


default search action
IACR Cryptology ePrint Archive, Volume 2025
Volume 2025, 2025
- Shweta Agrawal, Simran Kumari, Shota Yamada:
Attribute Based Encryption for Turing Machines from Lattices. 1 - Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou:
Voting with coercion resistance and everlasting privacy using linkable ring signatures. 2 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC with Faster TCP Fallbacks. 3 - Radhika Garg, Xiao Wang:
Smaug: Modular Augmentation of LLVM for MPC. 4 - Tanusree Sharma, Mizanur Rahman, Silvia Sandhi, Yang Wang, Rifat Shahriyar, S. M. Taiabul Haque:
What is "legal" and "illegal?": Social Norms, Current Practices and Perceived Risks among the Cryptocurrency Users in Bangladesh. 5 - Ittai Abraham, Renas Bacho, Julian Loss, Gilad Stern:
Nearly Quadratic Asynchronous Distributed Key Generation. 6 - Daniel Nager:
Non Linearizable Entropic Operator. 7 - Angold Wang:
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials. 8 - Merve Karabulut, Reza Azarderakhsh:
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust. 9 - Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
A Combinatorial Approach to IoT Data Security. 10 - Dipayan Saha, Farimah Farahmandi:
DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal. 11 - Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede:
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell. 12 - José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega:
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms. 13 - Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark M. Tehranipoor:
SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity. 14 - Jianjun Hu:
A New Method for Solving Discrete Logarithm Based on Index Calculus. 15 - Yuval Efron, Ertem Nusret Tas:
Dynamically Available Common Subset. 16 - Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo:
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version). 17 - Maxime Bombar, Nicolas Resch, Emiel Wiedijk:
On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography. 18 - Hao Chung, Ke Wu, Elaine Shi:
Foundations of Platform-Assisted Auctions. 19 - Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong:
ProbeShooter: A New Practical Approach for Probe Aiming. 20 - Thomas Johansson, Mustafa Khairallah, Vu Nguyen:
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem. 21 - Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei:
Leveled Functional Bootstrapping via External Product Tree. 22 - Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri:
Cryptography is Rocket Science: Analysis of BPSec. 23 - Olivier Blazy, Emmanuel Conchon, Philippe Gaborit, Philippe Krejci, Cristina Onete:
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited. 24 - Ky Nguyen:
Chosen-Ciphertext Security for Inner Product FE: Multi-Client and Multi-Input, Generically. 25 - Wakaha Ogata, Toi Tomita, Kenta Takahashi, Masakatsu Nishigaki:
How to use your brain for cryptography without trustworthy machines. 26 - Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler:
Constant time lattice reduction in dimension 4 with application to SQIsign. 27 - Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei, Liuyu Yang:
Extending Groth16 for Disjunctive Statements. 28 - Dongyu Wu:
Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol. 29 - Jingwei Hu, Zhiqi Liu, Cong Zuo:
Delegated Multi-party Private Set Intersection from Secret Sharing. 30 - Varun Madathil, Alessandra Scafuro, Tanner Verber:
Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH. 31 - Alessandra Scafuro, Tanner Verber:
A New Paradigm for Server-Aided MPC. 32 - Laia Amorós, James Clements, Chloe Martindale:
Parametrizing Maximal Orders Along Supersingular ℓ-Isogeny Paths. 33 - Alex Evans, Nicolas Mohnblatt, Guillermo Angeris:
ZODA: Zero-Overhead Data Availability. 34 - Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao:
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience. 35 - Aydin Abadi, Yvo Desmedt:
Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers. 36 - Daniel A. Nagy, János Tapolcai, István András Seres, Bence Ladóczki:
Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon. 37 - Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate:
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains. 38 - Huayi Qi, Minghui Xu, Xiaohua Jia, Xiuzhen Cheng:
VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness. 39 - Keitaro Hashimoto, Shuichi Katsumata, Thom Wiggers:
Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol. 40 - Omid Mirzamohammadi, Jan Bobolz, Mahdi Sedaghat, Emad Heydari Beni, Aysajan Abidin, Dave Singelée, Bart Preneel:
Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure. 41 - James Clements:
Structural Results for Maximal Quaternion Orders and Connecting Ideals of Prime Power Norm in Bp,∞. 42 - Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh:
SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models. 43 - Jeffrey Champion, Yao-Ching Hsieh, David J. Wu:
Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE. 44 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay:
IND-CPAC: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption. 45 - Benny Applebaum, Oded Nir:
The Meta-Complexity of Secret Sharing. 46 - Shweta Agrawal, Giulio Malavolta, Tianwei Zhang:
Time-Lock Puzzles from Lattices. 47 - Jianqiao Cambridge Mo, Brandon Reagen:
ABLE: Optimizing Mixed Arithmetic and Boolean Garbled Circuit. 48 - Theophilus Agama:
On the gap between terms in an addition chain. 49 - Elodie Ngoie Mutombo, Mike Wa Nkongolo, Mahmut Tokmak:
Cryptojacking detection using local interpretable model-agnostic explanations. 50 - Ziqi Zhu, Kai Zhang, Zhili Chen, Junqing Gong, Haifeng Qian:
Black-Box Registered ABE from Lattices. 51 - Yashvanth Kondi, Divya Ravi:
Separating Broadcast from Cheater Identification. 52 - Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo:
Founding Zero-Knowledge Proofs of Training on Optimum Vicinity. 53 - Hyunjung Son, Seunghun Paik, Yunki Kim, Sunpill Kim, Heewon Chung, Jae Hong Seo:
Doubly Efficient Fuzzy Private Set Intersection for High-dimensional Data with Cosine Similarity. 54 - Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner:
Hash-Based Multi-Signatures for Post-Quantum Ethereum. 55 - Xichao Hu, Lin Jiao:
Partial-guess, Pre-sieve, Greedy-search - New Unified Key Recovery Framework of Impossible Boomerang Attacks: Full-round Attack on ARADI. 56 - Bhargav Nagaraja Bhatt, Fatemeh Shirazi, Alistair Stewart:
Trustless Bridges via Random Sampling Light Clients. 57 - Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger:
Skyscraper: Fast Hashing on Big Primes. 58 - Hossein Hafezi, Aditi Partap, Sourav Das, Joseph Bonneau:
Fair Signature Exchange. 59 - Shuang Sun, Eleftheria Makri:
SoK: Multiparty Computation in the Preprocessing Model. 60 - Thibauld Feneuil, Matthieu Rivain:
CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures. 61 - Kathrin Hövelmanns, Mikhail A. Kudinov:
Treating dishonest ciphertexts in post-quantum KEMs - explicit vs. implicit rejection in the FO transform. 62 - Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Tao Shang, Yuling Chen, Zongpeng Li:
PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems. 63 - Faxing Wang, Shaanan Cohney, Joseph Bonneau:
SoK: Trusted setups for powers-of-tau strings. 64 - Lev Soukhanov, Yaroslav Rebenko:
Morgana: a laconic circuit builder. 65 - Jaehyung Kim:
Efficient Homomorphic Integer Computer from CKKS. 66 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Constant latency and finality for dynamically available DAG. 67 - Jonas Nick, Liam Eagen, Robin Linus:
Shielded CSV: Private and Efficient Client-Side Validation. 68 - Oskar Goldhahn:
On Composing Generic Voting Schemes for Improved Privacy. 69 - Andrew Lewis-Pye, Tim Roughgarden:
Beyond Optimal Fault-Tolerance. 70 - Hossein Abdinasibfar, Camille Nuoskala, Antonis Michalas:
The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption. 71 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Sam Martin, Taeho Jung:
PSMT: Private Segmented Membership Test for Distributed Record Linkage. 72 - Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Xichao Hu, Linchun Wan, Hongwei Sun, Qi Su:
Conditional Constant Function Problem and Its Quantum Solutions: Attacking Feistel Ciphers. 73 - Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, Tao Wei:
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. 74 - Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye:
Further Improvements in AES Execution over TFHE: Towards Breaking the 1 sec Barrier. 75 - Vojtech Suchanek, Vladimir Sedlacek, Marek Sýs:
Decompose and conquer: ZVP attacks on GLV curves. 76 - Eri Nakajima, Keisuke Hara, Kyosuke Yamashita:
On Multi-Key FuncCPA Secure Encryption Schemes. 77 - Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Thomas Prest, Rolfe Schmidt:
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol. 78 - Upasana Mandal, Shubhi Shukla, Nimish Mishra, Sarani Bhattacharya, Paritosh Saxena, Debdeep Mukhopadhyay:
Uncovering Security Vulnerabilities in Intel Trust Domain Extensions. 79 - Véronique Cortier, Alexandre Debant, Pierrick Gaudry:
Breaking verifiability and vote privacy in CHVote. 80 - Iftach Haitner, Yehuda Lindell, Nikolaos Makriyannis:
Integer Commitments, Old and New Tools. 81 - Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:
Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. 82 - Tiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate:
Recover from Excessive Faults in Partially-Synchronous BFT SMR. 83 - Yijia Chang, Songze Li:
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity. 84 - Michele Battagliola, Giacomo Borin, Giovanni Di Crescenzo, Alessio Meneghetti, Edoardo Persichetti:
Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements. 85 - Ahmed Alharbi, Charles Bouillaguet:
Artificial Results From Hardware Synthesis. 86 - Maiara F. Bollauf, Maja Lie, Cong Ling:
On Gaussian Sampling for q-ary Lattices and Linear Codes with Lee Weight. 87 - Aydin Abadi, Amirreza Sarencheh, Henry Skeoch, Thomas Zacharias:
ICT: Insured Cryptocurrency Transactions. 88 - Hayder Tirmazi, Tien Phuoc Tran:
An Introduction to Protein Cryptography. 89 - Fangan-Yssouf Dosso, Nadia El Mrabet, Nicolas Méloni, François Palma, Pascal Véron:
Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System. 90 - Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi:
poqeth: Efficient, post-quantum signature verification on Ethereum. 91 - Jake Doliskani:
Public-Key Quantum Money From Standard Assumptions (In The Generic Model). 92 - Indranil Thakur, Angshuman Karmakar, Chaoyun Li, Bart Preneel:
A Survey on Transciphering and Symmetric Ciphers for Homomorphic Encryption. 93 - Geoffroy Couteau, Lalita Devadas, Aditya Hegde, Abhishek Jain, Sacha Servan-Schreiber:
Multi-Key Homomorphic Secret Sharing. 94 - Elette Boyle, Lalita Devadas, Sacha Servan-Schreiber:
Non-Interactive Distributed Point Functions. 95 - Elette Boyle, Abhishek Jain, Sacha Servan-Schreiber, Akshayaram Srinivasan:
Simultaneous-Message and Succinct Secure Computation. 96 - Mingfei Zhang, Rujia Li, Xueqian Lu, Sisi Duan:
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake. 97 - Maxence Brugeres, Victor Languille, Petr Kuznetsov, Hamza Zarfaoui:
Fast, private and regulated payments in asynchronous networks. 98 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus. 99 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Zero-Knowledge Proofs of Quantumness. 100 - Mateusz Lesniak, Michal Wronski, Ewa Syta, Miroslaw Kutylowski:
Unveiling Privacy Risks in Quantum Optimization Services. 101 - Antoine Bak:
A practical distinguisher on the full Skyscraper permutation. 102 - Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang:
Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes. 103 - Nir Bitansky, Saroja Erabelli, Rachit Garg:
Additive Randomized Encodings from Public Key Encryption. 104 - Srinath T. V. Setty, Justin Thaler:
Twist and Shout: Faster memory checking arguments via one-hot addressing and increments. 105 - Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, Hochang Lee, Jong Hwan Park:
NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions. 106 - Fabio Campos, Andreas Hellenbrand, Michael Meyer, Krijn Reijnders:
dCTIDH: Fast & Deterministic CTIDH. 107 - Samir Bouftass:
Subset sum, a new insight. 108 - Wasilij Beskorovajnov, Sarai Eilebrecht, Yufan Jiang, Jörn Müller-Quade:
A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework. 109 - Gaspard Anthoine, Daniele Cozzo, Dario Fiore:
Verification-efficient Homomorphic Signatures for Verifiable Computation over Data Streams. 110 - Alain Couvreur, Rakhi Pratihar, Nihan Tanisali, Ilaria Zappatore:
On the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis. 111 - Marija Mikic, Mihajlo Srbakoski, Strahinja Praska:
Post-Quantum Stealth Address Protocols. 112 - James Hsin-Yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl:
Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. 113 - Cyrius Nugier, Jean-Christophe Deneuville:
Better Codes for the HQC Cryptosystem. 114 - Keitaro Hashimoto, Wakaha Ogata, Yusuke Sakai:
Signatures with Tight Adaptive Corruptions from Search Assumptions. 115 - Jonas Schupp, Georg Sigl:
A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). 116 - Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan:
Post-Quantum Online/Offline Signatures. 117 - Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov:
How to Prove False Statements: Practical Attacks on Fiat-Shamir. 118 - Nouri Alnahawi, David Haas, Erik Mauß, Alexander Wiesmaier:
SoK: PQC PAKEs - Cryptographic Primitives, Design and Security. 119 - Katharina Boudgoust, Hannah Keller:
Module Learning with Errors with Truncated Matrices. 120 - Vasyl Ustimenko:
On symbolic computations over arbitrary commutative rings and cryptography with the temporal Jordan-Gauss graphs. 121 - Yunhao Wang, Fan Zhang:
Qelect: Lattice-based Single Secret Leader Election Made Practical. 122 - Thomas Pornin:
Falcon on ARM Cortex-M4: an Update. 123 - Ali Sah Özcan, Erkay Savas:
GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes. 124 - Hayder Tirmazi:
A Privacy Model for Classical & Learned Bloom Filters. 125 - Chang Chen, Guoyu Yang, Qi Chen, Wei Wang, Jin Li:
Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding. 126 - Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini:
A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures. 127 - Ivan Bjerre Damgård, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen:
Asynchronous YOSO a la Paillier. 128 - Benedikt Bünz, Tushar Mopuri, Alireza Shirzad, Sriram Sridhar:
DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions. 129 - Neekon Vafa, Vinod Vaikuntanathan:
Symmetric Perceptrons, Number Partitioning and Lattices. 130 - Xavier Bultel, Charles Olivier-Anclin:
On the Anonymity of Linkable Ring Signatures. 131 - Ryan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs:
Distributional Private Information Retrieval. 132 - Henry Bambury, Phong Q. Nguyen:
Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms. 133 - Minghang Li, Qianhong Wu, Zhipeng Wang, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding:
TockOwl: Asynchronous Consensus with Fault and Network Adaptability. 134 - Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski:
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies. 135 - Pierrick Gaudry, Julien Soumier, Pierre-Jean Spaenlehauer:
Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces. 136 - Jonas Bertels, Hilder V. L. Pereira, Ingrid Verbauwhede:
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs. 137 - Jeremiah Blocki, Seunghoon Lee:
Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM. 138 - Rabiah Alnashwan, Benjamin Dowling, Bhagya Wimalasiri:
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. 139 - Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin:
HELP: Everlasting Privacy through Server-Aided Randomness. 140 - Nico Döttling, Jesko Dujmovic, Antoine Joux:
Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials. 141 - Karthikeyan Bhargavan, Maxime Buyse, Lucas Franceschino, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters:
hax: Verifying Security-Critical Rust Software using Multiple Provers. 142 - Simon Holmgaard Kamp:
A New Way to Achieve Round-Efficient Asynchronous Byzantine Agreement. 143 - George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz:
KZH-Fold: Accountable Voting from Sublinear Accumulation. 144 - Reuven Yakar, Avishai Wool, Eyal Ronen:
Breaking RSA with Overclocking-induced GPU Faults. 145 - Jinyi Qiu, Aydin Aysu:
SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis. 146 - Maria Corte-Real Santos, Craig Costello, Sam Frengley:
Efficient algorithms for the detection of (N,N)-splittings and endomorphisms. 147 - Vincent Diemunsch, Lucca Hirschi, Steve Kremer:
A Comprehensive Formal Security Analysis of OPC UA. 148 - Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu:
Practical Asynchronous Distributed Key Reconfiguration and Its Applications. 149 - Craig Costello, Gaurish Korpal:
On pairs of primes with small order reciprocity. 150 - Alex B. Grilo, Ramis Movassagh:
Quantum function secret sharing. 151 - Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World. 152 - Sarah Arpin, Jun Bo Lau, Ray A. Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur:
Error floor prediction with Markov models for QC-MDPC codes. 153 - Phillip Gajland, Vincent Hwang, Jonas Janneck:
Shadowfax: Combiners for Deniability. 154 - Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan:
Cycles and Cuts in Supersingular L-Isogeny Graphs. 155 - Athish Pranav Dharmalingam, Sai Venkata Krishnan, K. R. Sivaramakrishnan, N. S. Narayanaswamy:
TallyGuard: Privacy Preserving Tallied-as-cast Guarantee. 156 - Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek:
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis. 157 - Jianing Zhang, Haoyang Wang:
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool. 158 - Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song, Qianqian Yang:
A Holistic Framework for Impossible Boomerang Attacks. 159 - Claude Carlet, Palash Sarkar:
The Nonlinear Filter Model of Stream Cipher Redivivus. 160 - Foteini Baldimtsi, Julia Kastner, Julian Loss, Omar Renawi:
Secure Showing of Partial Attributes. 161 - Francesca Falzon, Tianxin Tang:
Learning from Functionality Outputs: Private Join and Compute in the Real World. 162 - Olivier Bernard, Marc Joye:
Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys. 163 - Rishab Goyal, Saikumar Yadugiri:
Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions. 164 - Jiacheng Gao, Yuan Zhang, Sheng Zhong:
Shuffle Shamir Secret Shares Uniformly with Linear Online Communication. 165 - Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti, Pakize Sanal:
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography. 166 - Mahdi Soleimani, Grace Jia, In Gim, Seung-Seob Lee, Anurag Khandelwal:
Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services. 167 - Oriol Farràs, Miquel Guiot:
Revisiting Beimel-Weinreb Weighted Threshold Secret Sharing Schemes. 168 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
Efficient Pseudorandom Correlation Generators for Any Finite Field. 169 - Mohamed Abdelmonem, Lukas Holzbaur, Håvard Raddum, Alexander Zeh:
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. 170 - Alex Charlès, Aleksei Udovenko:
A light white-box masking scheme using Dummy Shuffled Secure Multiplication. 171 - Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu:
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice. 172 - Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Skoric, Idelfonso Tafur Monroy, Sebastian R. Verschoor:
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography. 173 - Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Sri Aravinda Krishnan Thyagarajan:
VITARIT: Paying for Threshold Services on Bitcoin and Friends. 174 - Joël Alwen, Georg Fuchsbauer, Marta Mularczyk:
Updatable Public-Key Encryption, Revisited. 175 - Aniket Kate, Easwar Vivek Mangipudi, Charan Nomula, Raghavendra Ramesh, Athina Terzoglou, Joshua Tobkin:
HyperLoop: Rationally secure efficient cross-chain bridge. 176 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
On the Power of Sumcheck in Secure Multiparty Computation. 177 - Chao Niu, Muzhou Li, Jifu Zhang, Meiqin Wang:
Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON. 178 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
Higher-Order Deterministic Masking with Application to Ascon. 179 - Di Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu, Wu Wen, Kui Ren, Chun Chen:
On the Atomicity and Efficiency of Blockchain Payment Channels. 180 - Max Duparc, Mounir Taha:
Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber. 181 - Zhiyuan An, Fangguo Zhang:
Deny Whatever You Want: Dual-Deniable Public-Key Encryption. 182 - Apostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos, Minos N. Garofalakis:
OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments. 183 - Orfeas Stefanos Thyfronitis Litos, Zhaoxuan Wu, Alfredo Musumeci, Songyun Hu, James Helsby, Michael Breza, William Knottenbelt:
NodeChain: Cheap Data Integrity Without Consensus. 184 - Marcel Nageler, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder:
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions. 185 - Maher Mamah:
Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves. 186 - Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:
Asymptotic improvements to provable algorithms for the code equivalence problem. 187 - Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba:
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. 188 - Madhurima Mukhopadhyay:
Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding. 189 - Jad Silbak, Daniel Wichs:
Binary Codes for Error Detection and Correction in a Computationally Bounded World. 190 - Cruz Barnum, David Heath:
Adaptive Distributional Security: A Framework for Input-Adaptive Cryptography. 191 - Shivam Bhasin, Dirmanto Jap, Marina Krcek, Stjepan Picek, Prasanna Ravi:
Practical Electromagnetic Fault Injection on Intel Neural Compute Stick 2. 192 - Julien Béguinot, Loïc Masure:
On the Average Random Probing Model. 193 - Sarisht Wadhwa, Julian Ma, Thomas Thiery, Barnabé Monnot, Luca Zanolini, Fan Zhang, Kartik Nayak:
AUCIL: An Inclusion List Design for Rational Parties. 194 - Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin:
Finding a polytope: A practical fault attack against Dilithium. 195 - Dimitri Koshelev, Antonio Sanso:
Endomorphisms for Faster Cryptography on Elliptic Curves of Moderate CM Discriminants, II. 196 - Tim Beyne, Michiel Verbauwhede:
Cryptanalysis of a nonlinear filter-based stream cipher. 197 - Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, Yunhao Fu, Jiafeng Hua, Yi Chen, Bo Zhang, Yier Jin, Jin Dong, Zhenyu Guan:
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption. 198 - Mi-Ying Miryam Huang, Xinyu Mao, Jiapeng Zhang:
Sublinear Proofs over Polynomial Rings. 199 - Hao Guo, Liqiang Peng, Haiyang Xue, Li Peng, Weiran Liu, Zhe Liu, Lei Hu:
Improved Secure Two-party Computation from a Geometric Perspective. 200 - Hyeonhak Kim, Donghoe Heo, Seokhie Hong:
Search and Verify Isogeny-Based Quantum Money with Rational Points. 201 - Alex B. Grilo, Ami Paz, Mor Perry:
Distributed Non-Interactive Zero-Knowledge Proofs. 202 - Intak Hwang, Seonhong Min, Yongsoo Song:
Ciphertext-Simulatable HE from BFV with Randomized Evaluation. 203 - Guilherme Rito, Christopher Portmann, Chen-Da Liu-Zhang:
Simpler and Stronger Models for Deniable Authentication. 204 - Arad Kotzer, Bence Ladóczki, János Tapolcai, Ori Rottenstreich:
Addressing Scalability Issues of Blockchains with Hypergraph Payment Networks. 205 - Xinhai Wang, Lin Ding, Zhengting Li, Jiang Wan, Bin Hu:
Revisiting the Differential-Linear Attacks on ChaCha from IEEE TIT and INDOCRYPT 2024 (Extended Abstract). 206 - Jian Guo, Wenjie Nan:
Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree. 207 - Mahdi Cheraghchi, Nikhil Shagrithaya, Alexandra Veliche:
Reductions Between Code Equivalence Problems. 208 - Ahmet Ramazan Agirtas, James Ball, Michael Belegris, Gustave Charles-Saigne:
NovaTEE: Private Clearing and Settlement on Trusted Execution Hardware. 209 - Meng Hao, Weiran Liu, Liqiang Peng, Cong Zhang, Pengfei Wu, Lei Zhang, Hongwei Li, Robert H. Deng:
Practical Keyword Private Information Retrieval from Key-to-Index Mappings. 210 - Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Prior-Based Label Differential Privacy via Secure Two-Party Computation. 211 - Zhenyu Huang, Fuxin Zhang, Dongdai Lin:
Constructing Quantum Implementations with the Minimal T-depth or Minimal Width and Their Applications. 212 - Jiang Yu:
An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG. 213 - Yuanyuan Zhou, Weijia Wang, Yiteng Sun, Yu Yu:
Rejected Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks. 214 - Daniël M. H. van Gent:
A note on the genus of the HAWK lattice. 215 - Intak Hwang, Seonhong Min, Yongsoo Song:
Practical Circuit Privacy/Sanitization for TFHE. 216 - Erik-Oliver Blass, Guevara Noubir:
Assumption-Free Fuzzy PSI via Predicate Encryption. 217 - Hayder Tirmazi:
LSM Trees in Adversarial Environments. 218 - János Tapolcai, Bence Ladóczki, Dániel A. Nagy:
Slot a la carte: Centralization Issues in Ethereum's Proof-of-Stake Protocol. 219 - Nico Döttling, Alexander Koch, Sven Maier, Jeremias Mechler, Anne Müller, Jörn Müller-Quade, Marcel Tieplet:
The Quantum Decoherence Model: Everlasting Composable Secure Computation and More. 220 - Brandon Goodell, Rigo Salazar, Freeman Slaughter:
Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. 221 - Tim Beyne, Yu Long Chen, Michiel Verbauwhede:
A Robust Variant of ChaCha20-Poly1305. 222 - Yael Eisenberg, Christopher Havens, Alexis Korb, Amit Sahai:
Building Hard Problems by Combining Easy Ones: Revisited. 223 - Jian Liu, Kui Ren, Chun Chen:
Lightweight Single-Server PIR with Oλ(n1/3) Communication. 224 - Jiajun Xin, Dimitrios Papadopoulos:
"Check-Before-you-Solve": Verifiable Time-lock Puzzles. 225 - Jesús-Javier Chi-Domínguez:
Improved Subfield Curve Search For Specific Field Characteristics. 226 - Alessandro Budroni, Andre Esser, Ermes Franch, Andrea Natale:
Two Is All It Takes: Asymptotic and Concrete Improvements for Solving Code Equivalence. 227 - Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen:
Network agnostic consensus in constant time. 228 - Cas Cremers, Esra Günsay, Vera Wesselkamp, Mang Zhao:
ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420. 229 - Amik Raj Behera, Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank. 230 - Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki:
NoIC: PAKE from KEM without Ideal Ciphers. 231 - Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu:
Authenticated BitGC for Actively Secure Rate-One 2PC. 232 - Davide Carnemolla, Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Resistant Encryption: the Good, the Bad and the Ugly. 233 - Joseph Bonneau, Jessica Chen, Miranda Christ, Ioanna Karantaidou:
Merkle Mountain Ranges are Optimal: On witness update frequency for cryptographic accumulators. 234 - Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Doubly Efficient Cryptography: Commitments, Arguments and RAM MPC. 235 - Sora Suegami, Enrico Bottazzi:
Diamond iO: A Straightforward Construction of Indistinguishability Obfuscation from Lattices. 236 - Jiayu Xu:
UC-Security of Encrypted Key Exchange: A Tutorial. 237 - Matteo Campanelli, Mario Carrillo, Ignacio Cascudo, Dario Fiore, Danilo Francati, Rosario Gennaro:
On the Power of Polynomial Preprocessing: Proving Computations in Sublinear Time, and More. 238 - Amirreza Sarencheh, Hamidreza Khoshakhlagh, Alireza Kavousi, Aggelos Kiayias:
DART: Decentralized, Anonymous, and Regulation-friendly Tokenization. 239 - Michele Ciampi, Lorenzo Magliocco, Daniele Venturi, Yu Xia:
Robust Non-Interactive Zero-Knowledge Combiners. 240 - Peyman Momeni, Fig Smith:
IBE-IBE: Intent-Based Execution through Identity-Based Encryption and Auctions. 241 - Tiantian Gong, Zeyu Liu:
Rational Secret Sharing with Competition. 242 - Wonseok Choi, Xiangyu Liu, Lirong Xia, Vassilis Zikas:
K-Linkable Ring Signatures and Applications in Generalized Voting. 243 - Jianwei Li:
Provable Speedups for SVP Approximation Under Random Local Blocks. 244 - Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR. 245 - Fatima Elsheimy, Julian Loss, Charalampos Papamanthou:
Towards Optimal Early Stopping Agreement Protocols. 246 - Dan Boneh, Binyi Chen:
LatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems. 247 - Hanbeom Shin, Seonkyu Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong:
New Exchanged Boomerang Distinguishers for 5-Round AES. 248 - Wenqian Li, Hanyu Wei, Shiyu Shen, Hao Yang, Wangchen Dai, Yunlei Zhao:
cuFalcon: An Adaptive Parallel GPU Implementation for High-Performance Falcon Acceleration. 249 - Rohit Chatterjee, Xiao Liang, Omkant Pandey, Takashi Yamakawa:
The Round Complexity of Black-Box Post-Quantum Secure Computation. 250 - Abtin Afshar, Rishab Goyal:
Verifiable Streaming Computation and Step-by-Step Zero-Knowledge. 251 - Florian Hirner, Florian Krieger, Sujoy Sinha Roy:
Chiplet-Based Techniques for Scalable and Memory-Aware Multi-Scalar Multiplication. 252 - Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu:
Adaptively Secure IBE from Lattices with Asymptotically Better Efficiency. 253 - Liqiang Liu, Tianren Liu, Bo Peng:
Garbled Lookup Tables from Homomorphic Secret Sharing. 254 - Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang:
Tighter Security Notions for a Modular Approach to Private Circuits. 255 - Daniel Alabi, Lav R. Varshney:
Inaccessible Entropy for Watermarking Generative Agents. 256 - Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic. 257 - Marc Rivinius:
MPC with Publicly Identifiable Abort from Pseudorandomness and Homomorphic Encryption. 258 - Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum:
Improved Resultant Attack against Arithmetization-Oriented Primitives. 259 - Yujin Oh, Kyungbae Jang, Hwajeong Seo:
Quantum Security Evaluation of ASCON. 260 - Fengrun Liu, Haofei Liang, Tianyu Zhang, Yuncong Hu, Xiang Xie, Haisheng Tan, Yu Yu:
HasteBoots: Proving FHE Bootstrapping in Seconds. 261 - Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu:
PKE and ABE with Collusion-Resistant Secure Key Leasing. 262 - Yuanju Wei, Xinxuan Zhang, Yi Deng:
Transparent SNARKs over Galois Rings. 263 - Yanbo Chen:
Dazzle: Improved Adaptive Threshold Signatures from DDH. 264 - Fuyuki Kitagawa, Ryo Nishimaki:
White-Box Watermarking Signatures against Quantum Adversaries and Its Applications. 265 - Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang:
Memory-Efficient BKW Algorithm for Solving the LWE Problem. 266 - Sander Q. Dijkhuis:
Authentication and sole control at a high level of assurance on widespread smartphones with threshold signatures. 267 - Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar:
휔(1/휆)-Rate Boolean Garbling Scheme from Generic Groups. 268 - Geoffroy Couteau, Naman Kumar:
10-Party Sublinear Secure Computation from Standard Assumptions. 269 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
A Decomposition Approach for Evaluating Security of Masking. 270 - Arthur Herlédan Le Merdy, Benjamin Wesolowski:
Unconditional foundations for supersingular isogeny-based cryptography. 271 - Lukas Aumayr, Zeta Avarikioti, Iosif Salem, Stefan Schmid, Michelle Yeo:
X-Transfer: Enabling and Optimizing Cross-PCN Transactions. 272 - Vahid Jahandideh, Jan Schoone, Lejla Batina:
Clustering Approach for Higher-Order Deterministic Masking. 273 - Veronika Kuchta, Jason T. LeGrow, Edoardo Persichetti:
Post-Quantum Blind Signatures from Matrix Code Equivalence. 274 - Nigel P. Smart, Michael Walter:
Error-Simulatable Sanitization for TFHE and Applications. 275 - Julius Hermelink, Kai-Chun Ning, Richard Petri:
Finding and Protecting the Weakest Link: On Side-Channel Attacks on Masked ML-DSA. 276 - Sara Montanari, Riccardo Longo, Alessio Meneghetti:
Tighter Control for Distributed Key Generation: Share Refreshing and Expressive Reconstruction Policies. 277 - Sonia Belaïd, Matthieu Rivain, Mélissa Rossi:
New Techniques for Random Probing Security and Application to Raccoon Signature Scheme. 278 - Dan Boneh, Benedikt Bünz, Kartik Nayak, Lior Rotem, Victor Shoup:
Context-Dependent Threshold Decryption and its Applications. 279 - Bill Allombert, Alice Pellet-Mary, Wessel P. J. van Woerden:
Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes. 280 - Anasuya Acharya, Karen Azari, Mirza Ahad Baig, Dennis Hofheinz, Chethan Kamath:
Securely Instantiating 'Half Gates' Garbling in the Standard Model. 281 - Jules Baudrin, Sonia Belaïd, Nicolas Bon, Christina Boura, Anne Canteaut, Gaëtan Leurent, Pascal Paillier, Léo Perrin, Matthieu Rivain, Yann Rotella, Samuel Tap:
Transistor: a TFHE-friendly Stream Cipher. 282 - Yifan Song, Xiaxi Ye:
Honest Majority MPC with Õ(|C|) Communication in Minicrypt. 283 - Ali Dogan, Sermin Kocaman:
S2DV: Scalable and Secure DAO Voting. 284 - Mohammed Barhoush, Ryo Nishimaki, Takashi Yamakawa:
MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations. 285 - Ignacio Cascudo, Anamaria Costache, Daniele Cozzo, Dario Fiore, Antonio Guimarães, Eduardo Soria-Vazquez:
Verifiable Computation for Approximate Homomorphic Encryption Schemes. 286 - Clémence Chevignard, Guilhem Mureau, Thomas Espitau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet:
A reduction from Hawk to the principal ideal problem in a quaternion algebra. 287 - David Gérault, Anna Hambitzer, Eyal Ronen, Adi Shamir:
How to Securely Implement Cryptography in Deep Neural Networks. 288 - Sabyasachi Dey, Subhamoy Maitra, Santanu Sarkar, Nitin Kumar Sharma:
Significantly Improved Cryptanalysis of Salsa20 With Two-Round Criteria. 289 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security. 290 - Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree:
A Note on Adaptive Security in Hierarchical Identity-Based Encryption. 291 - Tamar Ben David, Anat Paskin-Cherniavsky:
Tight Lower Bounds and New Upper Bounds For Evolving CDS. 292 - Yevgeniy Dodis, Eli Goldin:
Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still Alive. 293 - Wilson D. Nguyen, Srinath T. V. Setty:
Neo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments. 294 - Vladimir Kolesnikov, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal:
Stationary Syndrome Decoding for Improved PCGs. 295 - Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang, Yu Yu, Yuwen Zhang:
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers. 296 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer:
Practical Zero-Trust Threshold Signatures in Large-Scale Dynamic Asynchronous Networks. 297 - Ruben Gonzalez:
Stateless Hash-Based Signatures for Post-Quantum Security Keys. 298 - Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz, Fabrizio Sisinni:
(Un)breakable curses - re-encryption in the Fujisaki-Okamoto transform. 299 - Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi, Bo Peng:
Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval. 300 - Kazuma Wariki, Atsushi Fujioka, Akira Nagai, Kan Yasuda:
Making Protocol FSU Revocable. 301 - Xinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng, Xianhui Lu:
FHE-SNARK vs. SNARK-FHE: From Analysis to Practical Verifiable Computation. 302 - Ittai Abraham, Eli Chouatt, Ivan Damgård, Yossi Gilad, Gilad Stern, Sophia Yakoubov:
Asynchronous Algorand: Reaching Agreement with Near Linear Communication and Constant Expected Time. 303 - Koen de Boer, Wessel P. J. van Woerden:
Lattice-based Cryptography: A survey on the security of the lattice-based NIST finalists. 304 - Gennaro Avitabile, Vincenzo Botta, Emanuele Giunta, Marcin Mielniczuk, Francesco Migliaro:
The Malice of ELFs: Practical Anamorphic-Resistant Encryption without Random Oracles. 305 - Antoine Joux, Julian Loss, Giacomo Santato:
Dimensional eROSion: Improving the ROS Attack with Decomposition in Higher Bases. 306 - Yaohua Ma, Chenxin Dai, Elaine Shi:
Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications. 307 - Yanis Belkheyar, Patrick Derbez, Shibam Ghosh, Gregor Leander, Silvia Mella, Léo Perrin, Shahram Rasoolzadeh, Lukas Stennes, Siwei Sun, Gilles Van Assche, Damian Vizár:
ChiLow and ChiChi: New Constructions for Code Encryption. 308 - Wonseok Choi, Daniel Collins, Xiangyu Liu, Vassilis Zikas:
A Unified Treatment of Anamorphic Encryption. 309 - Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr:
Non-Interactive Key Exchange: New Notions, New Constructions, and Forward Security. 310 - Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr, Jesper Buus Nielsen, Christoph Striecks, Daniele Venturi:
Malleable SNARKs and Their Applications. 311 - Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Verifiable Random Functions. 312 - Lizhen Zhang, Shang Gao, Bin Xiao:
Lattice-based Σ-Protocols for Polynomial Relations with Standard Soundness. 313 - Yu Long Chen, Avijit Dutta, Ashwin Jha, Mridul Nandi:
Towards Optimally Secure Deterministic Authenticated Encryption Schemes. 314 - Antonio Flórez-Gutiérrez, Eran Lambooij, Gaëtan Leurent, Håvard Raddum, Tyge Tiessen, Michiel Verbauwhede:
Cryptanalysis of Full SCARF. 315 - Albert Garreta, Hendrik Waldner, Katerina Hristova, Luca Dall'Ava:
Zinc: Succinct Arguments with Small Arithmetization Overheads from IOPs of Proximity to the Integers. 316 - Nico Döttling, Jesko Dujmovic, Julian Loss, Maciej Obremski:
Minicrypt PIR for Big Batches. 317 - Karim Baghery, Ehsan Ebrahimi, Omid Mirzamohammadi, Mahdi Sedaghat:
Traceable Verifiable Secret Sharing and Applications. 318 - Jinyi Qiu:
Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator. 319 - Shan Chen, Vukasin Karadzic:
Committing Authenticated Encryption: Generic Transforms with Hash Functions. 320 - Roberto Avanzi, Orr Dunkelman, Shibam Ghosh:
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm's FEAT_PACQARMA3 Feature. 321 - William J. Buchanan, Hisham Ali:
Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis. 322 - Yao-Ching Hsieh, Brent Waters, David J. Wu:
A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model. 323 - Josh Alman, Yizhi Huang, Kevin Yeo:
Fine-Grained Complexity in a World without Cryptography. 324 - Mark Zhandry:
On Quantum Money and Evasive Obfuscation. 325 - Anasuya Acharya, Karen Azari, Chethan Kamath:
On the Adaptive Security of Free-XOR-based Garbling Schemes in the Plain Model. 326 - Gil Segev:
Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension. 327 - Amit Deo, Benoît Libert:
Fully Asymmetric Anamorphic Homomorphic Encryption from LWE. 328 - Gal Arnon, Eylon Yogev:
Towards a White-Box Secure Fiat-Shamir Transformation. 329 - Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai:
(Multi-Input) FE for Randomized Functionalities, Revisited. 330 - Hengcheng Zhou:
Private Multi-Party Neural Network Training over ℤ2k via Galois Rings. 331 - Daniel Collins, Simone Colombo, Sina Schaeffler:
Towards Leakage-Resilient Ratcheted Key Exchange. 332 - Lena Heimberger, Daniel Kales, Riccardo Lolato, Omid Mir, Sebastian Ramacher, Christian Rechberger:
Leap: A Fast, Lattice-based OPRF With Application to Private Set Intersection. 333 - Benny Applebaum, Eliran Kachlon:
How to Share an NP Statement or Combiners for Zero-Knowledge Proofs. 334 - Calvin Abou Haidar, Dipayan Das, Anja Lehmann, Cavit Özbay, Octavio Perez-Kempner:
Privacy-Preserving Multi-Signatures: Generic Techniques and Constructions Without Pairings. 335 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits. 336 - Sebastian Faust, Loïc Masure, Elena Micheli, Hai Hoang Nguyen, Maximilian Orlt, François-Xavier Standaert:
Efficient IP Masking with Generic Security Guarantees under Minimum Assumptions. 337 - Zhiyuan Zhang, Gilles Barthe:
CT-LLVM: Automatic Large-Scale Constant-Time Analysis. 338 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More. 339 - Martin R. Albrecht, Benjamin Bencina, Russell W. F. Lai:
Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE. 340 - Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman:
CCA-Secure Traceable Threshold (ID-based) Encryption and Application. 341 - Jan Bormet, Jonas Hofmann, Hussien Othman:
Traceable Threshold Encryption without Trusted Dealer. 342 - Lewis Glabush, Kathrin Hövelmanns, Douglas Stebila:
Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms. 343 - Liang Zhang, Dongliang Cai, Tao Liu, Haibin Kan, Jiheng Zhang, Haibin Zhang, Sisi Duan:
Publicly Verifiable Generalized Secret Sharing and Its Application in Building Decentralized Exchange. 344 - Tao Liu, Liang Zhang, Haibin Kan, Jiheng Zhang:
Publicly Verifiable Threshold Proxy Re-encryption and Its Application in Data Rights Confirmation. 345 - Dan Boneh, Jaehyung Kim:
Homomorphic Encryption for Large Integers from Nested Residue Number Systems. 346 - Yansong Zhang, Xiaojun Chen, Qinghui Zhang, Ye Dong, Xudong Chen:
Helix: Scalable Multi-Party Machine Learning Inference against Malicious Adversaries. 347 - Nora Trapp, Diego Ongaro:
Juicebox Protocol: Distributed Storage and Recovery of Secrets Using Simple PIN Authentication. 348 - Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri Aravinda Krishnan Thyagarajan:
Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once. 349 - Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang:
Bootstrapping with RMFE for Fully Homomorphic Encryption. 350 - Xiuhan Lin, Shiduo Zhang, Yang Yu, Weijia Wang, Qidi You, Ximing Xu, Xiaoyun Wang:
Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure. 351 - Michele Ciampi, Ivan Visconti:
Efficient NIZK Arguments with Straight-Line Simulation and Extraction. 352 - Anja Lehmann, Phillip Nazarian, Cavit Özbay:
Stronger Security for Threshold Blind Signatures. 353 - Michele Ciampi, Jure Sternad, Yu Xia:
Delayed-Input Multi-Party Computation. 354 - Anja Lehmann, Cavit Özbay:
Commit-and-Prove System for Vectors and Applications to Threshold Signing. 355 - Adrien Dubois, Michael Klooß, Russell W. F. Lai, Ivy K. Y. Woo:
Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions. 356 - Hayder Tirmazi:
Random Number Generation from Pulsars. 357 - Elette Boyle, Ilan Komargodski, Neekon Vafa:
The Complexity of Memory Checking with Covert Security. 358 - Shai Levin:
A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol. 359 - Kalle Jyrkinen, Russell W. F. Lai:
Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials. 360 - Yuejun Wang, Baocang Wang, Qiqi Lai, Huaxiong Wang:
Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality. 361 - Jeongsu Kim, Aaram Yun:
Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification. 362 - Haruhisa Kosuge, Keita Xagawa:
The Security of Hash-and-Sign with Retry against Superposition Attacks. 363 - Xuan Thanh Do, Dang Truong Mac, Ky Nguyen, Duong Hieu Phan, Quoc-Huy Vu:
Traitor Tracing in Multi-sender Setting (sfTMCFE: Traceable Multi-client Functional Encryption). 364 - Joël Alwen, Georg Fuchsbauer, Marta Mularczyk, Doreen Riepel:
Lattice-Based Updatable Public-Key Encryption for Group Messaging. 365 - Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim:
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY. 366 - Martin R. Albrecht, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo:
Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally. 367 - Amos Beimel, Oriol Farràs, Adriana Moya:
Polynomial Secret Sharing Schemes and Algebraic Matroids. 368 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Zhusen Liu:
Higher Residuosity Attacks on Small RSA Subgroup Decision Problems. 369 - Shalini Banerjee, Tapas Pal, Andy Rupp, Daniel Slamanig:
Simple Public Key Anamorphic Encryption and Signature using Multi-Message Extensions. 370 - Aydin Abadi, Mohammad Naseri:
Functional Oblivious Transfer with Applications in Privacy-Preserving Machine Learning. 371 - Wouter Castryck, Thomas Decru, Péter Kutas, Abel Laval, Christophe Petit, Yan Bo Ti:
KLPT²: Algebraic Pathfinding in Dimension Two and Applications. 372 - Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Sina Shiehian, Rohit Sinha:
Split Prover Zero-Knowledge SNARKs. 373 - Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Vinod Vaikuntanathan:
Simple and General Counterexamples for Private-Coin Evasive LWE. 374 - Shweta Agrawal, Anuja Modi, Anshu Yadav, Shota Yamada:
Evasive LWE: Attacks, Variants & Obfustopia. 375 - Paul Frixons, Valerie Gilchrist, Péter Kutas, Simon-Philipp Merz, Christophe Petit:
Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs. 376 - Han Chen, Tao Huang, Phuong Pham, Shuang Wu:
HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency. 377 - Sönke Jendral, Elena Dubrova:
Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST. 378 - Marius A. Aardal, Andrea Basso, Luca De Feo, Sikhar Patranabis, Benjamin Wesolowski:
A Complete Security Proof of SQIsign. 379 - Michel Seck, Oumar Niang, Djiby Sow:
A New Generalized Attack on RSA-like Cryptosystems. 380 - Qi Zhang, Mingqiang Wang, Xiaopeng Cheng:
Faster FHEW Bootstrapping with Adaptive Key Update. 381 - Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song:
On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols. 382 - Ritam Bhaumik, Jean Paul Degabriele:
Pencil: A Domain-Extended PRF with Full n-bit Security \\ for Strengthening GCM and More. 383 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
Optimizing Final Exponentiation for Pairing-Friendly Elliptic Curves with Odd Embedding Degrees Divisible by 3. 384 - Liam Eagen, Ariel Gabizon:
MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs. 385 - Chenhao Jia, Tingting Cui, Qing Ling, Yan He, Kai Hu, Yu Sun, Meiqin Wang:
How Small Can S-boxes Be. 386 - Nathalie Lang, Jannis Leuther, Stefan Lucks:
Generic Composition: From Classical to Quantum Security. 387 - Ruben Baecker, Paul Gerhart, Jonathan Katz, Dominique Schröder:
Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures. 388 - Thomas Prévost, Bruno Martin, Olivier Alibart:
An ETSI GS QKD compliant TLS implementation. 389 - Yao-Ching Hsieh, Aayush Jain, Huijia Lin:
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions). 390 - Shafik Nassar, Brent Waters, David J. Wu:
Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity. 391 - Gewu Bu, Bilel Zaghdoudi, Maria Potop-Butucaru, Serge Fdida:
Blockchain-based Secure D2D localisation with adaptive precision. 392 - Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager:
An Efficient Quantum Oblivious Transfer Protocol. 393 - Barbara Jiabao Benedikt:
Reducing the Number of Qubits in Solving LWE. 394 - Intak Hwang, Yisol Hwang, Miran Kim, Dongwon Lee, Yongsoo Song:
Provably Secure Approximate Computation Protocols from CKKS. 395 - Thomas Peyrin, Quan Quan Tan, Hongyi Zhang, Chunning Zhou:
Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers. 396 - Dung Hoang Duong, Thanh Xuan Khuc, Youming Qiao, Willy Susilo, Chuanqi Zhang:
Blind Signatures from Cryptographic Group Actions. 397 - Tenma Edamura, Atsushi Takayasu:
Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model. 398 - Sayantan Ganguly, Shion Samadder Chaudhury:
Computational Quantum Anamorphic Encryption and Anamorphic Secret Sharing. 399 - Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Tang Gang, Yanbin Pan, Xiaoyun Wang:
Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions. 400 - Pierrick Dartois, Jonathan Komada Eriksen, Tako Boris Fouotsa, Arthur Herlédan Le Merdy, Riccardo Invernizzi, Damien Robert, Ryan Rueger, Frederik Vercauteren, Benjamin Wesolowski:
PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies. 401 - Chengcheng Chang, Kai Hu, Muzhou Li, Meiqin Wang:
Related-Key Differential and Boomerang Cryptanalysis in the Fixed-Key Model. 402 - Kai Hu, Chi Zhang, Chengcheng Chang, Jiashu Zhang, Meiqin Wang, Thomas Peyrin:
Periodic Table of Cryptanalysis: Geometric Approach with Different Bases. 403 - Johannes Reinhart, Erik-Oliver Blass, Björn Annighöfer:
SNARKs for Stateful Computations on Authenticated Data. 404 - Ramses Fernandez:
Withdrawable signatures in Fiat-Shamir with aborts constructions. 405 - Liang Zhang, Tao Liu, Zhanrong Ou, Haibin Kan, Jiheng Zhang:
AsyRand: fast asynchronous distributed randomness beacon with reconfiguration. 406 - Rishab Goyal, Saikumar Yadugiri:
Delegatable ABE with Full Security from Witness Encryption. 407 - Felix Günther, Michael Rosenberg, Douglas Stebila, Shannon Veitch:
Hybrid Obfuscated Key Exchange and KEMs. 408 - Hiroki Okada, Tsuyoshi Takagi:
Low Communication Threshold FHE from Standard (Module-)LWE. 409 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:
TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security. 410 - Nathalie Lang, Stefan Lucks, Bart Mennink, Suprita Talnikar:
Security of the Ascon Authenticated Encryption Mode in the Presence of Quantum Adversaries. 411 - Rishab Goyal, Saikumar Yadugiri:
Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More. 412 - Mohammad Hashemi, Shahin Tajik, Fatemeh Ganji:
Garblet: Multi-party Computation for Protecting Chiplet-based Systems. 413 - Mohsin Belam:
Deimos Cipher: A High-Entropy, Secure Encryption Algorithm with Strong Diffusion and Key Sensitivity. 414 - Miguel Cueto Noval, Simon-Philipp Merz, Patrick Stählin, Akin Ünal:
On the Soundness of Algebraic Attacks against Code-based Assumptions. 415 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Trapdoor Hash Functions and PIR from Low-Noise LPN. 416 - William J. Buchanan, Hisham Ali:
Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption. 417 - Ross Evans, Matthew McKague, Douglas Stebila:
ProofFrog: A Tool For Verifying Game-Hopping Proofs. 418 - Chaya Ganesh, Sikhar Patranabis, Nitin Singh:
Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments. 419 - Ojaswi Acharya, Suvasree Biswas, Weiqi Feng, Adam O'Neill, Arkady Yerukhimovich:
Non-Interactive Verifiable Aggregation. 420 - Tzu-Hsiang Huang, Wei-Hsiang Hung, Shota Yamada:
A Note on Obfuscation-based Attacks on Private-coin Evasive LWE. 421 - Kyoohyung Han, Seongkwang Kim, Yongha Son:
Private Computation on Common Fuzzy Records. 422 - Subhranil Dutta, Aikaterini Mitrokotsa, Tapas Pal, Jenit Tomy:
Multi-Client Attribute-Based Unbounded Inner Product Functional Encryption, and More. 423 - Neha Jawalkar, Nishanth Chandran, Divya Gupta, Rahul Sharma, Arkaprava Basu:
Matchmaker: Fast Secure Inference across Deployment Scenarios. 424 - Lucjan Hanzlik:
A Note on the Blindness of the Scheme from ePrint 2025/397. 425 - Keitaro Hashimoto, Shuichi Katsumata, Guillermo Pascual-Perez:
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable. 426 - Marc Fischlin, Aikaterini Mitrokotsa, Jenit Tomy:
BUFFing Threshold Signature Schemes. 427 - Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra:
On Improved Cryptanalytic Results against ChaCha for Reduced Rounds ≥ 7. 428 - Seonhong Min, Joon-woo Lee, Yongsoo Song:
Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation. 429 - Foteini Baldimtsi, Lucjan Hanzlik, Quan Nguyen, Aayush Yadav:
Non-interactive Anonymous Tokens with Private Metadata Bit. 430 - Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang:
Commitment Schemes Based on Module-LIP. 431 - Vincenzo Botta, Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi, Ivan Visconti:
Black-Box (and Fast) Non-Malleable Zero Knowledge. 432 - Akashdeep Saha, Siddhartha Chowdhury, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
MIDAS: an End-to-end CAD Framework for Automating Combinational Logic Locking. 433 - Shuai Han, Shengli Liu, Xiangyu Liu, Dawu Gu:
Fine-Grained Verifier NIZK and Its Applications. 434 - Thomas Pornin:
Constant-Time Code: The Pessimist Case. 435 - Chenzhi Zhu, Stefano Tessaro:
The Algebraic One-More MISIS Problem and Applications to Threshold Signatures. 436 - Antonio Flórez-Gutiérrez, Yosuke Todo:
Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing. 437 - Gideon Samid:
Transmitting Secrets by Transmitting only Plaintext. 438 - Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials. 439 - Mohamed Malhou, Ludovic Perret, Kristin E. Lauter:
AI for Code-based Cryptography. 440 - Matthias Trannoy:
High-Order Masking of BIKE. 441 - Yuval Ishai, Hanjun Li, Huijia Lin:
A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing. 442 - Alireza Kavousi, István András Seres:
Homomorphic Signature-based Witness Encryption and Applications. 443 - David Heath, Vladimir Kolesnikov, Varun Narayanan, Rafail Ostrovsky, Akash Shah:
Multiparty Garbling from OT with Linear Scaling and RAM Support. 444 - Gao Ming:
A proof of P≠NP (New symmetric encryption algorithm against any linear attacks and differential attacks). 445 - Tiantian Gong, Aniket Kate, Hemanta K. Maji, Hai H. Nguyen:
Disincentivize Collusion in Verifiable Secret Sharing. 446 - Yuval Ishai, Yifan Song:
Protecting Computations Against Continuous Bounded-Communication Leakage. 447 - Jai Hyun Park:
Ciphertext-Ciphertext Matrix Multiplication: Fast for Large Matrices. 448 - Feng Han, Xiao Lan, Weiran Liu, Lei Zhang, Hao Ren, Lin Qu, Yuan Hong:
Concretely Efficient Correlated Oblivious Permutation. 449 - Lewis Glabush, Felix Günther, Kathrin Hövelmanns, Douglas Stebila:
Verifiable Decapsulation: Recognizing Faulty Implementations of Post-Quantum KEMs. 450 - Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Eyal Ronen, Igors Stepanovs:
Analysis of the Telegram Key Exchange. 451 - Gideon Samid:
Polar Lattice Cryptography. 452 - Xiangyu Kong, Min Zhang, Yu Chen:
Verifiable Secret Sharing Based on Fully Batchable Polynomial Commitment for Privacy-Preserving Distributed Computation. 453 - Huinan Chen, Binbin Cai, Fei Gao, Song Lin:
Quantum circuit for implementing AES S-box with low costs. 454 - Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar:
StaMAC: Fault Protection via Stable-MAC Tags. 455 - Thomas Prévost, Bruno Martin, Olivier Alibart:
A Democratic Distributed Post-Quantum Certificateless Encryption Scheme. 456 - Thomas Prévost, Bruno Martin:
A 10-bit S-box generated by Feistel construction from cellular automata. 457 - Kathrin Hövelmanns, Andreas Hülsing, Mikhail A. Kudinov, Silvia Ritsch:
CAKE requires programming - On the provable post-quantum security of (O)CAKE. 458 - Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Kaishuo Cheng, Luís Esquível:
Revisiting the Security and Privacy of FIDO2. 459 - Truong Son Nguyen, Yi Ren, Guangyu Nie, Ni Trieu:
Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training. 460 - Thomas Haines, Rajeev Goré, Mukesh Tiwari:
Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth. 461 - Jianqiang Ni, Yingxin Li, Fukang Liu, Gaoli Wang:
Practical Key Collision on AES and Kiasu-BC. 462 - Sebastian Becker, Christoph Bösch, Benjamin Hettwer, Thomas Hoeren, Merlin Rombach, Sven Trieflinger, Hossein Yalame:
Multi-Party Computation in Corporate Data Processing: Legal and Technical Insights. 463 - Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. 464

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.