representation. 412 - Louis Goubin, Matthieu Rivain, Junwei Wang:
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks. 413 - Roy Radian, Or Sattath:
Semi-Quantum Money. 414 - Shweta Agrawal, Alice Pellet-Mary:
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE. 415 - Mihir Bellare, Wei Dai:
The Multi-Base Discrete Logarithm Problem: Concrete Security Improvements for Schnorr Identification, Signatures and Multi-Signatures. 416 - Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez:
Optimal strategies for CSIDH. 417 - Krzysztof Pietrzak:
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. 418 - Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang:
Pointproofs: Aggregating Proofs for Multiple Vector Commitments. 419 - Kenji Yasunaga:
Practical Card-Based Protocol for Three-Input Majority. 420 - (Withdrawn) Multichain-MWPoW: A p/2 Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture. 421
- Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. 422 - Yanyi Liu, Rafael Pass:
On One-way Functions and Kolmogorov Complexity. 423 - Samuel Jaques, André Schrottenloher:
Low-gate Quantum Golden Collision Finding. 424 - Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. 425 - Qiang Tang:
Privacy-Preserving Contact Tracing: current solutions and open questions. 426 - Daniel Kales, Greg Zaverucha:
Improving the Performance of the Picnic Signature Scheme. 427 - Yaron Gvili:
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. 428 - Alice Silverberg:
Mathematics and Cryptography: A Marriage of Convenience? 429 - Aram Jivanyan, Tigran Mamikonyan:
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures. 430 - Geovandro C. C. F. Pereira, Javad Doliskani, David Jao:
x-only point addition formula and faster torsion basis generation in compressed SIKE. 431 - Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley:
From A to Z: Projective coordinates leakage in the wild. 432 - Martin Westerkamp, Jacob Eberhardt:
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays. 433 - Sujoy Sinha Roy, Andrea Basso:
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware. 434 - Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. 435 - Houssem Maghrebi:
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification. 436 - Mike Hamburg:
Faster Montgomery and double-add ladders for short Weierstrass curves. 437 - Yin Li, Yu Zhang, Wei He:
Fast hybrid Karatsuba multiplier for Type II pentanomials. 438 - Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. 439 - Hao Chen:
Sublattice Attacks on Ring-LWE with Wide Error Distributions I. 440 - Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. 441 - Alon Rosen:
Fine-Grained Cryptography: A New Frontier? 442 - Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. 443 - Sato Shinichi:
A modern signature scheme with message recovery: Abe-Okamoto signatures with EdDSA elements. 444 - Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. 445 - Tim Fritzmann, Georg Sigl, Johanna Sepúlveda:
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography. 446 - (Withdrawn) Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey. 447
- Amir Jafari, Shahram Khazaei:
Partial Secret Sharing Schemes. 448 - Kristian L. McDonald:
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing. 449 - Kristian L. McDonald:
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond. 450 - Hao Chen, Miran Kim, Ilya P. Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh:
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. 451 - Amit Behera, Or Sattath:
Almost Public Coins. 452 - F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay:
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein. 453 - Thomas Pornin:
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification. 454 - Daniel Apon, Ray A. Perlner, Angela Robinson, Paolo Santini:
Cryptanalysis of LEDAcrypt. 455 - Zhichun Lu, Runchao Han, Jiangshan Yu:
Bank run Payment Channel Networks. 456 - Ahmad Almorabea:
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately. 457 - Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha:
On the Optimality of Optimistic Responsiveness. 458 - Debdeep Mukhopadhyay:
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations. 459 - Marloes Venema, Greg Alpár:
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption. 460 - Jean-Sébastien Coron, Agnese Gini:
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. 461 - Ido Shahaf, Or Ordentlich, Gil Segev:
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption. 462 - Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. 463 - Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? 464 - Pantea Kiaei, Patrick Schaumont:
Domain-Oriented Masked Instruction Set Architecture for RISC-V. 465 - Pantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont:
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks. 466 - Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. 467 - Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko:
Distributed Auditing Proofs of Liabilities. 468 - Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. 469 - Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. 470 - Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Interpose PUF can be PAC Learned. 471 - (Withdrawn) Bracing A Transaction DAG with A Backbone Chain. 472
- Ashutosh Kumar, Raghu Meka, David Zuckerman:
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing. 473 - Karim Baghery, Mahdi Sedaghat:
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model. 474 - Zachary Zaccagni, Ram Dantu:
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews. 475 - Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Generalized Bitcoin-Compatible Channels. 476 - Essam Ghadafi:
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More. 477 - Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols. 478 - Tapas Pal, Ratna Dutta:
Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption. 479 - Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Applications. 480 - James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher Kumar Anand:
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography. 481 - Haining Fan:
A Trace Based GF(2n) Inversion Algorithm. 482 - Reza Kaboli, Shahram Khazaei, Maghsoud Parviz:
On Ideal and Weakly-Ideal Access Structures. 483 - Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz Mir:
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions. 484 - Ruslan V. Skuratovskii:
Edwards curve points counting method and supersingular Edwards and Montgomery curves. 485 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. 486 - Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger:
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP. 487 - Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No:
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption. 488 - Fraunhofer AISEC:
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective. 489 - Thomas Haines, Johannes Müller:
SoK: Techniques for Verifiable Mix Nets. 490 - Hilder V. L. Pereira:
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic. 491 - Ran Canetti, Nikolaos Makriyannis, Udi Peled:
UC Non-Interactive, Proactive, Threshold ECDSA. 492 - Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti:
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. 493 - Rohit Chatterjee, Xiao Liang, Omkant Pandey:
Improved Black-Box Constructions of Composable Secure Computation. 494 - Kim Yong-Jin, Yong Ho Yon, Jong Yu-Jin, Li Ok-Chol:
Disperse rotation operator DRT and use in some stream ciphers. 495 - Demba Sow, Léo Robert, Pascal Lafourcade:
Linear Generalized ElGamal Encryption Scheme. 496 - Michele Ciampi, Yun Lu, Vassilis Zikas:
Collusion-Preserving Computation without a Mediator. 497 - Adam Gagol, Jedrzej Kula, Damian Straszak, Michal Swietek:
Threshold ECDSA for Decentralized Asset Custody. 498 - Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner:
Proof-Carrying Data from Accumulation Schemes. 499 - Lorenzo Grassi, Christian Rechberger, Markus Schofnegger:
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers. 500 - Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård:
Fast Threshold ECDSA with Honest Majority. 501 - Sijia Zhao, Donal O'Mahony:
Applying Blockchain Layer2 Technology to Mass E-Commerce. 502 - Aaron Hutchinson, Koray Karabina:
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder. 503 - Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song:
Storing and Retrieving Secrets on a Blockchain. 504 - Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe:
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy. 505 - Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff:
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. 506 - Victoria Vysotskaya:
Characteristics of Hadamard square of Reed-Muller subcodes of special type (Extended abstract). 507 - Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont:
Augmenting Leakage Detection using Bootstrapping. 508 - Avijit Dutta, Mridul Nandi:
BBB Secure Nonce Based MAC Using Public Permutations. 509 - Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti:
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM. 510 - Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger:
JaxNet: Scalable Blockchain Network. 511 - Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra:
Glimpses are Forever in RC4 amidst the Spectre of Biases. 512 - Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias:
E-cclesia: Universally Composable Self-Tallying Elections. 513 - Michael Scott:
On the Deployment of curve based cryptography for the Internet of Things. 514 - Thomas Espitau, Antoine Joux, Natalia Kharchenko:
On a hybrid approach to solve binary-LWE. 515 - Mordechai Guri:
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers. 516 - Thomas Attema, Vadim Lyubashevsky, Gregor Seiler:
Practical Product Proofs for Lattice Commitments. 517 - Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler:
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings. 518 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Design & Analysis of Optimal Coin-tossing: New Techniques. 519 - Yarkin Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar:
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation. 520 - Marcel Keller:
MP-SPDZ: A Versatile Framework for Multi-Party Computation. 521 - Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics. 522 - Tomer Ashur, Raluca Posteuca, Danilo Sijacic, Stef D'haeseleer:
The Strictly Zero-Correlation Attack with Application to the Full DES. 523 - Balthazar Bauer, Georg Fuchsbauer:
Efficient Signatures on Randomizable Ciphertexts. 524 - Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira:
Account Management in Proof of Stake Ledgers. 525 - Robert Drylo, Tomasz Kijko, Michal Wronski:
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography. 526 - Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich:
Aggregatable Subvector Commitments for Stateless Cryptocurrencies. 527 - Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. 528 - Moni Naor, Shahar Paz, Eyal Ronen:
CRISP: Compromise Resilient Identity-based Symmetric PAKE. 529 - Mathias Soeken:
Determining the Multiplicative Complexity of Boolean Functions using SAT. 530 - Serge Vaudenay:
Centralized or Decentralized? The Contact Tracing Dilemma. 531 - Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin:
Promise: Leveraging Future Gains for Collateral Reduction. 532 - Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou:
Anonymous Lottery in the Proof-of-Stake Setting. 533 - Peter Schwabe, Douglas Stebila, Thom Wiggers:
Post-quantum TLS without handshake signatures. 534 - Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu:
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions. 535 - Carlos Cid, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Higher-Order Differentials of Ciphers with Low-Degree S-Boxes. 536 - Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner:
TARDIS: Time And Relative Delays In Simulation. 537 - Liliya Kraleva, Tomer Ashur, Vincent Rijmen:
Rotational Cryptanalysis on MAC Algorithm Chaskey. 538 - Hao Chen, Lynn Chua, Kristin E. Lauter, Yongsoo Song:
On the Concrete Security of LWE with Small Secret. 539 - Rosario Gennaro, Steven Goldfeder:
One Round Threshold ECDSA with Identifiable Abort. 540 - Benjamin Dowling, Britta Hale:
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging. 541 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. 542 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Kachina - Foundations of Private Smart Contracts. 543 - Okan Seker, Sebastian Berndt, Thomas Eisenbarth:
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. 544 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security. 545 - Xin An, Kai Hu, Meiqin Wang:
MixColumns Coefficient Property and Security of the AES with A Secret S-Box. 546 - Kai Hu, Qingju Wang, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer. 547 - Gary Yu:
Blockchain Stealth Address Schemes. 548 - Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks. 549 - Ruiyu Zhu, Changchang Ding, Yan Huang:
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation. 550 - Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko:
Higher Order Differential Attack against Full-Round BIG. 551 - Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No:
Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption. 552 - Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. 553 - Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Bitcoin-Compatible Virtual Channels. 554 - Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos:
Splitting Payments Locally While Routing Interdimensionally. 555 - Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache:
Kerckhoffs' Legacy. 556 - Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica:
On the sensitivity of some APN permutations to swapping points. 557 - Bijan Fadaeinia, Thorben Moos, Amir Moradi:
BSPL: Balanced Static Power Logic. 558 - Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
Striking the Balance: Effective yet Privacy Friendly Contact Tracing. 559 - Alexander Chepurnoy, Amitabh Saxena:
ZeroJoin: Combining ZeroCoin and CoinJoin. 560 - Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks. 561 - Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. 562 - Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser:
Secure large-scale genome-wide association studies using homomorphic encryption. 563 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security. 564 - Jinkyu Cho, Young-Sik Kim, Jong-Seon No:
Homomorphic Computation in Reed-Muller Codes. 565 - Auqib Hamid Lone, Roohie Naaz Mir:
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain. 566 - Yi Liu, Qi Wang, Siu-Ming Yiu:
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster. 567 - Tomer Ashur, Siemen Dhooghe:
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy). 568 - Carla Ràfols, Javier Silva:
QA-NIZK Arguments of Same Opening for Bilateral Commitments. 569 - Dusan Bozilov:
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less. 570 - Anubhab Baksi, Jakub Breier, Xiaoyang Dong, Chen Yi:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. 571 - Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella Béguelin:
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms). 572 - Christopher Patton, Thomas Shrimpton:
Quantifying the Security Cost of Migrating Protocols to Practice. 573 - Ming Li, Anjia Yang, Xinkai Chen:
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization. 574 - Sanjit Chatterjee, R. Kabaleeshwaran:
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption. 575 - Yuval Ishai:
How Low Can We Go? 576 - Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu:
Inner-Product Functional Encryption with Fine-Grained Access Control. 577 - Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. 578 - Darrow R. Hartman:
BitFund: A Benevolent Blockchain Funding Network. 579 - Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt:
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation. 580 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency. 581 - Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont:
Risk and Architecture factors in Digital Exposure Notification. 582 - Zhijie Xie, Min Zhang, Anqi Yin, Zhenhan Li:
A New Targeted Password Guessing Model. 583 - Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh:
vCNN: Verifiable Convolutional Neural Network. 584 - Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. 585 - Ellie Daw:
Component-Based Comparison of Privacy-First Exposure Notification Protocols. 586 - Syh-Yuan Tan, Thomas Gross:
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. 587 - ZaHyun Koo, Jong-Seon No, Young-Sik Kim:
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS. 588 - Mykhaylo Kasianchuk, Mikolaj P. Karpinski, Roman V. Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko:
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity. 589 - Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas:
Expected Constant Round Byzantine Broadcast under Dishonest Majority. 590 - Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. 591 - Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. 592 - Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu:
Alt-Coin Traceability. 593 - Jean-François Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini:
LESS is More: Code-Based Signatures without Syndromes. 594 - Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption. 595 - Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh:
On quantum indistinguishability under chosen plaintext attack. 596 - Kalle Ngo, Elena Dubrova, Michail Moraitis:
Bitstream Modification of Trivium. 597 - Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto:
Cryptanalysis of Au et al. Dynamic Universal Accumulator. 598 - Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin:
Private Matching for Compute. 599 - Saikrishna Badrinarayanan, Peihan Miao, Peter Rindal:
Multi-Party Threshold Private Set Intersection with Sublinear Communication. 600 - Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni:
Everything is a Race and Nakamoto Always Wins. 601 - Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi:
CENCPP - Beyond-birthday-secure Encryption from Public Permutations. 602 - Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth:
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification. 603 - T.-H. Hubert Chan, Wei-Kai Lin, Kartik Nayak, Elaine Shi:
Perfectly Secure Oblivious Parallel RAM with O(log3 N/ log log N) Overhead. 604 - Artur Mariano:
LUSA: the HPC library for lattice-based cryptanalysis. 605 - Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Ring Key-Homomorphic Weak PRFs and Applications. 606 - Andrea Caforio, Fatih Balli, Subhadeep Banik:
Energy Analysis of Lightweight AEAD Circuits. 607 - Fatih Balli, Andrea Caforio, Subhadeep Banik:
Low-latency Meets Low-area: An Improved Bit-Sliding Technique for AES, SKINNY and GIFT. 608 - Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl:
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers. 609 - (Withdrawn) Stronger Multilinear Maps from Indistinguishability Obfuscation. 610
- Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA. 611 - Jeroen Pijnenburg, Bertram Poettering:
Key Assignment Schemes with Authenticated Encryption, revisited. 612 - Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
SiGamal: A supersingular isogeny-based PKE and its application to a PRF. 613 - Amit Deo, Benoît Libert, Khoa Nguyen, Olivier Sanders:
Lattice-Based E-Cash, Revisited. 614 - Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom:
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. 615 - Sanjam Garg, Romain Gay, Mohammad Hajiabadi:
Master-Key KDM-Secure IBE from Pairings. 616 - Rachit Garg, George Lu, Brent Waters:
New Techniques in Replica Encodings with Client Setup. 617 - Ivan Damgård, Sophia Yakoubov:
Bounds on Ad Hoc Threshold Encryption. 618 - Viet Tung Hoang, Yaobin Shen:
Security Analysis of NIST CTR-DRBG. 619 - Ben Kreuter, Sarvar Patel, Ben Terner:
Private Identity Agreement for Private Set Functionalities. 620 - Junbin Fang, Dominique Unruh, Jian Weng, Jun Yan, Dehua Zhou:
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? 621 - Yao Jiang:
The Direction of Updatable Encryption does not Matter Much. 622 - Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. 623 - Marek Wójtowicz:
RSA for poor men: a cryptosystem based on probable primes to base 2 numbers. 624 - Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probability theory and public-key cryptography. 625 - Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci:
Game theoretical framework for analyzing Blockchains Robustness. 626 - Duke Leto, The Hush Developers:
Attacking Zcash For Fun And Profit. 627 - Daniele Di Tullio, Manoj Gyawali:
A post-quantum key exchange protocol from the intersection of quadric surfaces. 628 - Vivek Arte, Mihir Bellare:
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer. 629 - Zhiguo Wan, Xiaotong Liu:
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy. 630 - Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese:
Simultaneous Diagonalization of Incomplete Matrices and Applications. 631 - Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based Method for the Experimental Verification of Difference Trails. 632 - Péter Kutas, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange:
Weak instances of SIDH variants under improved torsion-point attacks. 633 - David Knichel, Pascal Sasdrich, Amir Moradi:
SILVER - Statistical Independence and Leakage Verification. 634 - Pedro Branco, Nico Döttling, Paulo Mateus:
Two-Round Oblivious Linear Evaluation from Learning with Errors. 635 - Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations. 636 - (Withdrawn) DABANGG: Time for Fearless Flush based Cache Attacks. 637
- Jeffrey Burdges, Luca De Feo:
Delay Encryption. 638 - Anne Broadbent, Raza Ali Kazmi:
Indistinguishability obfuscation for quantum circuits of low T-count. 639 - Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo:
Grover on SPECK: Quantum Resource Estimates. 640 - Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinç Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood:
Overview of Polkadot and its Design Considerations. 641 - Henri Aare, Peter Vitols:
The Ritva Blockchain: Enabling Confidential Transactions at Scale. 642 - Pascal Lafourcade, Marius Lombard-Platet:
About Blockchain Interoperability. 643 - Ignacio Cascudo, Bernardo David:
ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing. 644 - Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen:
Correlation distribution analysis of a two-round key-alternating block cipher. 645 - Ward Beullens, Shuichi Katsumata, Federico Pintore:
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. 646 - Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat:
A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes. 647 - Yuncong Hu, Sam Kumar, Raluca Ada Popa:
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust. 648 - Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa:
NIZK from SNARG. 649 - Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. 650 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things". 651 - Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim:
Somewhere Statistically Binding Commitment Schemes with Applications. 652 - Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl:
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation. 653 - Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf:
Proximity Gaps for Reed-Solomon Codes. 654 - Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin:
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel. 655 - Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
On Length Independent Security Bounds for the PMAC Family. 656 - Chloé Hébant, David Pointcheval:
Traceable Attribute-Based Anonymous Credentials. 657 - Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. 658 - Alexander Maximov, Martin Hell:
Software Evaluation of Grain-128AEAD for Embedded Platforms. 659 - Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl:
Faster Software Implementation of the SIKE Protocol Based on A New Data Representation. 660 - Peter Gazi, Aggelos Kiayias, Alexander Russell:
Tight Consistency Bounds for Bitcoin. 661 - John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui:
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross. 662 - Wei Dai, Stefano Tessaro, Xihu Zhang:
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption. 663 - Amos Beimel, Oriol Farràs:
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs. 664 - Jean-Claude Bajard, Sylvain Duquesne:
Montgomery-friendly primes and applications to cryptography. 665 - Chao Sun, Mehdi Tibouchi, Masayuki Abe:
Revisiting the Hardness of Binary Error LWE. 666 - Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. 667 - Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac:
On Subversion-Resistant SNARKs. 668 - Avijit Dutta, Mridul Nandi, Abishanka Saha:
Proof of Mirror Theory for $\xi_{\max}=2$. 669 - Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo:
Inverse-Sybil Attacks in Automated Contact Tracing. 670 - Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis With Few Encryptions. 671 - Leonie Reichert, Samuel Brack, Björn Scheuermann:
A Survey of Automatic Contact Tracing Approaches. 672 - Wenbo Mao, Wenxiang Wang:
LotMint: Blockchain Returning to Decentralization with Decentralized Clock. 673 - Chiara Spadafora, Riccardo Longo, Massimiliano Sala:
Coercion-Resistant Blockchain-Based E-Voting Protocol. 674 - Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ledger Combiners for Fast Settlement. 675 - Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon:
An airdrop that preserves recipient privacy. 676 - T.-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi:
Blockchain with Varying Number of Players. 677 - Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov:
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. 678 - Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric Enabled Threshold Authentication. 679 - Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition. 680 - Vittorio Zaccaria:
An F-algebra for analysing information leaks in the presence of glitches. 681 - Patrick Towa, Damien Vergnaud:
Succinct Diophantine-Satisfiability Arguments. 682 - Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks:
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model. 683 - Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE). 684 - Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan:
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors. 685 - Chintan Patel, Nishant Doshi:
A Level Dependent Authentication for IoT Paradigm. 686 - Dror Chawin, Iftach Haitner, Noam Mazor:
Lower Bounds on the Time/Memory Tradeoff of Function Inversion. 687 - Anton A. Sokolov:
Lin2-Xor Lemma and Log-size Linkable Ring Signature. 688 - Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. 689 - Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. 690 - Diego F. Aranha, Anders P. K. Dalskov, Daniel Escudero, Claudio Orlandi:
LSS Homomorphisms and Applications to Secure Signatures, Proactive Secret Sharing and Input Certification. 691 - Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by A Coding Theory Approach. 692 - Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian:
Tight Quantum Time-Space Tradeoffs for Function Inversion. 693 - Thomas Espitau, Paul Kirchner:
The nearest-colattice algorithm. 694 - Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. 695 - Yin Li, Yu Zhang:
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials. 696 - Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, Paul Zimmermann:
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment. 697 - (Withdrawn) Forgery attack on the authentication encryption GIFT-COFB. 698
- Lauren De Meyer:
Looking at the NIST Lightweight Candidates from a Masking Point-of-View. 699 - Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov:
Personal data exchange protocol: X. 700 - Bar Alon, Eran Omri, Anat Paskin-Cherniavsky:
MPC with Friends and Foes. 701 - Ray A. Perlner, Daniel Smith-Tone:
Rainbow Band Separation is Better than we Thought. 702 - Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New Complexity Estimation on the Rainbow-Band-Separation Attack. 703 - James Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova:
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. 704 - Ingo Czerwinski:
On the minimal value set size of APN functions. 705 - Eleonora Testa, Mathias Soeken, Heinz Riener, Luca G. Amarù, Giovanni De Micheli:
A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks. 706 - Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)). 707 - Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. 708 - Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer:
Reputable List Curation from Decentralized Voting. 709 - Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci Piergiovanni:
Rational Behavior in Committee-Based Blockchains. 710 - Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation. 711 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE From Quadratic Residue With Fast Encryption. 712 - Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. 713 - Naty Peter, Rotem Tsabary, Hoeteck Wee:
One-One Constrained Pseudorandom Functions. 714 - Sergij V. Goncharov:
On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH. 715 - Takeshi Sugawara, Tatsuya Onuma, Yang Li:
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. 716 - Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay:
Fault Location Identification By Machine Learning. 717 - Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. 718 - Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. 719 - Sihem Mesnager, Chunming Tang:
Fast algebraic immunity of Boolean functions and LCD codes. 720 - Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame:
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference. 721 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. 722 - Suyash Bagad, Saravanan Vijayakumaran:
On the Confidentiality of Amounts in Grin. 723 - Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch:
Multi-Party Revocation in Sovrin: Performance through Distributed Trust. 724 - Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi:
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model. 725 - Denis Diemert, Tibor Jager:
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments. 726 - Adrián Ranea, Yunwen Liu, Tomer Ashur:
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers. 727 - Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs:
Minerva: The curse of ECDSA nonces. 728 - Melissa Chase, Peihan Miao:
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF. 729 - Jonathan Katz, Julian Loss, Jiayu Xu:
On the Security of Time-Locked Puzzles and Timed Commitments. 730 - Yusuke Naito:
The Exact Security of PMAC with Three Powering-Up Masks. 731 - Mojtaba Rafiee, Shahram Khazaei:
Security of Multi-Adjustable Join Schemes: Separations and Implications. 732 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede:
A Side-Channel Resistant Implementation of SABER. 733 - Benoît Cogliati, Jacques Patarin:
Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2. 734 - HeeWon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo:
Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger. 735 - Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan:
Forward-Security Under Continual Leakage with Deterministic Key Updates. 736 - Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge. 737 - Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. 738 - Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks:
Generic Constructions of Incremental and Homomorphic Timed-Release Encryption. 739 - Erica Blum, Chen-Da Liu Zhang, Julian Loss:
Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback. 740 - Saba Eskandarian:
Fast Privacy-Preserving Punch Cards. 741 - Jan Richter-Brockmann, Tim Güneysu:
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures. 742 - Qian Guo, Thomas Johansson, Alexander Nilsson:
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. 743 - Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
New results on Gimli: full-permutation distinguishers and improved collisions. 744 - Siddaramappa V, Ramesh K. B:
True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG). 745 - Latif Akçay, Berna Örs Yalçin:
Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application. 746 - Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung:
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups. 747 - Tatsuo Mitani, Akira Otsuka:
Anonymous probabilistic payment in payment hub. 748 - Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. 749 - Max Hoffmann, Christof Paar:
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging. 750 - Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar:
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering. 751 - Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk:
Continuous Group Key Agreement with Active Security. 752 - Thomas Attema, Ronald Cramer, Serge Fehr:
Compressing Proofs of k-Out-Of-n Partial Knowledge. 753 - Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk:
Fluid MPC: Secure Multiparty Computation with Dynamic Participants. 754 - Samuel Jaques, Hart Montgomery, Arnab Roy:
Time-release Cryptography from Minimal Circuit Assumptions. 755 - Shan Chen, Manuel Barbosa, Alexandra Boldyreva, Bogdan Warinschi:
Provable Security Analysis of FIDO2. 756 - Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Understanding Methodology for Efficient CNN Architectures in Profiling Attacks. 757 - Srinath T. V. Setty, Sebastian Angel, Jonathan Lee:
Verifiable state machines: Proofs that untrusted services operate correctly. 758 - Susan Hohenberger, Venkata Koppula, Brent Waters:
Chosen Ciphertext Security from Injective Trapdoor Functions. 759 - Remi Clarisse, Sylvain Duquesne, Olivier Sanders:
Curves with fast computations in the first pairing group. 760 - Tassos Dimitriou:
Decentralized reputation. 761 - Michel Abdalla, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. 762 - Jia Xu, Yiwen Gao, Hoon Wei Lim:
Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol. 763 - Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. 764 - Joseph Jaeger, Nirvan Tyagi:
Handling Adaptive Compromise for Practical Encryption Schemes. 765 - Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics. 766 - Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez:
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability. 767 - Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran:
Perfect Zero Knowledge: New Upperbounds and Relativized Separations. 768 - Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen:
Lattice-Based Blind Signatures, Revisited. 769 - Akshima, David Cash, Andrew Drucker, Hoeteck Wee:
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions. 770 - Xin Li, Fermi Ma, Willy Quach, Daniel Wichs:
Leakage-Resilient Key Exchange and Two-Seed Extractors. 771 - Alex Lombardi, Vinod Vaikuntanathan:
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs. 772 - Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham, Francesco Regazzoni:
An Instruction Set Extension to Support Software-Based Masking. 773 - Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer:
Timelocked Bribes. 774 - Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. 775 - Dana Dachman-Soled, Ilan Komargodski, Rafael Pass:
Non-Malleable Codes for Bounded Polynomial Depth Tampering. 776 - Giuseppe Vitto, Alex Biryukov:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. 777 - Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin:
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT. 778 - Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass:
Non-Malleable Time-Lock Puzzles and Applications. 779 - Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10. 780 - Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. 781 - George Teseleanu:
A Love Affair Between Bias Amplifiers and Broken Noise Sources. 782 - Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim:
Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates. 783 - Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner:
CRAFT: Composable Randomness and Almost Fairness from Time. 784 - Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro:
The Memory-Tightness of Authenticated Encryption. 785 - Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. 786 - Takashi Yamakawa, Mark Zhandry:
A Note on Separating Classical and Quantum Random Oracles. 787 - Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner:
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model. 788 - Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-Authentication-Preventing Signatures in the Standard Model. 789 - Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso:
Anonymity and Rewards in Peer Rating Systems. 790 - Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar:
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. 791 - Jean-François Biasse, Sriram Chellappan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila A. Yavuz:
Trace-Σ: a privacy-preserving contact tracing app. 792 - Mahabir Prasad Jhanwar, Sumanta Sarkar:
PHyCT : Privacy preserving Hybrid Contact Tracing. 793 - Catherine Meadows:
Symbolic and Computational Reasoning About Cryptographic Modes of Operation. 794 - Viet Ba Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj:
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches. 795 - Ying Guo, Zhenfu Cao, Xiaolei Dong:
A Generalization of Paillier's Public-Key System With Fast Decryption. 796 - Mojtaba Bisheh-Niasar, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519. 797 - Ehsan Ebrahimi, Céline Chevalier, Marc Kaplan, Michele Minelli:
Superposition Attack on OT Protocols. 798 - Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin, Rasmus Vestergaard:
Secure Generalized Deduplication via Multi-Key Revealing Encryption. 799 - Mihir Bellare, Wei Dai, Phillip Rogaway:
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements. 800 - Ward Beullens:
Not enough LESS: An improved algorithm for solving Code Equivalence Problems over 픽q. 801 - Mostafizar Rahman, Goutam Paul:
Quantum Attacks on HCTR and its Variants. 802 - Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Xi, Haoyuan Li, Limin Fan, Wenling Wu:
Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA. 803 - Bastian Richter, Amir Moradi:
Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption. 804 - Furkan Turan, Ingrid Verbauwhede:
Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud. 805 - Daxin Huang, Qingqing Gan, Xiaoming Wang, Chengpeng Huang, Yijian Lin:
Toward Comparable Homomorphic Encryption for Crowd-sensing Network. 806 - Brett Hemenway Falk, Rafail Ostrovsky:
Secure merge with O(n log log n) secure operation. 807 - Michel Abdalla:
Security Analysis of Olvid's SAS-based Trust Establishment Protocol. 808 - Michael Klooß:
On (expected polynomial) runtime in cryptography. 809 - (Withdrawn) A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>. 810
- Markulf Kohlweiss, Mikhail Volkhov:
Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable. 811 - Lior Rotem, Gil Segev:
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions. 812 - Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi:
Strengthening Sequential Side-Channel Attacks Through Change Detection. 813 - Tal Moran, Daniel Wichs:
Incompressible Encodings. 814 - Marc Abboud, Thomas Prest:
Cryptographic Divergences: New Techniques and New Applications. 815 - Luka Music, Céline Chevalier, Elham Kashefi:
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses. 816 - Osman Biçer, Alptekin Küpçü:
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation. 817 - Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden:
Security Limitations of Classical-Client Delegated Quantum Computing. 818 - Willy Quach:
UC-Secure OT from LWE, Revisited. 819 - Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer:
On the security of the Rescue hash function. 820 - Michail Moraitis, Elena Dubrova:
Interconnect-Aware Bitstream Modification. 821 - Kwangsu Lee:
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries. 822 - Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao:
The Provable Security of Ed25519: Theory and Practice. 823 - Fynn Dallmeier, Jan Peter Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf:
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. 824 - (Withdrawn) Private Set Intersection from TFHE for Cloud Computing Scenarios. 825
- Xuan Thanh Do, Duong Hieu Phan, Moti Yung:
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. 826 - Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz:
Encrypted Blockchain Databases. 827 - (Withdrawn) Modified Secure Hashing algorithm(MSHA-512). 828
- Aude Le Gluher, Pierre-Jean Spaenlehauer, Emmanuel Thomé:
Refined Analysis of the Asymptotic Complexity of the Number Field Sieve. 829 - Arnold G. Reinhold:
Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles. 830 - Michele Ciampi, Roberto Parisella, Daniele Venturi:
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs. 831 - Susumu Kiyoshima:
Round-optimal Black-box Commit-and-prove with Succinct Communication. 832 - Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis:
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration. 833 - Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim:
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison. 834 - Congwei Zhou, Bin Hu, Jie Guan:
On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function. 835 - Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoît Viguier:
Assembly or Optimized C for Lightweight Cryptography on RISC-V? 836 - Daniel Kales, Greg Zaverucha:
An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes. 837 - David A. August, Anne C. Smith:
PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks. 838 - Loïc Ferreira:
Cryptanalysis of a "Strengthened" Key Exchange Protocol for IoT. 839 - Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:
Proof of Storage-Time: Efficiently Checking Continuous Data Availability. 840 - Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Dumbo: Faster Asynchronous BFT Protocols. 841 - Yuan Lu, Zhenliang Lu, Qiang Tang, Guiling Wang:
Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited. 842 - Yuan Lu, Qiang Tang, Guiling Wang:
Dragoon: Private Decentralized HITs Made Practical. 843 - Yuan Lu, Qiang Tang, Guiling Wang:
Generic Superlight Client for Permissionless Blockchains. 844 - Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin:
Post-Quantum Adaptor Signatures and Payment Channel Networks. 845 - Aayush Jain, Varun Kohli, Girish Mishra:
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT. 846 - Jeroen Pijnenburg, Bertram Poettering:
Encrypt-to-self: Securely Outsourcing Storage. 847 - Marjan Skrobot, Jean Lancrenon:
On Composability of Game-based Password Authenticated Key Exchange. 848 - Ben Smyth:
Surveying global verifiability. 849 - Sergey Agievich:
On the Guaranteed Number of Activations in XS-circuits. 850 - Erica Blum, Jonathan Katz, Chen-Da Liu Zhang, Julian Loss:
Asynchronous Byzantine Agreement with Subquadratic Communication. 851 - Chelsea Komlo, Ian Goldberg:
FROST: Flexible Round-Optimized Schnorr Threshold Signatures. 852 - Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider:
Linear-Complexity Private Function Evaluation is Practical. 853 - Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe:
Designing Reverse Firewalls for the Real World. 854 - Vladimir Sedlacek, Jan Jancar, Petr Svenda:
Fooling primality tests on smartcards. 855 - Olivier Sanders:
Improving Revocation for Group Signature with Redactable Signature. 856 - Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld:
Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party. 857 - Gareth T. Davies, Christian Janson, Daniel P. Martin:
Client-oblivious OPRAM. 858 - Balthazar Bauer, Georg Fuchsbauer, Julian Loss:
A Classification of Computational Assumptions in the Algebraic Group Model. 859 - Yael Tauman Kalai, Rachel Yun Zhang:
SNARGs for Bounded Depth Computations from Sub-Exponential LWE. 860 - Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha:
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT. 861 - Sarah Scheffler, Mayank Varia:
Protecting Cryptography Against Compelled Self-Incrimination. 862 - Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. 863 - Ferhat Karakoç, Alptekin Küpçü:
Linear Complexity Private Set Intersection for Secure Two-Party Protocols. 864 - Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui:
Agora: A Privacy-Aware Data Marketplace. 865 - Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall:
Building a Modern TRNG: An Entropy Source Interface for RISC-V. 866 - Ping Wang, Ping Chen, Zhimin Luo, Gaofeng Dong, Mengce Zheng, Nenghai Yu, Honggang Hu:
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks. 867 - Kostis Karantias:
SoK: A Taxonomy of Cryptocurrency Wallets. 868 - Thomas Debris-Alazard, Léo Ducas, Wessel P. J. van Woerden:
An Algorithmic Reduction Theory for Binary Codes: LLL and more. 869 - Yu Yu, Jiang Zhang:
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN. 870 - Qipeng Liu, Amit Sahai, Mark Zhandry:
Quantum Immune One-Time Memories. 871 - Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli:
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis. 872 - Julia Bobrysheva, Sergey Zapechnikov:
Post-Quantum Group Key Agreement Scheme. 873 - Susan Hohenberger, Brent Waters:
New Methods and Abstractions for RSA-Based Forward Secure Signatures. 874 - Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya:
Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves. 875 - Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. 876 - Marios Georgiou, Mark Zhandry:
Unclonable Decryption Keys. 877 - Sankhanil Dey, Ranjan Ghosh:
Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes. 878 - Annapurna Valiveti, Srinivas Vivek:
Second-Order Masked Lookup Table Compression Scheme. 879 - Palash Sarkar, Subhadip Singha:
Classical Reduction of SVP to LWE: A Concrete Security Analysis. 880 - Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault:
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES. 881 - Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. 882 - Jeroen Delvaux:
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis. 883 - Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model. 884 - Klaus Kursawe:
Wendy, the Good Little Fairness Widget. 885 - Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Adaptively Secure Revocable Hierarchical IBE from k-linear Assumption. 886 - Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros:
Updatable Blockchains. 887 - Emanuele Strieder, Christoph Frisch, Michael Pehl:
Machine Learning of Physical Unclonable Functions using Helper Data, Revealing a Pitfall in the Fuzzy Commitment Scheme. 888 - James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. 889 - Aein Rezaei Shahmirzadi, Amir Moradi:
Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness. 890 - Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. 891 - Sayandeep Saha, Arnab Bag, Debdeep Mukhopadhyay:
Pushing the Limits of Fault Template Attacks: The Role of Side-Channels. 892 - Lucas Barthelemy:
Toward an Asymmetric White-Box Proposal. 893 - Georgios Tsimos, Julian Loss, Charalampos Papamanthou:
Nearly Quadratic Broadcast Without Trusted Setup Under Dishonest Majority. 894 - Joachim Zahnentferner:
Multi-Currency Ledgers. 895 - Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski:
Fault Injection as an Oscilloscope: Fault Correlation Analysis. 896 - Jan Richter-Brockmann, Tim Güneysu:
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices. 897 - Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal:
Rapidly Verifiable XMSS Signatures. 898 - Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Everything is Connected: From Model Learnability to Guessing Entropy. 899 - Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems. 900 - Hongrui Cui, Yu Yu:
A Not-So-Trival Replay Attack Against DH-PSI. 901 - Huanyu Wang, Elena Dubrova:
Federated Learning in Side-Channel Analysis. 902 - Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang:
Optimizing Implementations of Linear Layers. 903 - Huimin Li, Marina Krcek, Guilherme Perin:
A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis. 904 - Marco Baldi, Karan Khathuria, Edoardo Persichetti, Paolo Santini:
Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework. 905 - Ashish Choudhury:
Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited. 906 - Milad Seddigh, Hadi Soleimany:
Enhanced Flush+Reload Attack on AES. 907 - Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu:
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow. 908 - Eleanor McMurtry, Olivier Pereira, Vanessa Teague:
When is a test not a proof? 909 - Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh:
A Power Side-Channel Attack on the CCA2-Secure HQC KEM. 910 - Ruta Jawale, Dakshita Khurana:
Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE. 911 - Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David F. Oswald:
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber. 912 - Tarun Yadav, Manoj Kumar:
Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis. 913 - Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa:
Ultra-Short Multivariate Public Key Signatures. 914 - Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach:
Does Fiat-Shamir Require a Cryptographic Hash Function? 915 - Ivan Damgård, Claudio Orlandi, Mark Simkin:
Black-Box Transformations from Passive to Covert Security with Public Verifiability. 916 - Søren Eller Thomsen, Bas Spitters:
Formalizing Nakamoto-Style Proof of Stake. 917 - (Withdrawn) An Efficient Certificateless Authentication Protocol for the SAE J1939. 918
- Xavier Bonnetain:
Tight Bounds for Simon's Algorithm. 919 - Deng Tang, Bimal Mandal, Subhamoy Maitra:
Further Cryptographic Properties of the Multiplicative Inverse Function. 920 - Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park:
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications. 921 - (Withdrawn) Security Challenges in Smart Grid and Suitable Countermeasures. 922
- Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit:
Another code-based adaptation of Lyubashevsky's signature cryptanalysed. 923 - Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang:
Ferret: Fast Extension for coRRElated oT with small communication. 924 - Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang:
Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. 925 - Brett Hemenway Falk, Daniel Noble:
Secure Computation over Lattices and Elliptic Curves. 926 - Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
A Gas-Efficient Superlight Bitcoin Client in Solidity. 927 - Omri Shmueli:
Multi-theorem (Malicious) Designated-Verifier NIZK for QMA. 928 - Hai Lin, Christopher Lynch:
Local XOR Unification: Definitions, Algorithms and Application to Cryptography. 929 - Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf:
The design of scalar AES Instruction Set Extensions for RISC-V. 930 - Charlotte Bonte, Ilia Iliashenko:
Homomorphic string search with constant multiplicative depth. 931 - Atul Chaturvedi, Varun Shukla, Manoj Kumar Misra:
A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near - Rings. 932 - (Withdrawn) Instantiation of RO Model Transforms via Extractable Functions. 933
- Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. 934 - Davide Andreoletti, Omran Ayoub, Silvia Giordano, Massimo Tornatore, Giacomo Verticale:
Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions. 935 - Mahender Kumar:
Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security. 936 - Colin O'Flynn:
BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks. 937 - Suyash Bagad, Saravanan Vijayakumaran:
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves. 938 - JongHyeok Lee, Dong-Guk Han:
DLDDO: Deep Learning to Detect Dummy Operations. 939 - Fei Meng:
Directly revocable ciphertext-policy attribute-based encryption from lattices. 940 - Doyoung Chung, Jooyoung Lee, Seungkwang Lee, Dooho Choi:
Towards Optimizing Quantum Implementation of AES S-box. 941 - Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. 942 - Runchao Han, Jiangshan Yu, Ren Zhang:
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains. 943 - Manuel Barbosa, Bernardo Ferreira, João C. Marques, Bernardo Portela, Nuno M. Preguiça:
Secure Conflict-free Replicated Data Types. 944 - Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
On the (in)security of ROS. 945 - Johannes Mittmann, Werner Schindler:
Timing attacks and local timing attacks against Barrett's modular multiplication algorithm. 946 - Vijaya Ramachandran, Elaine Shi:
Data Oblivious Algorithms for Multicores. 947 - Eli Ben-Sasson, Lior Goldberg, David Levit:
STARK Friendly Hash - Survey and Recommendation. 948 - Nathan Manohar, Peter Manohar, Rajit Manohar:
HABIT: Hardware-Assisted Bluetooth-based Infection Tracking. 949 - Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. 950 - Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. 951 - Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser:
On What to Learn: Train or Adapt a Deeply Learned Profile? 952 - Emanuele Bellini, Matteo Rossi:
Performance comparison between deep learning-based and conventional cryptographic distinguishers. 953 - Mark Zhandry:
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings. 954 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things. 955 - Kaushik Nath, Palash Sarkar:
Constant Time Montgomery Ladder. 956 - Johannes Tobisch, Anita Aghaie, Georg T. Becker:
Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs. 957 - Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang:
Multi-Threshold Asynchronous Reliable Broadcast and Consensus. 958 - Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings. 959 - Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl:
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers. 960 - Qizheng Wang, Wenping Ma, Jie Li, Ge Liu:
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference. 961 - Dominique Unruh:
Post-Quantum Verification of Fujisaki-Okamoto. 962 - Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang:
From Partial to Global Asynchronous Reliable Broadcast. 963 - Hamish Hunt, Jack L. H. Crawford, Oliver Masters, Enrico Steffinlongo, Flávio Bergamaschi:
Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption. 964 - Robert Granger, Thorsten Kleinjung, Arjen K. Lenstra, Benjamin Wesolowski, Jens Zumbrägel:
Computation of a 30750-Bit Binary Field Discrete Logarithm. 965 - Rick Boivie, Charanjit S. Jutla, Daniel Friedman, Ghavam G. Shahidi:
EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices. 966 - Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang:
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes. 967 - Gideon Samid:
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness. 968 - Dmitrii I. Koshelev:
Efficient constant-time hashing to some elliptic curves of j-invariant 0. 969 - Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza:
Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE. 970 - Koksal Mus, Saad Islam, Berk Sunar:
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme. 971 - Thomas Pornin:
Optimized Binary GCD for Modular Inversion. 972 - David Heath, Vladimir Kolesnikov:
Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path. 973 - Dongxi Liu, Surya Nepal:
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions. 974 - Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs. 975 - Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon:
Synchronizable Exchange. 976 - Guilherme Perin, Stjepan Picek:
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis. 977 - Sarah A. Alzakari, Poorvi L. Vora:
Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. 978 - Elizabeth C. Crites, Anna Lysyanskaya:
Mercurial Signatures for Variable-Length Messages. 979 - Ruta Jawale, Yael Tauman Kalai, Dakshita Khurana, Rachel Yun Zhang:
SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE. 980 - Manan Pareek, Girish Mishra, Varun Kohli:
Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher. 981 - Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. 982 - Michael Stay:
A Differential Meet-in-the-Middle Attack on the Zip cipher. 983 - Vasyl Ustimenko:
On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode. 984 - Leonardo Colò, David Kohel:
Orienting supersingular isogeny graphs. 985 - Thomas Peyrin, Haoyang Wang:
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers. 986 - Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi:
Fuzzy Asymmetric Password-Authenticated Key Exchange. 987 - Anupam Golder, Baogeng Ma, Debayan Das, Josef Danial, Shreyas Sen, Arijit Raychowdhury:
120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron. 988 - Igor Semaev:
Algorithm for SIS and MultiSIS problems. 989 - Junting Xiao, Tadahiko Ito:
Constructing the Cryptographic Boundaries for Lattice-based Cryptography on Hardware Security Module. 990 - Anita John, Alan Reji, Ajay P. Manoj, Atul Premachandran, Basil Zachariah, Jimmy Jose:
A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions. 991 - Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs. 992 - Tim Beyne, Siemen Dhooghe, Zhenda Zhang:
Cryptanalysis of Masked Ciphers: A not so Random Idea. 993 - Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass:
SPARKs: Succinct Parallelizable Arguments of Knowledge. 994 - Hilder Vitor Lima Pereira:
Bootstrapping fully homomorphic encryption over the integers in less than one second. 995 - Ueli Maurer, Christopher Portmann, Jiamin Zhu:
Unifying Generic Group Models. 996 - Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution. 997 - Maxim Jourenko, Mario Larangeira, Keisuke Tanaka:
Lightweight Virtual Payment Channels. 998 - Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas:
Attribute-Based Symmetric Searchable Encryption. 999 - Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gérault, Pascal Lafourcade:
Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments. 1000 - Xunhua Wang, Ben Huson:
Robust distributed symmetric-key encryption. 1001 - Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. 1002 - Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. 1003 - Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson:
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn. 1004 - Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger:
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks. 1005 - Jason T. LeGrow, Aaron Hutchinson:
An Analysis of Fault Attacks on CSIDH. 1006 - Alessandro Budroni, Benjamin Chetioui, Ermes Franch:
Attacks on Integer-RLWE. 1007 - Leah Lathrop:
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano. 1008 - Steven D. Galbraith, Lukas Zobernig:
Obfuscating Finite Automata. 1009 - Romain Gay, Rafael Pass:
Indistinguishability Obfuscation from Circular Security. 1010 - Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu:
Private Join and Compute from PIR with Default. 1011 - Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem:
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. 1012 - Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso:
A Study on Privacy-Preserving GRU Inference Framework. 1013 - Yuntao Liu, Ankur Srivastava:
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel. 1014 - Vasyl Ustimenko:
On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density. 1015 - Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Hardware-Assisted Intellectual Property Protection of Deep Learning Models. 1016 - Andrey Sobol, Anastasiia Kondaurova:
Governance framework for Quipuswap - automated decentralized exchange. 1017 - Steven D. Galbraith, Trey Li:
Big Subset and Small Superset Obfuscation. 1018 - Viet Tung Hoang, Yaobin Shen:
Security of Streaming Encryption in Google's Tink Library. 1019 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
Towards Classical Hardness of Module-LWE: The Linear Rank Case. 1020 - Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. 1021 - Alan Szepieniec:
Polynomial IOPs for Linear Algebra Relations. 1022 - Jintai Ding, Doug Emery, Johannes Müller, Peter Y. A. Ryan, Vonn Kee Wong:
Post-Quantum Anonymous Veto Networks. 1023 - Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta:
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices. 1024 - Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen:
A Bit-Vector Differential Model for the Modular Addition by a Constant. 1025 - Junqing Gong, Haifeng Qian:
Simple and Efficient FE for Quadratic Functions. 1026 - Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things. 1027 - Craig Gotsman, Kai Hormann:
Secure Data Hiding for Contact Tracing. 1028 - Hannah Davis, Felix Günther:
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols. 1029 - Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. 1030 - Yang Yu, Michail Moraitis, Elena Dubrova:
Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification. 1031 - Tim Beyne, Chaoyun Li:
Cryptanalysis of the MALICIOUS Framework. 1032 - Runchao Han, Jiangshan Yu, Haoyu Lin:
RandChain: Decentralised Randomness Beacon from Sequential Proof-of-Work. 1033 - Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. 1034 - Jyotirmoy Pramanik, Avishek Adhikari:
Evolving Secret Sharing with Essential Participants. 1035 - Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf:
Security in banking. 1036 - Yihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu:
A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm. 1037 - Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay:
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4. 1038 - Mohammad Sadeq Dousti, Alptekin Küpçü:
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct. 1039 - Hemi Leibowitz, Amir Herzberg, Ewa Syta, Sara Wrótniak:
The Modular Specifications Security Framework. 1040 - Abraham Westerbaan, Bas Westerbaan:
Sign in finite fields. 1041 - Hoeteck Wee, Daniel Wichs:
Candidate Obfuscation via Oblivious LWE Sampling. 1042 - Ian McQuoid, Mike Rosulek, Lawrence Roy:
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions. 1043 - Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. 1044 - Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. 1045 - ZUC Design Team, Bin Zhang:
On the Linear Distinguishing Attack against ZUC-256 Stream Cipher. 1046 - Yiwen Gao, Yongbin Zhou:
Side-channel Attacks with Multi-thread Mixed Leakage. 1047 - Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. 1048 - Stefano Barbero, Emanuele Bellini, Rusydi H. Makarim:
Rotational analysis of ChaCha permutation. 1049 - Arpita Patra, Divya Ravi, Swati Singla:
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation. 1050 - Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. 1051 - Jean-Philippe Aumasson, Omer Shlomovits:
Attacking Threshold Wallets. 1052 - Anders P. K. Dalskov, Eysa Lee, Eduardo Soria-Vazquez:
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation. 1053 - Ben Smyth:
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems. 1054 - Santi J. Vives:
Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain. 1055 - Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
Optimized GPU Framework for Block Cipher Differential Search. 1056 - Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille:
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. 1057 - (Withdrawn) On the Complexity of the Crossbred Algorithm. 1058
- Daniel Shumow:
Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts. 1059 - Fuyuki Kitagawa, Takahiro Matsuda:
Circular Security Is Complete for KDM Security. 1060 - Vahid Amin Ghafari, Fujiang Lin:
A new idea in response to fast correlation attacks on small-state stream ciphers. 1061 - Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Víctor Mateu:
Quantum Search for Scaled Hash Function Preimages. 1062 - (Withdrawn) Signatures of Knowledge for Boolean Circuits under Standard Assumptions. 1063
- Gary Yu:
Mimblewimble Non-Interactive Transaction Scheme. 1064 - Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. 1065 - Carlos Aguilar Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla:
Constant time algorithms for ROLLO-I-128. 1066 - Adrian Marotzke:
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime. 1067 - Radhakrishna Bhat, N. R. Sunitha:
An Efficient Transformation Capabilities of Single Database Private Block Retrieval. 1068 - Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez:
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions. 1069 - Dmitrii I. Koshelev:
Hashing to elliptic curves y2 = x3 + b provided that b is a quadratic residue. 1070 - Julia Kastner, Julian Loss, Michael Rosenberg, Jiayu Xu:
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model. 1071 - Liliya Kraleva, Raluca Posteuca, Vincent Rijmen:
Cryptanalysis of the permutation based algorithm SpoC. 1072 - Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation. 1073 - Mihai-Zicu Mina, Emil Simion:
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. 1074 - Pratik Soni, Stefano Tessaro:
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs. 1075 - Avijit Dutta:
Minimizing the Two-Round Tweakable Even-Mansour Cipher. 1076 - Mingxing Luo, Xiaojun Wang:
Unconditionally secure quantum bit commitment: Revised. 1077 - Jodie Knapp, Elizabeth A. Quaglia:
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles. 1078 - Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. 1079 - Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. 1080 - Olivier Bernard, Adeline Roux-Langlois:
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices. 1081 - Bart Mennink:
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption. 1082 - Stefan Steinegger, Robert Primas:
A Fast and Compact Accelerator for Ascon and Friends. 1083 - David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig:
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions. 1084 - Tapas Pal, Ratna Dutta:
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications. 1085 - Daniel Apon, Dustin Moody, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme. 1086 - Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE. 1087 - Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. 1088 - Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki:
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers. 1089 - Andrew Morgan, Rafael Pass, Elaine Shi:
On the Adaptive Security of MACs and PRFs. 1090 - Joachim Neu, Ertem Nusret Tas, David Tse:
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma. 1091 - Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
The Round Complexity of Secure Computation Against Covert Adversaries. 1092 - Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version). 1093 - Ambili K. N, Jimmy Jose:
TN-IDS for Network Layer Attacks in RPL based IoT Systems. 1094 - Yongzhuang Wei, René Rodríguez, Enes Pasalic:
Cycle structure of generalized and closed loop invariants. 1095 - Ruize Wang, Huanyu Wang, Elena Dubrova:
Far Field EM Side-Channel Attack on AES Using Deep Learning. 1096 - Benoît Cogliati, Ashwin Jha, Mridul Nandi:
How to Build Optimally Secure PRFs Using Block Ciphers. 1097 - Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. 1098 - Roman Langrehr, Jiaxin Pan:
Unbounded HIBE with Tight Security. 1099 - Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation? 1100 - Ren Zhang, Dingwei Zhang, Quake Wang, Jan Xie, Bart Preneel:
NC-Max: Breaking the Throughput Limit of Nakamoto Consensus. 1101 - Pedro Hecht:
PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings. 1102 - Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ? 1103 - Gilles Barthe, Sunjay Cauligi, Benjamin Grégoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe:
High-Assurance Cryptography Software in the Spectre Era. 1104 - Thai Duong, Duong Hieu Phan, Ni Trieu:
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. 1105 - Gili Schul-Ganz, Gil Segev:
Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction. 1106 - Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest:
Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications. 1107 - Wouter Castryck, Thomas Decru, Frederik Vercauteren:
Radical isogenies. 1108 - Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez:
On new Vélu's formulae and their applications to CSIDH and B-SIDH constant-time implementations. 1109 - Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi:
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. 1110 - Abhraneel Dutta, Aaron Hutchinson, Koray Karabina:
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography. 1111 - Muhammad ElSheikh, Amr M. Youssef:
A cautionary note on the use of Gurobi for cryptanalysis. 1112 - Konstantin Kalgin, Valeriya Idrisova:
On combinatorial approaches to search for quadratic APN functions. 1113 - Thomas Haines, Rajeev Goré, Bhavesh Sharma:
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting. 1114 - Karim M. Abdellatif, Olivier Hériveaux:
SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets. 1115 - Vasyl Ustimenko:
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode. 1116 - Jia Kan:
Economic Proof of Work. 1117 - Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov:
Approximate Homomorphic Encryption with Reduced Approximation Error. 1118 - Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. 1119 - Yasufumi Hashimoto:
On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme. 1120 - Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta:
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain. 1121 - Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros:
The Velvet Path to Superlight Blockchain Clients. 1122 - Alexandre Adomnicai, Thomas Peyrin:
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V. 1123 - Artur Mariano, Filipe Cabeleira, Gabriel Falcão, Luís Paulo Santos:
Optimized Voronoi-based algorithms for parallel shortest vector computations. 1124 - Jing Tian, Bo Wu, Zhongfeng Wang:
High-Speed FPGA Implementation of the SIKE Based on An Ultra-Low-Latency Modular Multiplier. 1125 - Joël Gugger:
Bitcoin-Monero Cross-chain Atomic Swap. 1126 - Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:
SideLine: How Delay-Lines (May) Leak Secrets from your SoC. 1127 - (Withdrawn) Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN. 1128
- Ambili K. N, Jimmy Jose:
A Secure Software Defined Networking based Framework for IoT Networks. 1129 - Mark Abspoel, Daniel Escudero, Nikolaj Volgushev:
Secure training of decision trees with continuous attributes. 1130 - Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei:
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound. 1131 - Ilan Komargodski, Wei-Kai Lin:
Lower Bound for Oblivious RAM with Large Cells. 1132 - Ling Song, Yi Tu, Danping Shi, Lei Hu:
Security Analysis of Subterranean 2.0. 1133 - Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks. 1134 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Inner Product Encryption from LWE. 1135 - Han Wu, Guangwu Xu:
On the Family of Elliptic Curves y2 x3+b/픽p. 1136 - Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko:
MOTION - A Framework for Mixed-Protocol Multi-Party Computation. 1137 - Andreas Hülsing, Florian Weber:
Epochal Signatures for Deniable Group Chats. 1138 - Huijia Lin, Ji Luo:
Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin. 1139 - Yongjune Kim, Cyril Guyot, Young-Sik Kim:
On the Efficient Estimation of Min-Entropy. 1140 - Daniele Di Tullio, Manoj Gyawali:
A post-quantum signature scheme from the secant variety of the Grassmannian. 1141 - Zhengjun Cao, Lihua Liu:
Factoring Algorithm Based on Parameterized Newton Method. 1142 - Alan Szepieniec, Tomer Ashur, Siemen Dhooghe:
Rescue-Prime: a Standard Specification (SoK). 1143 - Lior Rotem, Gil Segev:
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions. 1144 - Wonseok Choi, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee:
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs. 1145 - Siemen Dhooghe, Svetla Nikova:
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries. 1146 - (Withdrawn) Lic-Sec: an enhanced AppArmor Docker security profile generator. 1147
- Malik Imran, Samuel Pagliarini, Muhammad Rashid:
An Area Aware Accelerator for Elliptic Curve Point Multiplication. 1148 - Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck:
Deterministic Wallets in a Quantum World. 1149 - Gennaro Avitabile, Daniele Friolo, Ivan Visconti:
TEnK-U: Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems. 1150 - Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk:
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). 1151 - Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji:
An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls. 1152 - Shay Gueron:
Key Committing AEADs. 1153 - Kwangsu Lee, Minhye Seo:
Functional Encryption for Set Intersection in the Multi-Client Setting. 1154 - Dimitris Mouris, Nektarios Georgios Tsoutsos:
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs. 1155 - Anna Lisa Ferrara, Chiara Ricciardi:
Verifiable Hierarchical Key Assignment Schemes. 1156 - Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi:
Secure Massively Parallel Computation for Dishonest Majority. 1157 - Amber Sprenkels, Bas Westerbaan:
Don't throw your nonces out with the bathwater. 1158 - Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:
ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ? 1159 - Nir Bitansky, Arka Rai Choudhuri:
Characterizing Deterministic-Prover Zero Knowledge. 1160 - Shashank Agrawal, Srinivasan Raghuraman:
KVaC: Key-Value Commitments for Blockchains and Beyond. 1161 - Pavel Hubácek, Chethan Kamath, Karel Král, Veronika Slívová:
On Average-Case Hardness in TFNP from One-Way Functions. 1162 - Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic:
Specifying cycles of minimal length for commonly used linear layers in block ciphers. 1163 - Min Yang, Qingshu Meng, An Wang, Xin Liu:
Template Attacks Based on the Multivariate Joint Distribution. 1164 - Bor de Kock, Kristian Gjøsteen, Mattia Veroni:
Practical Isogeny-Based Key-exchange with Optimal Tightness. 1165 - Jorge Nakahara Jr.:
A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields. 1166 - Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan:
Batch Verification for Statistical Zero Knowledge Proofs. 1167 - Zvika Brakerski, Sanjam Garg, Rotem Tsabary:
FHE-Based Bootstrapping of Designated-Prover NIZK. 1168 - Sigurd Eskeland:
Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model. 1169 - Bar Alon, Ran Cohen, Eran Omri, Tom Suad:
On the Power of an Honest Majority in Three-Party Computation Without Broadcast. 1170 - Alexander Bienstock, Yevgeniy Dodis, Paul Rösler:
On the Price of Concurrency in Group Ratcheting Protocols. 1171 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of a round optimal lattice-based multisignature scheme. 1172 - Ryo Nishimaki:
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark). 1173 - Chloé Cachet, Luke Demarest, Benjamin Fuller, Ariel Hamlin:
Proximity Searchable Encryption for Biometrics. 1174 - David Heath, Vladimir Kolesnikov, Stanislav Peceny:
MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication. 1175 - Rami Khalil, Naranker Dulay:
Short Paper: PoSH Proof of Staked Hardware Consensus. 1176 - Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. 1177 - Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi:
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH. 1178 - Shweta Agrawal, Daniel Wichs, Shota Yamada:
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model. 1179 - Ricardo Moura, David R. Matos, Miguel L. Pardal, Miguel Correia:
MultiTLS: Secure communication channels with cipher suite diversity. 1180 - Siam U. Hussain, Baiyu Li, Farinaz Koushanfar, Rosario Cammarota:
TinyGarble2: Smart, Efficient, and Scalable Yao's Garble Circuit. 1181 - Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer:
On the Round Complexity of the Shuffle Model. 1182 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations. 1183 - Robert Ransom:
Constant-time verification for cut-and-choose-based signatures. 1184 - Zvika Brakerski, Nico Döttling:
Lossiness and Entropic Hardness for Ring-LWE. 1185 - Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta:
Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions. 1186 - David Lanzenberger, Ueli Maurer:
Coupling of Random Systems. 1187 - Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis:
Cryptographic Group Actions and Applications. 1188 - Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols:
Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version). 1189 - Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner:
Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy. 1190 - Mark Zhandry:
Schrödinger's Pirate: How To Trace a Quantum Decoder. 1191 - Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont:
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level. 1192 - Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:
Bypassing Isolated Execution on RISC-V with Fault Injection. 1193 - Andrea Coladangelo, Christian Majenz, Alexander Poremba:
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model. 1194 - David Cash, Andrew Drucker, Alexander Hoover:
A Lower Bound for One-Round Oblivious RAM. 1195 - Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf:
TR-31 and AS 2805 (Non)equivalence report. 1196 - Rachit Garg, Dakshita Khurana, George Lu, Brent Waters:
Black-Box Non-Interactive Non-Malleable Commitments. 1197 - Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult:
Finding EM leakages at design stage: a simulation methodology. 1198 - Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro:
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity. 1199 - (Withdrawn) WBCD: White-box Block Cipher Scheme Based on Dynamic Library. 1200
- Tingting Cui, Lorenzo Grassi:
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff. 1201 - Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-order Masking Implementation of WAGE. 1202 - Jean-Philippe Bossuat, Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys. 1203 - Marc Fischlin, Felix Rohrbach:
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge. 1204 - Benjamin Kuykendall, Mark Zhandry:
Towards Non-Interactive Witness Hiding. 1205 - Andrey Sobol:
Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment. 1206 - Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results. 1207 - Vitaly Kiryukhin:
An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers. 1208 - Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas:
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC. 1209 - Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka:
Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions. 1210 - (Withdrawn) Public-key Authenticate Encryption with Keyword Search Revised: \\ Probabilistic TrapGen algorithm. 1211
- Ran Canetti, Pratik Sarkar, Xiao Wang:
Triply Adaptive UC NIZK. 1212 - Joseph Jaeger, Stefano Tessaro:
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness. 1213 - Majid Mumtaz, Ping Luo:
Cryptanalysis of RSA: A Special Case of Boneh-Durfee's Attack. 1214 - Steve Babbage, Alexander Maximov:
Differential analysis of the ZUC-256 initialisation. 1215 - Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang:
Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4. 1216 - Pedro Hecht:
R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey. 1217 - Shingo Sato, Junji Shikata:
Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing. 1218 - Shingo Sato, Junji Shikata, Tsutomu Matsumoto:
Aggregate Signature with Detecting Functionality from Group Testing. 1219 - Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk:
The Topographic Signature (TopoSign) Protocol. 1220 - Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote:
Verifiable Functional Encryption using Intel SGX. 1221 - Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu:
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand. 1222 - Jonathan Takeshita, Dayane Reis, Ting Gong, Michael T. Niemier, Xiaobo Sharon Hu, Taeho Jung:
Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM. 1223 - Alexandros Bakas, Antonis Michalas:
Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version). 1224 - Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. 1225 - Chen-Da Liu-Zhang, Ueli Maurer:
Synchronous Constructive Cryptography. 1226 - Muhammad ElSheikh, Amr M. Youssef:
Integral Cryptanalysis of Reduced-Round Tweakable TWINE. 1227 - Colin O'Flynn:
Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices. 1228 - Zhaohua Chen, Guang Yang:
Decentralized Custody Scheme with Game-Theoretic Security. 1229 - (Withdrawn) Certificateless Public-key Authenticate Encryption with Keyword Search Revised: MCI and MTP. 1230
- Richard B. Riddick:
vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging. 1231 - Nicolas Sendrier, Valentin Vasseur:
On the Existence of Weak Keys for QC-MDPC Decoding. 1232 - Farid Javani, Alan T. Sherman:
BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer. 1233 - Masayuki Fukumitsu, Shingo Hasegawa:
Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model. 1234 - Ting Rong Lee, Je Sen Teh, Jasy Suet Yan Liew, Norziana Jamil, Jiageng Chen:
Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models. 1235 - Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi:
Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions. 1236 - Jianwei Li, Phong Q. Nguyen:
A Complete Analysis of the BKZ Lattice Reduction Algorithm. 1237 - Hao Lin, Yang Wang, Mingqiang Wang:
Hardness of Module-LWE and Ring-LWE on General Entropic Distributions. 1238 - Alin Tomescu, Yu Xia, Zachary Newman:
Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation. 1239 - Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski:
SQISign: compact post-quantum signatures from quaternions and isogenies. 1240 - Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version). 1241 - Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding:
Improved (Related-key) Differential Cryptanalysis on GIFT. 1242 - Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. 1243 - Konstantinos Chalkias, François Garillot, Valeria Nikolaenko:
Taming the many EdDSAs. 1244 - Handan Kilinç Alper, Jeffrey Burdges:
Two-round trip Schnorr multi-signatures via delinearized witnesses. 1245 - Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi:
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free. 1246 - Jiaheng Zhang, Weijie Wang, Yinuo Zhang, Yupeng Zhang:
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time. 1247 - Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov:
Random-index PIR with Applications to Large-Scale Secure MPC. 1248 - Marilyn George, Seny Kamara:
Adversarial Level Agreements for Two-Party Protocols. 1249 - Zhe Li, Chaoping Xing, Sze Ling Yeo:
A New Code Based Signature Scheme without Trapdoors. 1250 - Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No:
Bit Security Estimation Using Various Information-Theoretic Measures. 1251 - Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage. 1252 - Gaëtan Leurent, Clara Pernot:
New Representations of the AES Key Schedule. 1253 - Ivan Damgård, Bernardo Magri, Luisa Siniscalchi, Sophia Yakoubov:
Broadcast-Optimal Two Round MPC with an Honest Majority. 1254 - Sean Murphy, Maura B. Paterson, Christine Swart:
Boolean Ring Cryptographic Equation Solving. 1255 - Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan:
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z. 1256 - ZaHyun Koo, Jong-Seon No, Young-Sik Kim:
Improved Reduction Between SIS Problems over Structured Lattices. 1257 - Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay:
TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks. 1258 - Yibiao Lu, Bingsheng Zhang, Weiran Liu, Lei Zhang, Kui Ren:
Silent Two-party Computation Assisted by Semi-trusted Hardware. 1259 - Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell:
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance. 1260 - Jonas Nick, Tim Ruffing, Yannick Seurin:
MuSig2: Simple Two-Round Schnorr Multi-Signatures. 1261 - Paolo D'Arco, Francesco Mogavero:
On (multi-stage) Proof-of-Work blockchain protocols. 1262 - Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani:
Improved Fault Analysis on SIMECK Ciphers. 1263 - (Withdrawn) The i-Chip as One-Time Password (OTP) & digital signature generator. 1264
- Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. 1265 - Shweta Agrawal, Rishab Goyal, Fabrice Mouhartem:
Multi-Party Functional Encryption. 1266 - Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
Fault Attacks In Symmetric Key Cryptosystems. 1267 - Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis. 1268 - Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. 1269 - Takashi Yamakawa, Mark Zhandry:
Classical vs Quantum Random Oracles. 1270 - Alexandros Bakas, Antonis Michalas:
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version). 1271 - Maximilien Gadouleau, Luca Mariot, Stjepan Picek:
Bent Functions from Cellular Automata. 1272 - Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa:
Classical Verification of Quantum Computations with Efficient Verifier. 1273 - Jonathan Lee:
Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments. 1274 - Srinath T. V. Setty, Jonathan Lee:
Quarks: Quadruple-efficient transparent zkSNARKs. 1275 - Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Lattice-based Key Sharing Schemes - A Survey. 1276 - Julien Toulemont, N. Ouldei-Tebina, Jean Marc Gallière, Pascal Nouet, E. Bourbao, Philippe Maurine:
A Simple Protocol to Compare EMFI Platforms. 1277 - Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels:
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4. 1278 - Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. 1279 - Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, Ion Stoica:
DORY: An Encrypted Search System with Distributed Trust. 1280 - Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford:
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. 1281 - Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. 1282 - Craig Costello, Michael Meyer, Michael Naehrig:
Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem. 1283 - Mitsuru Shiozaki, Yohei Hori, Takeshi Fujino:
Entropy Estimation of Physically Unclonable Functions. 1284 - Junichi Tomida:
Multi-Input Quadratic Functional Encryption from Pairings. 1285 - Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri:
Secure Quantum Two-Party Computation: Impossibility and Constructions. 1286 - Borja Gómez:
Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field. 1287 - Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved attacks against key reuse in learning with errors key exchange. 1288 - Farid F. Elwailly:
Sword: An Opaque Blockchain Protocol. 1289 - Osman Biçer, Alptekin Küpçü:
FORTIS: FORgeable TImeStamps Thwart Selfish Mining. 1290 - Bernardo David, Rafael Dowsley:
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model. 1291 - Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Optimal Oblivious Parallel RAM. 1292 - Lichao Wu, Guilherme Perin, Stjepan Picek:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis. 1293 - Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem:
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. 1294 - Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, Antoon Purnal:
Optimized Software Implementations for theLightweight Encryption Scheme ForkAE. 1295 - Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange:
Concrete quantum cryptanalysis of binary elliptic curves. 1296 - Lauren De Meyer, Elke De Mulder, Michael Tunstall:
On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software. 1297 - Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. 1298 - (Withdrawn) Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability. 1299
- Yunhao Zhang, Srinath T. V. Setty, Qi Chen, Lidong Zhou, Lorenzo Alvisi:
Byzantine Ordered Consensus without Byzantine Oligarchy. 1300 - Nils Fleischhacker, Mark Simkin:
Robust Property-Preserving Hash Functions for Hamming Distance and More. 1301 - Irem Keskinkurt Paksoy, Murat Cenk:
TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4. 1302 - Joppe W. Bos, Joost Renes, Christine van Vredendaal:
Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer. 1303 - Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin:
QCB: Efficient Quantum-secure Authenticated Encryption. 1304 - Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao:
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work. 1305 - Karim Baghery, Zaira Pindado, Carla Ràfols:
Simulation Extractable Versions of Groth's zk-SNARK Revisited. 1306 - Pedro Branco, Nico Döttling, Sihang Pu:
Multiparty Cardinality Testing for Threshold Private Set Intersection. 1307 - Eamonn W. Postlethwaite, Fernando Virdia:
On the Success Probability of Solving Unique SVP via BKZ. 1308 - Noel Danz, Oliver Derwisch, Anja Lehmann, Wenzel Pünter, Marvin Stolle, Joshua Ziemann:
Security and Privacy of Decentralized Cryptographic Contact Tracing. 1309 - Karim Belabas, Thorsten Kleinjung, Antonio Sanso, Benjamin Wesolowski:
A note on the low order assumption in class group of an imaginary quadratic number fields. 1310 - Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya:
Cryptanalysis of Feistel-Based Format-Preserving Encryption. 1311 - Yi Deng:
Individual Simulations. 1312 - Maxim Jourenko, Mario Larangeira, Keisuke Tanaka:
Payment Trees: Low Collateral Payments for Payment Channel Networks. 1313 - Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Secure Software Leasing from Standard Assumptions. 1314 - Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit:
On Index Calculus Algorithms for Subfield Curves. 1315 - Juliane Krämer, Patrick Struck:
Security of Public Key Encryption against Resetting Attacks. 1316 - Hosein Hadipour, Nasour Bagheri, Ling Song:
Improved Rectangle Attacks on SKINNY and CRAFT. 1317 - Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno:
A Direct Construction for Asymptotically Optimal zkSNARKs. 1318 - Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu:
On Succinct Arguments and Witness Encryption from Groups. 1319 - Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher. 1320 - Akinori Hosoyamada, Tetsu Iwata:
Provably Quantum-Secure Tweakable Block Ciphers. 1321 - Sebastian Paul, Patrik Scheible:
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication. 1322 - Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren:
CSI-RAShi: Distributed key generation for CSIDH. 1323 - Aniruddha Biswas, Palash Sarkar:
Separation Results for Boolean Function Classes. 1324 - Adrián Ranea, Bart Preneel:
On Self-Equivalence Encodings in White-Box Implementations. 1325 - Chris Brzuska, Geoffroy Couteau:
Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness. 1326 - Joël Alwen, Daniel Jost, Marta Mularczyk:
On The Insider Security of MLS. 1327 - Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. 1328 - Pratyay Mukherjee:
Adaptively secure Threshold Symmetric-key Encryption. 1329 - Anders P. K. Dalskov, Daniel Escudero, Marcel Keller:
Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. 1330 - Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme. 1331 - Ashley Fraser, Elizabeth A. Quaglia:
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting. 1332 - Vanesa Daza, Carla Ràfols, Alexandros Zacharakis:
Updateable Inner Product Argument with Logarithmic Verifier and Applications. 1333 - Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures. 1334 - Jihoon Cho, Jincheol Ha, Seongkwang Kim, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon:
Hybrid Framework for Approximate Computation over Encrypted Data. 1335 - Esra Yeniaras, Murat Cenk:
Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation. 1336 - Achintya Desai, Shubham Raj, Kannan Srinathan:
Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary. 1337 - Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Optimized Architectures for Elliptic Curve Cryptography over Curve448. 1338 - Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang:
New Approaches for Quantum Copy-Protection. 1339 - Yu Xue:
Homomorphic Evaluation of the SM4. 1340 - Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran:
Zero-Communication Reductions. 1341 - Sikhar Patranabis, Debdeep Mukhopadhyay:
Forward and Backward Private Conjunctive Searchable Symmetric Encryption. 1342 - Ward Beullens:
Improved Cryptanalysis of UOV and Rainbow. 1343 - Akinori Hosoyamada, Tetsu Iwata:
Indifferentiability of SKINNY-HASH Internal Functions. 1344 - Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. 1345 - Shlomi Dolev, Ziyu Wang:
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts. 1346 - Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall:
A Systematic Appraisal of Side Channel Evaluation Strategies. 1347 - Martha Norberg Hovd, Martijn Stam:
Vetted Encryption. 1348 - Howard M. Heys:
Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes. 1349 - Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein:
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics. 1350 - Ashrujit Ghoshal, Stefano Tessaro:
Tight State-Restoration Soundness in the Algebraic Group Model. 1351 - Linda Chen, Jun Wan:
Reducing Round Complexity of Byzantine Broadcast. 1352 - Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience. 1353 - Nicholas Genise, Baiyu Li:
Gadget-Based iNTRU Lattice Trapdoors. 1354 - Charanjit S. Jutla, Nathan Manohar:
Modular Lagrange Interpolation of the Mod Function for Bootstrapping for Approximate HE. 1355 - Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. 1356 - Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei:
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries. 1357 - Hagar Dolev, Shlomi Dolev:
Toward Provable One Way Functions. 1358 - Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay S. Kaleyski:
On two fundamental problems on APN power functions. 1359 - Vivek Arte, Mihir Bellare, Louiza Khati:
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design. 1360 - Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz:
Tight adaptive reprogramming in the QROM. 1361 - Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz:
Lattice-Based Proof-of-Work for Post-Quantum Blockchains. 1362 - Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal:
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching. 1363 - Matthew Campagna, Adam Petcher:
Security of Hybrid Key Encapsulation. 1364 - Zhengjun Cao, Lihua Liu, Leming Hong:
Evaluation Methods for Chebyshev Polynomials. 1365 - Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. 1366 - Loïc Etienne:
Costs of an Attack Against Proof-of-Work. 1367 - Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil:
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices. 1368 - Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud:
Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View. 1369 - Daniel J. Bernstein:
A discretization attack. 1370 - Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi:
Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory. 1371 - Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. 1372 - Clément Hoffmann, Pierrick Méaux, Thomas Ricosset:
Transciphering, using FiLIP and TFHE for an efficient delegation of computation. 1373 - Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM : A Low-Latency and Scalable Memory Encryption Scheme. 1374 - M. Bigdeli, E. De Negri, M. M. Dizdarevic, Elisa Gorla, R. Minko, S. Tsakou:
Semi-regular sequences and other random systems of equations. 1375 - Elisa Gorla, Daniela Müller, Christophe Petit:
Stronger bounds on the cost of computing Groebner bases for HFE systems. 1376 - Bas Westerbaan:
When to Barrett reduce in the inverse NTT. 1377 - Alex Lombardi, Vinod Vaikuntanathan:
Multi-Input Correlation-Intractable Hash Functions via Shift-Hiding. 1378 - (Withdrawn) Blockchain Driven Access Control Mechanisms, Models and Frameworks: A State of the Art Review. 1379
- Borja Gómez:
Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two. 1380 - Jia-Ch'ng Loh, Geong Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong:
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates. 1381 - Tapas Pal, Ratna Dutta:
Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE. 1382 - Il-Ju Kim, Taeho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han:
Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium. 1383 - Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa:
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds. 1384 - Cyril Bouvier, Laurent Imbert:
An Alternative Approach for SIDH Arithmetic. 1385 - Pratish Datta, Ilan Komargodski, Brent Waters:
Decentralized Multi-Authority ABE for DNFs from LWE. 1386 - (Withdrawn) FB-Tree: Highly Efficient Tree-Based Index for Encrypted Boolean Queries in Smart Cities. 1387
- Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah:
Signcryption in a Quantum World. 1388 - Jan Vacek, Jan Václavek:
Key Mismatch Attack on NewHope Revisited. 1389 - Jean-Philippe Aumasson, Adrian Hamelink, Omer Shlomovits:
A Survey of ECDSA Threshold Signing. 1390 - Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Interactive Proofs for Quantum Black-Box Computations. 1391 - Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee:
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation. 1392 - Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux:
On the Effectiveness of Time Travel to Inject COVID-19 Alerts. 1393 - Zhihao Zheng, Jiachen Shen, Zhenfu Cao:
Practical and Secure Circular Range Search on Private Spatial Data. 1394 - Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Post-Quantum Multi-Party Computation. 1395 - Kyoohyung Han, Jinhyuck Jeong, Jung Hoon Sohn, Yongha Son:
Efficient Privacy Preserving Logistic Regression Inference and Training. 1396 - Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang:
NTT Multiplication for NTT-unfriendly Rings. 1397 - Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei:
A huge class of infinite sequences of minimal binary linear codes with or without crossing the Ashikhmin-Barg's bound. 1398 - Diana Maimut, George Teseleanu:
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption. 1399 - Balthazar Bauer, Georg Fuchsbauer, Chen Qian:
Transferable E-cash: A Cleaner Model and the First Practical Instantiation. 1400 - Zvika Brakerski, Henry Yuen:
Quantum Garbled Circuits. 1401 - Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme:
SKINNY with Scalpel - Comparing Tools for Differential Analysis. 1402 - Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross:
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols. 1403 - Chen-Dong Ye, Tian Tian:
A Practical Key-Recovery Attack on 805-Round Trivium. 1404 - Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Hwajeong Seo:
Grover on GIFT. 1405 - Johannes Müller:
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting. 1406 - Palash Sarkar:
Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm. 1407 - Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer:
On Broadcast in Generalized Network and Adversarial Models. 1408 - Michael Walter:
The Convergence of Slide-type Reductions. 1409 - Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl:
Mac'n'Cheese: Zero-Knowledge Proofs for Arithmetic Circuits with Nested Disjunctions. 1410 - Ofer Grossman, Justin Holmgren, Eylon Yogev:
Transparent Error Correcting in a Computationally Bounded World. 1411 - Antigoni Polychroniadou, Yifan Song:
Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields. 1412 - Daniele Micciancio, Jessica Sorrell:
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers. 1413 - Anubhab Baksi:
New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version). 1414 - Jamie Cui, Chaochao Chen, Li Wang:
Highly-Scalable Protected Graph Database Search with Oblivious Filter. 1415 - Congwei Zhou, Bin Hu, Jie Guan:
Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity. 1416 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl:
Correlated Pseudorandom Functions from Variable-Density LPN. 1417 - Xavier Bonnetain, Samuel Jaques:
Quantum Period Finding against Symmetric Primitives in Practice. 1418 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors. 1419 - Hoeteck Wee:
Functional Encryption for Quadratic Functions from k-Lin, Revisited. 1420 - Nir Bitansky, Noa Eizenstadt, Omer Paneth:
Weakly Extractable One-Way Functions. 1421 - Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung:
Non-interactive classical verification of quantum computation. 1422 - Anne Broadbent, Rabib Islam:
Quantum encryption with certified deletion. 1423 - Chengdong Tao, Albrecht Petzoldt, Jintai Ding:
Improved Key Recovery of the HFEv- Signature Scheme. 1424 - Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni:
Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads. 1425 - Jonathan Bootle, Alessandro Chiesa, Jens Groth:
Linear-Time Arguments with Sublinear Verification from Tensor Codes. 1426 - Alessandro Chiesa, Eylon Yogev:
Barriers for Succinct Arguments in the Random Oracle Model. 1427 - Dakshita Khurana, Muhammad Haris Mughees:
On Statistical Security in Two-Party Computation. 1428 - Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai:
On Computational Shortcuts for Information-Theoretic PIR. 1429 - Dana Dachman-Soled:
Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures. 1430 - Huijia Lin, Tianren Liu, Hoeteck Wee:
Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More. 1431 - Shweta Agrawal, Shota Yamada:
CP-ABE for Circuits (and more) in the Symmetric Key Setting. 1432 - Liran Katzir, Clara Shikhelman, Eylon Yogev:
Interactive Proofs for Social Graphs. 1433 - Ran Canetti, Oxana Poburinnaya:
Towards Multiparty Computation Withstanding Coercion of All Parties. 1434 - Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains. 1435 - Michael John Jacobson Jr., Prabhat Kushwaha:
Removable Weak Keys for Discrete Logarithm Based Cryptography. 1436 - Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas:
Round-Optimal and Communication-Efficient Multiparty Computation. 1437 - Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay:
Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers. 1438 - Kevin Kenny Niehage:
Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module. 1439 - Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii:
SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures. 1440 - Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder:
PayMo: Payment Channels For Monero. 1441 - Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob. 1442 - Poulami Das, Julia Hesse, Anja Lehmann:
DPaSE: Distributed Password-Authenticated Symmetric Encryption. 1443 - Marco Calderini, Lilya Budaghyan, Claude Carlet:
On known constructions of APN and AB functions and their relation to each other. 1444 - Daniel J. Bernstein, Henri Gilbert, Meltem Sönmez Turan:
Observations on COMET. 1445 - Samuel Dittmer, Yuval Ishai, Rafail Ostrovsky:
Line-Point Zero Knowledge and Its Applications. 1446 - Thomas Attema, Ronald Cramer, Matthieu Rambaud:
Compressed Sigma-Protocols for Bilinear Circuits and Applications to Logarithmic-Sized Transparent Threshold Signature Schemes. 1447 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments. 1448 - Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE. 1449 - Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente:
Subversion-Resilient Enhanced Privacy ID. 1450 - Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof:
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs. 1451 - Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth:
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. 1452 - Jing Yang, Fang-Wei Fu:
New (k, l, m)-verifiable multi-secret sharing schemes based on XTR public key system. 1453 - Giulio Malavolta:
Circuit Privacy for Quantum Fully Homomorphic Encryption. 1454 - Yan Yan, Elisabeth Oswald, Srinivas Vivek:
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage. 1455 - Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg:
How to Abuse and Fix Authenticated Encryption Without Key Commitment. 1456 - Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. 1457 - Cihangir Tezcan:
Analysis of Ascon, DryGASCON, and Shamash Permutations. 1458 - Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay:
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates. 1459 - Benjamin Wesolowski, Ryan Williams:
Lower bounds for the depth of modular squaring. 1461 - Leonie Reichert, Samuel Brack, Björn Scheuermann:
Ovid: Message-based Automatic Contact Tracing. 1462 - Mustafa Khairallah:
Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA. 1463 - Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen:
Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort. 1464 - Mohammad Amin Rakeei, Farokhlagha Moazami:
Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network. 1465 - Naoya Okanami, Ryuya Nakamura, Takashi Nishide:
Load Balancing for Sharded Blockchains. 1466 - Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
Making the BKW Algorithm Practical for LWE. 1467 - Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version). 1468 - Jiayu Zhang:
Succinct Blind Quantum Computation Using a Random Oracle. 1469 - Songze Li, David Tse:
TaiJi: Longest Chain Availability with BFT Fast Confirmation. 1470 - James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma:
On The Round Complexity of Two-Party Quantum Computation. 1471 - Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Víctor Mateu:
Enhancing Code Based Zero-knowledge Proofs using Rank Metric. 1472 - Leonie Reichert, Samuel Brack, Björn Scheuermann:
Lighthouses: A Warning System for Super-Spreader Events. 1473 - Andrew M. Mironov:
New method of verifying cryptographic protocols based on the process model. 1474 - Kwangsu Lee:
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption. 1475 - Andreas Richardson, Jiahua Xu:
Carbon Trading with Blockchain. 1476 - Thomas Haines, Rajeev Goré, Jack Stodart:
Machine-checking the universal verifiability of ElectionGuard. 1477 - David Galindo, Jia Liu:
Robust Subgroup Multi-Signatures for Consensus. 1478 - Anupam Pattanayak, Subhasish Dhal, Sourav Kanti Addya:
Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain. 1479 - Matthieu Rambaud:
Malicious Security Comes for Free in Consensus with Leaders. 1480 - Shai Halevi, Victor Shoup:
Design and implementation of HElib: a homomorphic encryption library. 1481 - Andrea Basso, Sujoy Sinha Roy:
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber. 1482 - Eric Crockett:
A Low-Depth Homomorphic Circuit for Logistic Regression Model Training. 1483 - Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao:
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin. 1484 - Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN. 1485 - Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert:
CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs. 1486 - James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma:
One-Way Functions Imply Secure Computation in a Quantum World. 1487 - Jun Yan:
General Properties of Quantum Bit Commitment. 1488 - Christian Badertscher, Julia Hesse, Vassilis Zikas:
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger. 1489 - Angèle Bossuat, Xavier Bultel:
Unlinkable and Invisible γ-Sanitizable Signatures. 1490 - Julia Len, Paul Grubbs, Thomas Ristenpart:
Partitioning Oracle Attacks. 1491 - Thomas Kaeding:
Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices. 1492 - Daniel J. Bernstein:
Verified fast formulas for control bits for permutation networks. 1493 - Seyedeh Sharareh Mirzargar, Gaiëtan Renault, Andrea Guerrieri, Mirjana Stojilovic:
Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs. 1494 - Seyedeh Sharareh Mirzargar, Andrea Guerrieri, Mirjana Stojilovic:
CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors. 1495 - Mikhail Anokhin:
Pseudo-Free Families and Cryptographic Primitives. 1496 - Michael Scott:
A note on the calculation of some functions in finite fields: Tricks of the Trade. 1497 - Olivier Sanders, Jacques Traoré:
EPID with Malicious Revocation. 1498 - Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. 1499 - Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan:
Oblivious Transfer is in MiniQCrypt. 1500 - Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart:
PANCAKE: Frequency Smoothing for Encrypted Data Stores. 1501 - Kamil Kluczniak:
Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques. 1502 - Satoshi Okada, Yuntao Wang:
Key Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER. 1503 - Ben Nassi, Lior Rokach, Yuval Elovici:
The Age of Testifying Wearable Devices: The Case of Intoxication Detection. 1504 - Mariusz Jurkiewicz:
Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model. 1505 - Gabrielle De Micheli, Nadia Heninger:
Recovering cryptographic keys from partial information, by example. 1506 - Mike Hamburg, Mike Tunstall, Qinglai Xiao:
Improvements to RSA key generation and CRT on embedded devices. 1507 - Nico Döttling, Giulio Malavolta, Sihang Pu:
A Combinatorial Approach to Quantum Random Functions. 1508 - Kevin Lewi, Payman Mohassel, Arnab Roy:
Single-Message Credential-Hiding Login. 1509 - Jun Yan:
Quantum Computationally Predicate-Binding Commitment with Application in Quantum Zero-Knowledge Argument for NP. 1510 - Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi:
Balancing Privacy and Accountability in Blockchain Transactions. 1511 - Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze:
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking. 1512 - Mike Hamburg:
Indifferentiable hashing from Elligator 2. 1513 - Tabitha Ogilvie, Rachel Player, Joe Rowell:
Improved privacy-preserving training using fixed-Hessian minimisation. 1514 - Konstantin Kalgin, Valeriya Idrisova:
The classification of quadratic APN functions in 7 variables. 1515 - Alin Tomescu:
How to compute all Pointproofs. 1516 - Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
On Leakage-Resilient Secret Sharing. 1517 - Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici:
Botnet IND: About Botnets of Botless IoT Devices. 1518 - Sven Schäge, Jörg Schwenk, Sebastian Lauer:
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. 1519 - Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez:
The SQALE of CSIDH: Square-root vélu Quantum-resistant isogeny Action with Low Exponents. 1520 - Rui Morais, Paul Andrew Crocker, Simão Melo de Sousa:
Delegated RingCT: faster anonymous transactions. 1521 - Weikeng Chen, Alessandro Chiesa, Emma Dauterman, Nicholas P. Ward:
Reducing Participation Costs via Incremental Verification for Ledger Systems. 1522 - Yaobin Shen, Lei Wang, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting. 1523 - Elena Andreeva, Amit Singh Bhati, Damian Vizár:
Nonce-Misuse Security of the SAEF Authenticated Encryption mode. 1524 - Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson:
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. 1525 - Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim:
Flexible and Efficient Verifiable Computation on Encrypted Data. 1526 - Jonathan Bootle, Alessandro Chiesa, Siqi Liu:
Zero-Knowledge Succinct Arguments with a Linear-Time Prover. 1527 - Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa:
On the Concurrent Composition of Quantum Zero-Knowledge. 1528 - Claude Carlet:
On the image set size of differentially uniform functions and related bounds on their nonlinearity and their distance to affine functions. 1529 - Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh:
Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks. 1530 - Francesca Falzon, Evangelia Anna Markatou, William Schor, Roberto Tamassia:
Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions. 1531 - Dan Boneh, Dmitry Kogan, Katharine Woo:
Oblivious Pseudorandom Functions from Isogenies. 1532 - Baiyu Li, Daniele Micciancio:
On the Security of Homomorphic Encryption on Approximate Numbers. 1533 - Seonghyuck Lim, Jonghyeok Lee, Dong-Guk Han:
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition. 1534 - Anna M. Johnston:
Designer Primes. 1535 - Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme. 1536 - (Withdrawn) Comments on " Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve". 1537
- Timothy J. Hodges, Sergio Molina:
Homological Characterization of bounded F2-regularity. 1538 - Marc Fischlin, Felix Günther, Philipp Muth:
Information-Theoretic Security of Cryptographic Channels. 1539 - Martin R. Albrecht, Nadia Heninger:
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem. 1540 - Ziyuan Liang, Weiran Liu, Fan Zhang, Bingsheng Zhang, Jian Liu, Lei Zhang, Kui Ren:
A Framework of Private Set Intersection Protocols. 1541 - Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar:
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version). 1542 - Deepraj Pandey, Nandini Agrawal, Mahabir Prasad Jhanwar:
CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing. 1543 - Rachit Rawat, Mahabir Prasad Jhanwar:
PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update. 1544 - Howard M. Heys:
A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications. 1545 - Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider:
PEM: Privacy-preserving Epidemiological Modeling. 1546 - Ariel Hamlin, Mayank Varia:
Two-server Distributed ORAM with Sublinear Computation and Constant Rounds. 1547 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors. 1548 - Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, HyungChul Kang, Jong-Seon No:
High-Precision Approximate Homomorphic Encryption by Error Variance Minimization. 1549 - Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin:
Foundations of Ring Sampling. 1550 - Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta:
Multi-Client Oblivious RAM with Poly-Logarithmic Communication. 1551 - Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt:
Threshold Password-Hardened Encryption Services. 1552 - Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh:
A Novel Asymmetric Searchable Encryption Scheme with Granting search capability. 1553 - Xiaolu Hou, Jakub Breier, Shivam Bhasin:
DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel. 1554 - Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki:
Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange. 1555 - Daniel Escudero, Anders P. K. Dalskov:
Honest Majority MPC with Abort with Minimal Online Communication. 1556 - Javad Doliskani:
Efficient Quantum Public-Key Encryption From Learning With Errors. 1557 - Thomas Pornin:
Double-Odd Elliptic Curves. 1558 - Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks. 1559 - Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref:
Modified Cache Template Attack on AES. 1560 - Ryan Karl, Jonathan Takeshita, Taeho Jung:
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance. 1561 - Claude Carlet, Pierrick Méaux:
A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers. 1562 - Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder:
Verifiable Timed Signatures Made Practical. 1563 - Anna M. Johnston, Rathna Ramesh:
Prime Proof Protocol. 1564 - Amira Barki, Aline Gouget:
Achieving privacy and accountability in traceable digital currency. 1565 - Mohammad Amin Rakeei, Farokhlagha Moazami:
An efficient and provably secure authenticated key agreement scheme for mobile edge computing. 1566 - Yadi Ye, Leyou Zhang, Yi Mu, Wenting You:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. 1567 - Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich:
Compact Certificates of Collective Knowledge. 1568 - Atsuki Momose, Ling Ren:
Optimal Communication Complexity of Byzantine Agreement, Revisited. 1569 - Onur Günlü, Rafael F. Schaefer:
Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary. 1570 - Olivier Blazy, Laura Brouilhet, Céline Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud:
Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server. 1571 - (Withdrawn) Achieve Fully Decentralized End to End encryption meeting via Blockchain. 1572
- Lira Wang:
Halo 0.9: A Halo Protocol with Fully-Succinctness. 1573 - Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph K. Liu:
Analysing Mining Machine Shutdown Price. 1574 - Loïc Ferreira:
(In)security of the Radio Interface in Sigfox. 1575 - Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. 1576 - Alessandro N. Baccarini, Marina Blanton, Chen Yuan:
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning. 1577 - Tung Chou:
An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM. 1578 - Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. 1579 - Conor McMenamin, Vanesa Daza, Matteo Pontecorvi:
Achieving State Machine Replication without Honesty Assumptions. 1580 - Jung Hee Cheon, Seungwan Hong, Duhyeong Kim:
Remark on the Security of CKKS Scheme in Practice. 1581 - Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application. 1582 - Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Panos Papadimitratos:
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System. 1583 - Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff:
Post-Quantum Hash-Based Signatures for Secure Boot. 1584 - Timothy J. Hodges, Hari Iyer:
Semi-Regularity of Pairs of Boolean Polynomials. 1585 - Alex Ozdemir, Fraser Brown, Riad S. Wahby:
Unifying Compilers for SNARKs, SMT, and More. 1586 - Claude Carlet:
On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences. 1587 - Shweta Agrawal, Shafi Goldwasser, Saleet Mossel:
Deniable Fully Homomorphic Encryption. 1588 - Siyao Guo, Qian Li, Qipeng Liu, Jiapeng Zhang:
Unifying Presampling via Concentration Bounds. 1589 - Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak:
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. 1590 - Kai-Min Chung, T.-H. Hubert Chan, Ting Wen, Elaine Shi:
Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions. 1591 - Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce M. Maggs:
Puncturable Pseudorandom Sets and Private Information Retrieval with Polylogarithmic Bandwidth and Sublinear Time. 1592 - Edward Eaton, David Jao, Chelsea Komlo:
Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies. 1593 - HyungChul Kang, Joon-Woo Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No:
Bootstrapping on SEAL. 1594 - Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Attack Beyond-Birthday-Bound MACs in Quantum Setting. 1595 - Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi:
Batched Differentially Private Information Retrieval. 1596 - Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Improved AES S-box With Enhanced Properties. 1597 - Manoj Kumar, Tarun Yadav:
MILP Based Differential Attack on Round Reduced WARP. 1598 - Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou:
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing. 1599 - Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. 1600 - Rami Khalil, Naranker Dulay:
Adaptive layer-two dispute periods in blockchains. 1601 - Aurélien Greuet, Simon Montoya, Guénaël Renault:
Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor. 1602 - Takashi Nishide:
One-Time Delegation of Unlinkable Signing Rights and Its Application. 1603 - Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen:
An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits. 1604 - Alexander R. Block, Simina Brânzei, Hemanta K. Maji, Himanshi K. Mehta, Tamalika Mukherjee, Hai H. Nguyen:
P4-free Partition and Cover Numbers. 1605 - Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu:
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption. 1606 - Shumo Chu, Qiudong Xia, Zhenfei Zhang:
Manta: Privacy Preserving Decentralized Exchange. 1607 - Daniel J. Bernstein:
Cryptographic competitions. 1608 - Amar Bapic, Enes Pasalic:
A new method for secondary constructions of vectorial bent functions. 1609 - Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion:
New directions in the ransomware phenomenon. 1610 - Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung:
SLAP: Simple Lattice-Based Private Stream Aggregation Protocol. 1611 - Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-Wei Fu, Chenyu Wang:
A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. 1612 - Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta:
Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures. 1613 - Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. 1614 - Jiangtao Yuan, Guoai Xu, Guosheng Xu:
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. 1615 - Fan Peng, Hao Chen, Chang-An Zhao:
Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold. 1616 - Steve Thakur:
Arguments of Knowledge via hidden order groups. 1617 - Benedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner:
Proof-Carrying Data without Succinct Arguments. 1618 - Paul Kirchner, Pierre-Alain Fouque:
Getting Rid of Linear Algebra in Number Theory Problems. 1619 - Yi Chen, Hongbo Yu:
Neural Aided Statistical Attack for Cryptanalysis. 1620
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.