default search action
IACR Cryptology ePrint Archive, Volume 2023
Volume 2023, 2023
- Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions. 1 - Jeffrey Burdges, Handan Kilinç Alper, Alistair Stewart, Sergey Vasilyev:
Ethical identity, ring VRFs, and zero-knowledge continuations. 2 - Yan-Cheng Chang:
How to Use Sigstore without Sigstore. 3 - Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo:
Quantum Artificial Intelligence on Cryptanalysis. 4 - Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao:
Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud. 5 - Thomas Marquet, Elisabeth Oswald:
Exploring multi-task learning in the context of two masked AES implementations. 6 - Haodong Jiang, Zhi Ma, Zhenfeng Zhang:
Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query. 7 - Mick G. D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens:
AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis. 8 - Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE. 9 - Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson:
Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation. 10 - Sietse Ringers:
Using the RSA or RSA-B accumulator in anonymous credential schemes. 11 - Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin M. Case:
Delegated Private Matching for Compute. 12 - Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit:
M-SIDH and MD-SIDH: countering SIDH attacks by masking information. 13 - Antonio Guimarães, Hilder V. L. Pereira, Barry Van Leeuwen:
Amortized Bootstrapping Revisited: Simpler, Asymptotically-faster, Implemented. 14 - Yuyu Wang, Jiaxin Pan:
Unconditionally Secure NIZK in the Fine-Grained Setting. 15 - Katharina Boudgoust, Peter Scholl:
Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus. 16 - Oliver W. Gnilke, Jens Zumbrägel:
Cryptographic Group and Semigroup Actions. 17 - Zhenqiang Li, Fei Gao, Su-Juan Qin, Qiaoyan Wen:
New record in the number of qubits for a quantum implementation of AES. 18 - Marina Krcek, Guilherme Perin:
Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis. 19 - Amadou Tall:
The Scholz conjecture on addition chain is true for infinitely many integers with â"(2n) = â"(n). 20 - Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng:
DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers. 21 - Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu:
Recommendation for a holistic secure embedded ISA extension. 22 - Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme:
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. 23 - Alexandros Bakas, Antonis Michalas:
It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption. 24 - Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Quantum Attacks on Beyond-Birthday-Bound MACs. 25 - Hanno Böck:
Fermat Factorization in the Wild. 26 - Katharina Kreuzer:
Verification of the (1-δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform. 27 - Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov:
Information-Theoretic Distributed Point Functions. 28 - Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer:
Public Verification for Private Hash Matching. 29 - Aydin Abadi, Steven J. Murdoch:
Earn While You Reveal: Private Set Intersection that Rewards Participants. 30 - Jeffrey Burdges, Handan Kilinç Alper, Alistair Stewart, Sergey Vasilyev:
Sassafras and Semi-Anonymous Single Leader Election. 31 - Joseph Surin, Shaanan Cohney:
A Gentle Tutorial for Lattice-Based Cryptanalysis. 32 - Dankrad Feist, Dmitry Khovratovich:
Fast amortized KZG proofs. 33 - Jannik Zeitschner, Nicolai Müller, Amir Moradi:
PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries. 34 - Daniel Lammers, Nicolai Müller, Amir Moradi:
Glitch-free is not Enough - Revisiting Glitch-Extended Probing Model. 35 - Christina Boura, Margot Funk, Yann Rotella:
Differential analysis of the ternary hash function Troika. 36 - Kelong Cong, Yi-Fu Lai, Shai Levin:
Efficient Isogeny Proofs Using Generic Techniques. 37 - Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang:
On the Amortized Communication Complexity of Byzantine Broadcast. 38 - Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk:
Server-Supported Decryption for Mobile Devices. 39 - Shuqin Su, Bohan Yang, Vladimir Rozic, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu:
A Closer Look at the Chaotic Ring Oscillators based TRNG Design. 40 - Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion:
Quantum-Safe Protocols and Application in Data Security of Medical Records. 41 - Aymeric Genêt:
On Protecting SPHINCS+ Against Fault Attacks. 42 - David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic:
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks. 43 - Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels:
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. 44 - Manuela Horduna, Simona-Maria Lazarescu, Emil Simion:
A note on machine learning applied in ransomware detection. 45 - José Contreras:
Cognitive Cryptography using behavioral features from linguistic-biometric data. 46 - Raja Adhithan RadhaKrishnan:
Side-Channel Resistant Implementation Using Arbiter PUF. 47 - Marc Joye:
On-Line/Off-Line DCR-based Homomorphic Encryption and Applications. 48 - Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU. 49 - Alexandre Berzati, Andersson Calle Viera, Maya Chartouni, Steven Madec, Damien Vergnaud, David Vigilant:
A Practical Template Attack on CRYSTALS-Dilithium. 50 - Theophilus Agama:
A proof of the Scholz conjecture on addition chains. 51 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Putting the Online Phase on a Diet: Covert Security from Short MACs. 52 - Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi:
ð'3ð' : Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks. 53 - Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia:
On the Incoercibility of Digital Signatures. 54 - Nicu Neculache, Vlad-Andrei Petcu, Emil Simion:
An analysis of a scheme proposed for electronic voting systems. 55 - Trey Li:
Quantum Annealing for Subset Product and Noisy Subset Product. 56 - Max Ammann, Lucca Hirschi, Steve Kremer:
DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing. 57 - Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski:
SCALLOP: scaling the CSI-FiSh. 58 - Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang:
Oil and Vinegar: Modern Parameters and Implementations. 59 - Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng:
Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols. 60 - Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir:
Key-and-Signature Compact Multi-Signatures: A Compiler with Realizations. 61 - Mingxing Hu:
Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure. 62 - Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. 63 - Antonin Leroux:
Computation of Hilbert class polynomials and modular polynomials from supersingular elliptic curves. 64 - Jakub Klemsa, Melek Önen, Yavuz Akin:
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth. 65 - Alexandr Bulkin, Tim Dokchitser:
Plonkup scheme with multiple queries. 66 - Paulo S. L. M. Barreto, Gustavo H. M. Zanon:
Blind signatures from Zero-knowledge arguments. 67 - Shalini Banerjee, Steven D. Galbraith, Giovanni Russello:
Obfuscating Decision Trees. 68 - Prabhanjan Ananth, Zihan Hu, Henry Yuen:
On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions. 69 - (Withdrawn) A new side-channel attack on RSA prime numbers generation. 70
- Corina-Elena Bogos, Razvan Mocanu, Emil Simion:
A security analysis comparison between Signal, WhatsApp and Telegram. 71 - Geoffroy Couteau, Maryam Zarezadeh:
Non-Interactive Secure Computation of Inner-Product from LPN and LWE. 72 - Peng Yang, Zoe Lin Jiang, Shiqi Gao, Jiehang Zhuang, Hongxiao Wang, Junbin Fang, Siu-Ming Yiu, Yulin Wu:
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing. 73 - Geoffroy Couteau, Adi Rosén:
Random Sources in Private Computation. 74 - Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik:
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis. 75 - Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks. 76 - Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal. 77 - Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh:
An Efficient Multi-Signature Scheme for Blockchain. 78 - Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil:
The challenges of proving solvency while preserving privacy. 79 - Dimitris Mouris, Pratik Sarkar, Nektarios Georgios Tsoutsos:
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security. 80 - Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor:
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. 81 - Tarak Ben Youssef, Riad S. Wahby:
Specialized Proof of Confidential Knowledge (SPoCK). 82 - Surya Mathialagan, Neekon Vafa:
MacORAMa: Optimal Oblivious RAM with Integrity. 83 - GyuChol Kim:
Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin. 84 - Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-user Setting. 85 - Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner:
Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs. 86 - Katharina Kreuzer:
Verification of Correctness and Security Properties for CRYSTALS-KYBER. 87 - Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej:
Individual Cryptography. 88 - Benjamin Levy, Benjamin Sherman, Muhammad Ishaq, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas:
Compilation and Backend-Independent Vectorization for Multi-Party Computation. 89 - Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard:
Unlimited Results: Breaking Firmware Encryption of ESP32-V3. 90 - Alex Ozdemir, Gereon Kremer, Cesare Tinelli, Clark W. Barrett:
Satisfiability Modulo Finite Fields. 91 - Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator. 92 - Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier:
Automated Side-Channel Attacks using Black-Box Neural Architecture Search. 93 - Watson Ladd, Marloes Venema, Tanya Verma:
Portunus: Re-imagining access control in distributed systems. 94 - Michael Scott:
On TLS for the Internet of Things, in a Post Quantum world. 95 - Mariana Botelho da Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, Oliver Zajonc:
MPC With Delayed Parties Over Star-Like Networks. 96 - Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig:
Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable. 97 - Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek:
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. 98 - Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk:
Scalable Multiparty Garbling. 99 - Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang:
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs. 100 - Xiaoen Lin, Le He, Hongbo Yu:
Practical Preimage Attack on 3-Round Keccak-256. 101 - Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson:
Cache-timing attack against HQC. 102 - Runchao Han, Jiangshan Yu:
Fair Delivery of Decentralised Randomness Beacon. 103 - Anamaria Costache, Lea Nürnberger, Rachel Player:
Optimizations and Trade-offs for HElib. 104 - Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware. 105 - Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, Mattia Veroni:
Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic. 106 - Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare:
The Tip5 Hash Function for Recursive STARKs. 107 - Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry:
Grotto: Screaming fast (2 + 1)-PC for ℤ2n via (2, 2)-DPFs. 108 - Ling Sun, Meiqin Wang:
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper). 109 - Ripon Patgiri, Dolendro Singh Laiphrakpam, Dalton Meitei Thounaojam:
VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm. 110 - Vahid Amin Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami:
An Attack on the LILLE Stream Cipher. 111 - Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, Adam Suhl:
Faster Amortized FHEW bootstrapping using Ring Automorphisms. 112 - Luciano Freitas de Souza, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov:
Homomorphic Sortition - Single Secret Leader Election for PoS Blockchains. 113 - Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni:
Credible, Optimal Auctions via Blockchains. 114 - Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV. 115 - Diego Castejon-Molina, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez:
CBDC-Cash: How to Fund and Defund CBDC Wallets. 116 - Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey:
Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT. 117 - Chloé Gravouil:
A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes. 118 - Akin Ünal:
Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality. 119 - Adam Caulfield, Nabiha Raza, Peizhao Hu:
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. 120 - Dmitrii I. Koshelev:
Hashing to elliptic curves over highly 2-adic fields $\mathbb{F}_{\!q}$ with O(log(q)) operations in $\mathbb{F}_{\!q}$. 121 - Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen:
SoK: Privacy-Enhancing Technologies in Finance. 122 - Tudorica Radu, Rares Radu, Emil Simion:
A way of decrypting particular malware payloads found in MZPE files. 123 - Ionut Rosca, Alexandra-Ina Butnaru, Emil Simion:
Security of Ethereum Layer 2s. 124 - Irimia Alexandru-Vasile:
Ransomware data recovery techniques. 125 - Danielle Movsowitz-Davidow, Yacov Manevich:
Privacy-Preserving Payment System With Verifiable Local Differential Privacy. 126 - Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues:
Sender-binding Key Encapsulation. 127 - Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu:
Cloning Games: A General Framework for Unclonable Primitives. 128 - Noam Mazor:
A Lower Bound on the Share Size in Evolving Secret Sharing. 129 - Hannah Davis, Christopher Patton, Mike Rosulek, Phillipp Schoppmann:
Verifiable Distributed Aggregation Functions. 130 - (Withdrawn) Some Practical Applications of Fully Homomorphic Encryption. 131
- Alexandra Ciobanu, Marina Stefiuc:
Security analysis of DBTRU cryptosystem. 132 - Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta:
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data. 133 - Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra:
Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis. 134 - Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay:
Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation. 135 - Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao:
Public-key Compression in M-SIDH. 136 - Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner:
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials. 137 - Chloé Hébant, David Pointcheval, Robert Schädlich:
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures. 138 - Alessandro Budroni, Erik Mårtensson:
Improved Estimation of Key Enumeration with Applications to Solving LWE. 139 - Jianwei Li, Michael Walter:
Improving Convergence and Practicality of Slide-type Reductions. 140 - Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas:
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation. 141 - Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert:
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT. 142 - Marloes Venema:
A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More. 143 - Hisham S. Galal, Amr M. Youssef:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. 144 - Xinxin Gong, Yonglin Hao, Qingju Wang:
Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW. 145 - Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, Xiangyong Zeng:
Optimized Quantum Implementation of AES. 146 - Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi:
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model). 147 - Ripon Patgiri, Dolendro Singh Laiphrakpam:
PassPro: A secure password protection from the adversaries. 148 - Ahmad Al Badawi, Yuriy Polyakov:
Demystifying Bootstrapping in Fully Homomorphic Encryption. 149 - Fuchun Lin, Chaoping Xing, Yizhou Yao:
More Efficient Zero-Knowledge Protocols over ℤ2k via Galois Rings. 150 - Coteanu Maria Gabriela, Tîflea Denisa-Ionela:
Analysis of the XSL Attack. 151 - Antonio Faonio, Dennis Hofheinz, Luigi Russo:
Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption. 152 - Shuai Han, Shengli Liu, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model. 153 - Sisi Duan, Xin Wang, Haibin Zhang:
Practical Signature-Free Asynchronous Common Subset in Constant Time. 154 - Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta:
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters. 155 - Xinxuan Zhang, Yi Deng:
Zero-Knowledge Elementary Databases with Function Queries. 156 - Thomas Prest:
A Key-Recovery Attack against Mitaka in the t-Probing Model. 157 - Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal:
Enabling FrodoKEM on Embedded Devices. 158 - Katharina Boudgoust, Akira Takahashi:
Sequential Half-Aggregation of Lattice-Based Signatures. 159 - Madhurima Mukhopadhyay:
Practical Improvement to Gaudry-Schost Algorithm on Subgroups of ℤ*p. 160 - Tomoyuki Morimae, Takashi Yamakawa:
Quantum Advantage from One-Way Functions. 161 - Wei Ao, Vishnu Boddeti:
AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE. 162 - Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. 163 - Frank Y. C. Lu:
Input Transformation Based Efficient Zero-Knowledge Argument System for Arbitrary Circuits with Practical Succinctness. 164 - Chengkai Zhu, Zhenyu Huang:
Optimizing the depth of quantum implementations of linear layers. 165 - Brice Minaud, Michael Reichle:
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption. 166 - Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. 167 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj:
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4. 168 - Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu:
Reputation-based state machine replication. 169 - Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. 170 - Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou:
On Differential Privacy and Adaptive Data Analysis with Bounded Space. 171 - Luke Demarest, Benjamin Fuller, Alexander Russell:
Impossibility of Efficient Information-Theoretic Fuzzy Extraction. 172 - Daniel Escudero, Hongqing Liu, Chaoping Xing, Chen Yuan:
Degree-D Reverse Multiplication-Friendly Embeddings: Constructions and Applications. 173 - Qun Liu, Zheng Zhao, Meiqin Wang:
Improved Heuristics for Low-latency Implementations of Linear Layers. 174 - Vasyl Ustimenko:
Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography. 175 - Pierre Briaud, Morten Øygarden:
A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions. 176 - Damien Robert:
The geometric interpretation of the Tate pairing and its applications. 177 - Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang:
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers. 178 - Itay Bookstein, Boaz Tsaban:
TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs. 179 - Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu:
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys. 180 - Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks against ARX Ciphers. 181 - Yi-Fu Lai:
CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies. 182 - Mario Larangeira, Maxim Jourenko:
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality. 183 - André Schrottenloher:
Quantum Linear Key-recovery Attacks Using the QFT. 184 - Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, Bas Spitters:
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography. 185 - Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. 186 - Lúcás Críostóir Meier:
Towards Modular Foundations for Protocol Security. 187 - Daniel R. L. Brown:
Cryptanalysis of a key agreement scheme using determinants and rectangular matrices. 188 - Nicolas Gailly, Kelsey Melissaris, Yolan Romailler:
tlock: Practical Timelock Encryption from Threshold BLS. 189 - Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng:
Practical Security Analysis of Zero-Knowledge Proof Circuits. 190 - Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon:
Beyond the Blockchain Address: Zero-Knowledge Address Abstraction. 191 - Hagit Attiya, Constantin Enea, Shafik Nassar:
Faithful Simulation of Randomized BFT Protocols on Block DAGs. 192 - Ismail Afia, Riham AlTawy:
Traceable Policy-Based Signatures with Delegation. 193 - Léo Ducas, Shane Gibbons:
Hull Attacks on the Lattice Isomorphism Problem. 194 - Pavel Atnashev:
A simpler alternative to Lucas-Lehmer-Riesel primality test. 195 - Shengyuan Xu, Xiutao Feng, Yongxing Wang:
On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses. 196 - Mihir Bellare, Laura Shea:
Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks. 197 - Jiaxin Pan, Benedikt Wagner:
Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions. 198 - Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni:
MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information. 199 - Johanna Loyer, André Chailloux:
Classical and quantum 3 and 4-sieves to solve SVP with low memory. 200 - Aleksei Udovenko:
DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm. 201 - Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper). 202 - Esra Günsay, Cansu Betin Onur, Murat Cenk:
A Different Base Approach for Better Efficiency on Range Proofs. 203 - Arthur Lazzaretti, Charalampos Papamanthou:
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH. 204 - Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri:
DEFending Integrated Circuit Layouts. 205 - Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:
Orca: FSS-based Secure Training with GPUs. 206 - Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha:
On Quantum Secure Compressing Pseudorandom Functions. 207 - Sai Deng, Bo Du:
zkTree: a zk recursion tree with ZKP membership proofs. 208 - Lichao Wu, Guilherme Perin, Stjepan Picek:
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext. 209 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
New Generic Constructions of Error-Correcting PIR and Efficient Instantiations. 210 - Gyeongju Song, Kyungbae Jang, Hwajeong Seo:
Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers. 211 - Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay:
Generating Secure Hardware using ChatGPT Resistant to CWEs. 212 - Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito:
Deniable Authentication when Signing Keys Leak. 213 - Joakim Brorsson, Martin Gunnarsson:
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties. 214 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub:
Formally verifying Kyber Part I: Implementation Correctness. 215 - Yashvanth Kondi, Claudio Orlandi, Lawrence Roy:
Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions. 216 - Charlotte Lefevre:
Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks. 217 - Nathalie Lang, Stefan Lucks:
On the Post-Quantum Security of Classical Authenticated Encryption Schemes. 218 - Knud Ahrens:
Sieving for large twin smooth integers using single solutions to Prouhet-Tarry-Escott. 219 - Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. 220 - Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau:
Bicorn: An optimistically efficient distributed randomness beacon. 221 - Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck:
A Lightweight Identification Protocol Based on Lattices. 222 - Chris Peikert, Jiayu Xu:
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability. 223 - Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang:
Improved Power Analysis Attacks on Falcon. 224 - Andrea Basso:
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies. 225 - Chun Guo, Lei Wang, Dongdai Lin:
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls. 226 - Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng:
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials. 227 - Benjamin Dowling, Britta Hale:
Authenticated Continuous Key Agreement: Active MitM Detection and Prevention. 228 - Fuyuki Kitagawa, Ryo Nishimaki:
One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More. 229 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. 230 - Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur:
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations. 231 - Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham:
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE. 232 - Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe:
Complete Characterization of Broadcast and Pseudo-Signatures from Correlations. 233 - Rupeng Yang:
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness. 234 - Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo:
New Results on Machine Learning Based Distinguishers. 235 - Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, Takashi Yamakawa:
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More. 236 - Keegan Ryan, Nadia Heninger:
Fast Practical Lattice Reduction through Iterated Compression. 237 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak:
Certifying Giant Nonprimes. 238 - (Withdrawn) Improved Preimage Sampling for Lattices. 239
- Baptiste Lambin, Gregor Leander, Patrick Neumann:
Pitfalls and Shortcomings for Decompositions and Alignment (Full Version). 240 - Munawar Hasan, Donghoon Chang:
Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher. 241 - Vittorio Zaccaria:
The propagation game: on simulatability, correlation matrices, and probing security. 242 - Andre Esser, Rahul Girme, Arindam Mukherjee, Santanu Sarkar:
Memory-Efficient Attacks on Small LWE Keys. 243 - Céline Chevalier, Paul Hermouet, Quoc-Huy Vu:
Semi-Quantum Copy-Protection and More. 244 - Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé:
A Detailed Analysis of Fiat-Shamir with Aborts. 245 - Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu:
Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium. 246 - Qian Guo, Thomas Johansson, Vu Nguyen:
A New Sieving-Style Information-Set Decoding Algorithm. 247 - Paul Rösler, Daniel Slamanig, Christoph Striecks:
Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging. 248 - Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer:
Anamorphic Encryption, Revisited. 249 - Dan Boneh, Jiaxin Guan, Mark Zhandry:
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies. 250 - Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan:
Hardware Root-of-Trust implementations in Trusted Execution Environments. 251 - James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Obfuscation of Pseudo-Deterministic Quantum Circuits. 252 - Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version). 253 - Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Mitigating Decentralized Finance Liquidations with Reversible Call Options. 254 - Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang:
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY. 255 - Junqing Gong, Ji Luo, Hoeteck Wee:
Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin. 256 - Andrei Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames:
Deep Neural Networks for Encrypted Inference with TFHE. 257 - Jordan Fréry, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames, Arthur Meyre:
Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption. 258 - Guangqiu Lv, Chenhui Jin, Ting Cui:
A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper). 259 - Drew Stone:
Webb Protocol: A cross-chain private application and governance protocol. 260 - Sanjay Bhattacherjee, Julio Hernandez-Castro, Jack Moyler:
A Greedy Global Framework for LLL. 261 - Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella:
Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics. 262 - Yanbo Chen:
DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation. 263 - Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. 264 - James Bartusek, Sanjam Garg, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts:
Obfuscation and Outsourced Computation with Certified Deletion. 265 - Panos Kampanakis, Tancrède Lepoint:
Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments. 266 - Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy:
PROTEUS: A Tool to generate pipelined Number Theoretic Transform Architectures for FHE and ZKP applications. 267 - Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval:
Verifiable Multi-Client Functional Encryption for Inner Product. 268 - Emmanuela Orsini, Riccardo Zanotto:
Simple Two-Round OT in the Explicit Isogeny Model. 269 - Benny Applebaum, Niv Konstantini:
Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead. 270 - Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe:
Swoosh: Practical Lattice-Based Non-Interactive Key Exchange. 271 - Bertram Poettering, Simon Rastikian:
A study of KEM generalizations. 272 - Josh Beal, Ben Fisch:
Derecho: Privacy Pools with Proof-Carrying Disclosures. 273 - Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park:
Panacea: Non-interactive and Stateless Oblivious RAM. 274 - Stefano Tessaro, Chenzhi Zhu:
Revisiting BBS Signatures. 275 - Stefano Tessaro, Chenzhi Zhu:
Threshold and Multi-Signature Schemes from Linear Hash Functions. 276 - Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. 277 - Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu:
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. 278 - Francesco D'Amato, Luca Zanolini:
Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience. 279 - Francesco D'Amato, Luca Zanolini:
A Simple Single Slot Finality Protocol For Ethereum. 280 - Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang:
Towards A Correct-by-Construction FHE Model. 281 - Andrea Coladangelo:
Quantum trapdoor functions from classical one-way functions. 282 - Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. 283 - Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini:
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data. 284 - Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on RIPEMD-160 and SHA-256. 285 - Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay:
DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes. 286 - Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay:
Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization. 287 - Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. 288 - Amos Beimel:
Lower-Bounds for Secret-Sharing Schemes for k-Hypergraphs. 289 - Thomas Pornin:
Improved Key Pair Generation for Falcon, BAT and Hawk. 290 - Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao:
PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation. 291 - Chelsea Komlo, Ian Goldberg, Douglas Stebila:
A Formal Treatment of Distributed Key Generation, and New Constructions. 292 - Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan:
Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas. 293 - Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson:
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes. 294 - Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki:
Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE. 295 - Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein:
OpenPubkey: Augmenting OpenID Connect with User held Signing Keys. 296 - Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford:
Authenticated private information retrieval. 297 - Mihir Bellare, Hannah Davis, Zijing Di:
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA. 298 - Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong:
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE. 299 - Hu Xiaobo, Shengyuan Xu, Tu Yinzi, Xiutao Feng:
CNF Characterization of Sets over ℤ2n and Its Applications in Cryptography. 300 - Kamil Kluczniak, Giacomo Santato:
On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption. 301 - Léo Ducas, Ludo N. Pulles:
Does the Dual-Sieve Attack on Learning with Errors even Work? 302 - Brandon Goodell, Aaron Feickert:
Fusion One-Time Non-Interactively-Aggregatable Digital Signatures From Lattices. 303 - Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski:
On homomorphic encryption using abelian groups: Classical security analysis. 304 - Marco Macchetti:
A Novel Related Nonce Attack for ECDSA. 305 - Khashayar Barooti, Giulio Malavolta, Michael Walter:
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions. 306 - Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng:
SUPERPACK: Dishonest Majority MPC with Constant Online Communication. 307 - Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece. 308 - Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin:
Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside. 309 - Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin:
Ramen: Souper Fast Three-Party Computation for RAM Programs. 310 - Léo Colisson, Garazi Muguruza, Florian Speelman:
Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States. 311 - Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi:
BIP32-Compatible Threshold Wallets. 312 - Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. 313 - Joseph Jaeger, Akshaya Kumar:
Memory-Tight Multi-Challenge Security of Public-Key Encryption. 314 - Thuat Do:
SoK on Blockchain Evolution and a Taxonomy for Public Blockchain Generations. 315 - Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang:
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. 316 - Razvan Barbulescu, Adrien Poulalion:
The special case of cyclotomic fields in quantum algorithms for unit groups. 317 - Danilo Gligoroski:
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography. 318 - Reza Ghasemi:
A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values. 319 - Fabrice Benhamouda, Mariana Raykova, Karn Seth:
Anonymous Counting Tokens. 320 - Cas Cremers, Julian Loss, Benedikt Wagner:
A Holistic Security Analysis of Monero Transactions. 321 - R. Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy:
Differential Fault Attack on Rasta and FiLIP DSM. 322 - Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger:
Poseidon2: A Faster Version of the Poseidon Hash Function. 323 - Michael Rosenberg:
LATKE: An identity-binding PAKE from lattice assumptions. 324 - Prabhanjan Ananth, Alexander Poremba, Vinod Vaikuntanathan:
Revocable Cryptography from Learning with Errors. 325 - Jean Liénardy, Frédéric Lafitte:
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. 326 - Yangru Zheng, Juntao Gao, Baocang Wang:
New Quantum Search Model on Symmetric Ciphers and Its Applications. 327 - Jan Schoone, Joan Daemen:
The state diagram of χ. 328 - Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson:
Caveat Implementor! Key Recovery Attacks on MEGA. 329 - Bernardo David, Anders Konring, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan:
Perfect MPC over Layered Graphs. 330 - Nicky Mouha, Christopher Celi:
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm. 331 - Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions & Constructions. 332 - Izumi Takeuti, Tomoko Adachi:
Secret Sharing Scheme with Perfect Concealment. 333 - Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen:
A Generic Transform from Multi-Round Interactive Proof to NIZK. 334 - Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger:
Separating Oil and Vinegar with a Single Trace. 335 - Apurva K. Vangujar, Buvana Ganesh, Paolo Palmieri:
A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption. 336 - Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, Hwajeong Seo:
Quantum Implementation of AIM: Aiming for Low-Depth. 337 - Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Shield: Secure Allegation Escrow System with Stronger Guarantees. 338 - Christopher Dunne:
An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES. 339 - Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. 340 - Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais:
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy. 341 - Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier:
TurboSHAKE. 342 - Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
A Map of Witness Maps: New Definitions and Connections. 343 - Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida:
Quantum Search-to-Decision Reduction for the LWE Problem. 344 - Alex B. Grilo, Or Sattath, Quoc Huy Vu:
Encryption with Quantum Public Keys. 345 - Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan:
How to achieve bidirectional zero-knowledge authentication? 346 - Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani:
Off-Chain Programmability at Scale. 347 - Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski:
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions. 348 - Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu:
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios. 349 - Leonard Assouline, Brice Minaud:
Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption. 350 - Yoshinori Aono, Junji Shikata:
Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE. 351 - Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-Quantum Security for the Extended Access Control Protocol. 352 - Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu:
Searching for S-boxes with better Diffusion using Evolutionary Algorithm. 353 - Federico Canale, María Naya-Plasencia:
Guessing Less and Better: Improved Attacks on GIFT-64. 354 - Jian Liu, Yanjun Li, Runyi Liu, Jian Zou, Zhiqiang Wang:
Improved Differential Analysis of MIBS Based on Greedy Algorithm. 355 - Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! 356 - Zhen Gu, Wen-jie Lu, Cheng Hong:
FFT-less TFHE: Simpler, Faster and Scale-invariant. 357 - Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian:
Efficient Code Based Cryptosystem with Dual Inverse Matrix. 358 - Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Küsters:
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC. 359 - Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian:
Fast and Efficient Code-Based Digital Signature with Dual Inverse Matrix. 360 - Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata:
Authenticated Encryption for Very Short Inputs. 361 - Or Sattath, Shai Wyborski:
Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies. 362 - Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber:
Composable Long-Term Security with Rewinding. 363 - Dimitris Kolonelos, Mary Maller, Mikhail Volkhov:
Zero-Knowledge Arguments for Subverted RSA Groups. 364 - Ramsès Fernàndez-València:
Verifiable encodings in multigroup fully homomorphic encryption. 365 - Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications. 366 - Qiang Li, Qun-Xiong Zheng, Wenfeng Qi:
Practical Attacks on Small Private Exponent RSA: New Records and New Insights. 367 - Naina Gupta, Arpan Jati, Anupam Chattopadhyay:
AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack. 368 - Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong:
LURK: Lambda, the Ultimate Recursive Knowledge. 369 - James Bartusek, Dakshita Khurana, Alexander Poremba:
Publicly-Verifiable Deletion via Target-Collapsing Functions. 370 - Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning. 371 - Haozhe Jiang, Kaiyue Wen, Yilei Chen:
Practically Solving LPN in High Noise Regimes Faster Using Neural Networks. 372 - Yuuki Komi, Takayuki Tatekawa:
Consensus Algorithm Using Transaction History for Cryptocurrency. 373 - Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-boxes. 374 - Nicolas Belleville:
Accelerating exp-log based finite field multiplication. 375 - Thomas Decru, Sabrina Kunzweiler:
Efficient computation of (3n,3n)-isogenies. 376 - Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh:
FuLeeca: A Lee-based Signature Scheme. 377 - Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. 378 - Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier:
Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority. 379 - Edward Eaton, Tancrède Lepoint, Christopher A. Wood:
Security Analysis of Signature Schemes with Key Blinding. 380 - Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse:
Security of Blockchains at Capacity. 381 - Thomas Attema, Pedro Capitão, Lisa Kohl:
On Homomorphic Secret Sharing from Polynomial-Modulus LWE. 382 - Gideon Samid:
The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity. 383 - Zhenfei Zhang:
Origami: Fold a Plonk for Ethereum's VDF. 384 - Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, Violetta Weger:
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem. 385 - Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler:
Interoperability in End-to-End Encrypted Messaging. 386 - Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia:
Constrained Pseudorandom Functions from Homomorphic Secret Sharing. 387 - Lucjan Hanzlik:
Non-Interactive Blind Signatures for Random Messages. 388 - Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal:
TIDAL: Practical Collisions on State-Reduced Keccak Variants. 389 - Dmitrii I. Koshelev:
Batching Cipolla-Lehmer-Müller's square root algorithm with hashing to elliptic curves. 390 - Rhys Weatherley:
Additional Modes for ASCON. 391 - Justin Holmgren, Ruta Jawale:
Locally Covert Learning. 392 - Liam Eagen, Ariel Gabizon:
cqlin: Efficient linear operations on KZG commitments with cached quotients. 393 - Joël Alwen, Marta Mularczyk, Yiannis Tselekounis:
Fork-Resilient Continuous Group Key Agreement. 394 - Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Daniele Venturi:
Registered (Inner-Product) Functional Encryption. 395 - Giuseppe D'Alconzo:
Monomial Isomorphism for Tensors and Applications to Code Equivalence Problems. 396 - Dahlia Malkhi, Kartik Nayak:
Extended Abstract: HotStuff-2: Optimal Two-Phase Responsive BFT. 397 - Tomer Ashur, Erik Takke:
A New Linear Distinguisher for Four-Round AES. 398 - Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang:
High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka. 399 - Antigoni Polychroniadou, Gilad Asharov, Benjamin E. Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso:
Prime Match: A Privacy-Preserving Inventory Matching System. 400 - Keita Emura:
Generic Construction of Broadcast Authenticated Encryption with Keyword Search. 401 - KangHoon Lee, Ji Won Yoon:
Discretization Error Reduction for Torus Fully Homomorphic Encryption. 402 - Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan:
Real World Deniability in Messaging. 403 - Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi:
Efficient Laconic Cryptography from Learning With Errors. 404 - Carsten Baum, Bernardo David, Elena Pagnin, Akira Takahashi:
CaSCaDE: (Time-Based) Cryptography from Space Communications DElay. 405 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking to protect against both SCA and FIA. 406 - Simone Galimberti, Maria Potop-Butucaru:
Game Theoretical Analysis of DAG-Ledgers Backbone. 407 - Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub:
Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$. 408 - Jiaxin Guan, Daniel Wichs, Mark Zhandry:
Somewhere Randomness Extraction and Security against Bounded-Storage Mass Surveillance. 409 - Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Unbounded Leakage-Resilience and Leakage-Detection in a Quantum World. 410 - Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath:
An Overview of Hash Based Signatures. 411 - Keita Emura:
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search. 412 - Miran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Accelerating HE Operations from Key Decomposition Technique. 413 - Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A. Wood:
Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials. 414 - Giovanni Deligios, Aarushi Goel, Chen-Da Liu-Zhang:
Maximally-Fluid MPC with Guaranteed Output Delivery. 415 - Asaf Cohen, Pawel Cyprys, Shlomi Dolev:
Single Instance Self-Masking via Permutations. 416 - Isaac Andrés Canales Martinez, Igor Semaev:
Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers. 417 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
The Round Complexity of Statistical MPC with Optimal Resiliency. 418 - Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. 419 - Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger. 420 - Islam Faisal:
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation. 421 - Sven Bauer, Fabrizio De Santis:
A Differential Fault Attack against Deterministic Falcon Signatures. 422 - Nina Bindel, Britta Hale:
A Note on Hybrid Signature Schemes. 423 - Shuichi Hirahara, Rahul Ilango, Zhenjian Lu, Mikito Nanashima, Igor C. Oliveira:
A Duality Between One-Way Functions and Average-Case Symmetry of Information. 424 - Keita Emura:
Generic Construction of Dual-Server Public Key Authenticated Encryption with Keyword Search. 425 - Hyungrok Jo, Shingo Sato, Junji Shikata:
A Tightly Secure Identity-based Signature Scheme from Isogenies. 426 - Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin, Yiping Ma:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. 427 - Yu Li, Li-Ping Wang:
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory. 428 - Mathieu Gross, Robert Kunzelmann, Georg Sigl:
CPU to FPGA Power Covert Channel in FPGA-SoCs. 429 - Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen:
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging. 430 - Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Ruffle: Rapid 3-party shuffle protocols. 431 - Thomas Aulbach, Simona Samardjiska, Monika Trimoska:
Practical key-recovery attack on MQ-Sign. 432 - Wissam Ghantous, Federico Pintore, Mattia Veroni:
Efficiency of SIDH-based signatures (yes, SIDH). 433 - Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. 434 - Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Optimal Security Notion for Decentralized Multi-Client Functional Encryption. 435 - Pierrick Dartois, Antonin Leroux, Damien Robert, Benjamin Wesolowski:
SQISignHD: New Dimensions in Cryptography. 436 - Benjamin M. Case, Richa Jain, Alex Koshelev, Andy Leiserson, Daniel Masny, Ben Savage, Erik Taubeneck, Martin Thomson, Taiki Yamaguchi:
Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol. 437 - René Rodríguez, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei:
Minimal p-ary codes from non-covering permutations. 438 - Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung:
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition. 439 - Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl:
On the Possibility of a Backdoor in the Micali-Schnorr Generator. 440 - Boris Ryabko:
Unconditionally secure ciphers with a short key for a source with unknown statistics. 441 - Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, Guanci Yang:
Non-interactive privacy-preserving naive Bayes classifier using homomorphic encryption. 442 - Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama:
Abstraction Model of Probing and DFA Attacks on Block Ciphers. 443 - Shingo Sato, Junji Shikata:
Compact Bounded-Collusion Identity-based Encryption via Group Testing. 444 - Elizabeth C. Crites, Chelsea Komlo, Mary Maller:
Fully Adaptive Schnorr Threshold Signatures. 445 - Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders:
Revisiting Preimage Sampling for Lattices. 446 - Léo Ducas:
Provable Lattice Reduction of ℤn with Blocksize n/2. 447 - Farshid Haidary Makoui, T. Aaron Gulliver:
Generalized Inverse Matrix Construction for Code Based Cryptography. 448 - Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer:
Multidimensional Approximate Agreement with Asynchronous Fallback. 449 - Sam Haskins, Trevor Stevado:
Unlocking doors from half a continent away: A relay attack against HID Seos. 450 - Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan:
Non-interactive VSS using Class Groups and Application to DKG. 451 - Mingxun Zhou, Andrew Park, Elaine Shi, Wenting Zheng:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. 452 - Hao Guo:
An algebraic attack for forging signatures of MPPK/DS. 453 - Afonso Arriaga, Petra Sala, Marjan Skrobot:
Wireless-channel Key Exchange. 454 - David Heath, Vladimir Kolesnikov, Rafail Ostrovsky:
Tri-State Circuits: A Better Model of Computation for Garbling. 455 - Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems. 456 - Pratish Datta, Tapas Pal:
Registration-Based Functional Encryption. 457 - Nir Bitansky, Omer Paneth, Dana Shamir, Tomer Solomon:
Non-interactive Universal Arguments. 458 - Moshe Avital, Itamar Levi:
SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks... 459 - Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng:
A unified construction of weightwise perfectly balanced Boolean functions. 460 - Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury:
Deep Learning based Differential Classifier of PRIDE and RC5. 461 - Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius:
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. 462 - Benjamin Y. Chan, Rafael Pass:
Simplex Consensus: A Simple and Fast Consensus Protocol. 463 - Johannes Blömer, Jan Bobolz, Laurens Porzenheim:
A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices. 464 - Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Thari Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. 465 - Sarvar Patel, Joon Young Seo, Kevin Yeo:
Don't be Dense: Efficient Keyword PIR for Sparse Databases. 466 - Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song:
Secure Floating-Point Training. 467 - Tugberk Kocatekin, Cafer Çaliskan:
A new approach on IoT security: n-out-of-n. 468 - Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. 469 - Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi:
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges. 470 - Toi Tomita, Junji Shikata:
Compact Signature Aggregation from Module-Lattices. 471 - Roi Bar Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar:
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL. 472 - Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno:
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System. 473 - Héctor Masip Ardevol, Marc Guzmán-Albiol, Jordi Baylina Melé, Jose Luis Muñoz-Tapia:
eSTARK: Extending STARKs with Arguments. 474 - Ferucio Laurentiu Tiplea:
The Jacobi Symbol Problem for Quadratic Congruences and Applications to Cryptography. 475 - Muhammad Imran:
A private set intersection protocol based on multi-party quantum computation for greatest common divisor. 476 - Yodai Watanabe:
Separations among formulations of non-malleable encryption under valid ciphertext condition. 477 - Hyeonbum Lee, Jae Hong Seo:
TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup. 478 - Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. 479 - Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas de Souza:
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications. 480 - Johannes Ernst, Aikaterini Mitrokotsa:
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption. 481 - Buvana Ganesh, Apurva K. Vangujar, Alia Umrani, Paolo Palmieri:
Homomorphic Trapdoors for Identity-based and Group Signatures. 482 - Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
Unbounded Predicate Inner Product Functional Encryption from Pairings. 483 - Kamyar Mohajerani, Luke Beckwith, Abubakr Abdulgadir, Eduardo Ferrufino, Jens-Peter Kaps, Kris Gaj:
SCA Evaluation and Benchmarking of Finalists in the NIST Lightweight Cryptography Standardization Process. 484 - Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones:
Practically-exploitable Cryptographic Vulnerabilities in Matrix. 485 - Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. 486 - Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer:
On the State of Crypto-Agility. 487 - Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan:
k-SUM in the Sparse Regime. 488 - Éric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier:
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices. 489 - Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa:
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions. 490 - Samuel Bedassa Alemu, Julia Kastner:
On the Security of Blind Signatures in the Multi-Signer Setting. 491 - Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano:
Batch Signatures, Revisited. 492 - Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun:
Force: Making 4PC > 4 × PC in Privacy Preserving Machine Learning on GPU. 493 - Quang Dao, Paul Grubbs:
Spartan and Bulletproofs are simulation-extractable (for free!). 494 - Agnese Gini, Pierrick Méaux:
On the algebraic immunity of weightwise perfectly balanced functions. 495 - Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang:
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect. 496 - Sergey Agievich:
Upper bounding the number of bent functions using 2-row bent rectangles. 497 - Foteini Baldimtsi, Konstantinos Kryptos Chalkias, François Garillot, Jonas Lindstrøm, Ben Riva, Arnab Roy, Alberto Sonnino, Pun Waiwitlikhit, Joy Wang:
Subset-optimized BLS Multi-signature with Key Aggregation. 498 - Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations (Full Version). 499 - Giulio Malavolta, Michael Walter:
Non-Interactive Quantum Key Distribution. 500 - Marshall Ball, Hanjun Li, Huijia Lin, Tianren Liu:
New Ways to Garble Arithmetic Circuits. 501 - Nico Döttling, Phillip Gajland, Giulio Malavolta:
Laconic Function Evaluation for Turing Machines. 502 - Wouter Legiest, Furkan Turan, Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede:
Neural Network Quantisation for Faster Homomorphic Encryption. 503 - Shuailiang Hu:
Private Computation Based On Polynomial Operation. 504 - Matthias Probst, Manuel Brosch, Georg Sigl:
Side-Channel Analysis of Integrate-and-Fire Neurons within Spiking Neural Networks. 505 - George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. 506 - Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May:
Low Memory Attacks on Small Key CSIDH. 507 - Jesús-Javier Chi-Domínguez, Amalia Pizarro-Madariaga, Edgardo Riquelme:
Computing Quotient Groups of Smooth Order with Applications to Isogenies over Higher-Dimensional Abelian Varieties. 508 - Anit Kumar Ghosal, Dipanwita Roychowdhury:
Non-malleable Codes from Authenticated Encryption in Split-State Model. 509 - Anit Kumar Ghosal, Dipanwita Roychowdhury:
Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model. 510 - Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos:
MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation. 511 - Shankara Pailoor, Yanju Chen, Franklyn Wang, Clara Rodríguez-Núñez, Jacob Van Gaffen, Jason Morton, Michael Chu, Brian Gu, Yu Feng, Isil Dillig:
Automated Detection of Underconstrained Circuits for Zero-Knowledge Proofs. 512 - Elette Boyle, Geoffroy Couteau, Pierre Meyer:
Sublinear Secure Computation from New Assumptions. 513 - Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Black-Box Reusable NISC with Random Oracles. 514 - Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh:
stoRNA: Stateless Transparent Proofs of Storage-time. 515 - Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi:
3-Party Secure Computation for RAMs: Optimal and Concretely Efficient. 516 - Aikata, Andrea Basso, Gaëtan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy:
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography. 517 - Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang:
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited. 518 - Farshid Haidary Makoui, Thomas Aaron Guliver:
Generalized Inverse Binary Matrix Construction with PKC Application. 519 - Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink:
Generic Security of the SAFE API and Its Applications. 520 - David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew G. Schmidt, Ajey P. Jacob, Benedict Reynwar, Kellie Canida, Akhilesh R. Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram:
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation. 521 - Jean-Philippe Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine:
SAFE: Sponge API for Field Elements. 522 - Frank Denis:
Adding more parallelism to the AEGIS authenticated encryption algorithms. 523 - Gideon Samid:
AI Resistant (AIR) Cryptography. 524 - Daniele Micciancio, Mark Schultz:
Error Correction and Ciphertext Quantization in Lattice Cryptography. 525 - Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart:
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More. 526 - Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong:
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. 527 - Yizhi Huang, Rahul Ilango, Hanlin Ren:
NP-Hardness of Approximating Meta-Complexity: A Cryptographic Approach. 528 - Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov:
Secure Communication in Dynamic Incomplete Networks. 529 - Raine Nieminen, Thomas Schneider:
Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires. 530 - Boaz Shahar:
Practical Randomness Measure Tool. 531 - Shuang Wu, Chunhuan Zhao, Ye Yuan, Shuzhou Sun, Jie Li, Yamin Liu:
HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption. 532 - Ghous Amjad, Seny Kamara, Tarik Moataz:
Injection-Secure Structured and Searchable Symmetric Encryption. 533 - Zeyu Liu, Eran Tromer, Yunhao Wang:
Group Oblivious Message Retrieval. 534 - Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park:
Practical Randomized Lattice Gadget Decomposition With Application to FHE. 535 - Victor Shoup, Nigel P. Smart:
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience. 536 - Tomer Ashur, Thomas Buschman, Mohammad Mahzoun:
Algebraic cryptanalysis of POSEIDON. 537 - Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Publicly Verifiable Deletion from Minimal Assumptions. 538 - Alexander May, Carl Richard Theodor Schneider:
Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards. 539 - Arianna Gringiani, Alessio Meneghetti, Edoardo Signorini, Ruggero Susella:
MAYO: Optimized Implementation with Revised Parameters for ARMv7-M. 540 - Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang:
Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper). 541 - Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti:
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium. 542 - Amit Behera, Zvika Brakerski, Or Sattath, Omri Shmueli:
Pseudorandomness with Proof of Destruction and Applications. 543 - Jakub Klemsa, Melek Önen:
PARMESAN: Parallel ARithMEticS over ENcrypted data. 544 - Jung Hee Cheon, Wonhee Cho, Jiseung Kim:
Improved Universal Thresholdizer from Threshold Fully Homomorphic Encryption. 545 - Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Dragoi:
Horizontal Correlation Attack on Classic McEliece. 546 - Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Isil Dillig, Yu Feng:
Certifying Zero-Knowledge Circuits with Refinement Types. 547 - Ahmet Ramazan Agirtas, Oguz Yayla:
Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures. 548 - Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren:
Weak instances of class group action based cryptography via self-pairings. 549 - Akin Ünal:
New Baselines for Local Pseudorandom Number Generators by Field Extensions. 550 - Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf:
Breaking DPA-protected Kyber via the pair-pointwise multiplication. 551 - Srinath T. V. Setty, Justin Thaler, Riad S. Wahby:
Customizable constraint systems for succinct arguments. 552 - Ren Taguchi, Atsushi Takayasu:
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain. 553 - Reza Hooshmand:
Hybrid Encryption Scheme based on Polar Codes. 554 - Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame:
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning. 555 - Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
Quantum-access Security of Hash-based Signature Schemes. 556 - Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra:
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time. 557 - Alia Umrani, Paolo Palmieri:
A Multireceiver Certificateless Signcryption (MCLS) Scheme. 558 - James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter:
Weakening Assumptions for Publicly-Verifiable Deletion. 559 - Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Alessandro Sorniotti:
A Framework for Practical Anonymous Credentials from Lattices. 560 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks. 561 - Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede:
Cryptanalysis of Strong Physically Unclonable Functions. 562 - Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko:
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. 563 - James Bartusek, Dakshita Khurana, Akshayaram Srinivasan:
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge). 564 - Pratish Datta, Tapas Pal:
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded. 565 - Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song:
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures. 566 - Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
hinTS: Threshold Signatures with Silent Setup. 567 - Marc Titus Trifan, Alexandru Nicolau, Alexander V. Veidenbaum:
Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE. 568 - Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac:
From Polynomial IOP and Commitments to Non-malleable zkSNARKs. 569 - Kai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody:
Black-Box Separations for Non-Interactive Commitments in a Quantum World. 570 - Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi:
Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds. 571 - Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil:
Scalable Private Signaling. 572 - Abhiram Kothapalli, Srinath T. V. Setty:
HyperNova: Recursive arguments for customizable constraint systems. 573 - Ajay Dabral:
A Randomized Bit Generator using Algebraic Number Theory. 574 - István Vajda:
On Central Bank Digital Currency: A composable treatment. 575 - Elnaz Mehraein, Zahra Ahmadian, Reza Nourmohammadi:
IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things. 576 - Nicky Mouha:
Exploring Formal Methods for Cryptographic Hash Function Implementations. 577 - Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang:
DORAM revisited: Maliciously secure RAM-MPC with logarithmic overhead. 578 - Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi:
Revealing the Secrets of Radio-Enabled Embedded Systems: on extraction of raw information from any on-board signal through RF. 579 - Rui Zhou, Ming Duan, Qi Wang, Qianqiong Wu, Sheng Guo, Lulu Guo, Zheng Gong:
Neural-Linear Attack Based on Distribution Data and Its Application on DES. 580 - Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda:
A security analysis on MQ-Sign. 581 - Elena Kirshanova, Alexander May, Julian Nowakowski:
New NTRU Records with Improved Lattice Bases. 582 - Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel:
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies. 583 - Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes:
General-Purpose Secure Conflict-free Replicated Data Types. 584 - Alex Dalton, David Thomas, Peter Cheung:
Secret Swapping: Two Party Fair Exchange. 585 - Alex Dalton, David Thomas, Peter Cheung:
Proofless Verifiable Computation from Integer Factoring. 586 - Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner:
Proof-Carrying Data From Arithmetized Random Oracles. 587 - Nicolas Sendrier:
Wave Parameter Selection. 588 - Andre Esser, Javier A. Verbel, Floyd Zweydinger, Emanuele Bellini:
ttCryptographicEstimators: a Software Library for Cryptographic Hardness Estimation. 589 - Francesco Berti:
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure. 590 - Shiyuan Xu, Yibo Cao, Xue Chen, Siu-Ming Yiu, Yanmin Zhao:
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications. 591 - Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais:
Blockchain Large Language Models. 592 - Johannes Mono, Tim Güneysu:
Implementing and Optimizing Matrix Triples with Homomorphic Encryption. 593 - Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:
Semidirect Product Key Exchange: the State of Play. 594 - Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures. 595 - Shenghui Su, Ping Luo:
Time Complexities of Multiple-precision Modular Operations and Related Ratios. 596 - Songze Li, Duanyi Yao, Jin Liu:
FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models. 597 - Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bünz, Ling Ren:
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. 598 - George Teseleanu:
A Note on a CBC-Type Mode of Operation. 599 - Beatrice Biasioli, Chiara Marcolla, Marco Calderini, Johannes Mono:
Improving and Automating BFV Parameters Selection: An Average-Case Approach. 600 - George Teseleanu:
Threshold Cryptosystems Based on 2k-th Power Residue Symbols. 601 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. 602 - Marc Joye:
TFHE Public-Key Encryption Revisited. 603 - Vincent Hwang:
Technical Report: Even Faster Polynomial Multiplication for NTRU Prime with AVX2. 604 - Apostolos Tzinas, Dionysis Zindros:
The Principal-Agent Problem in Liquid Staking. 605 - Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo:
Novel Approach to Cryptography Implementation using ChatGPT. 606 - Alexander Maximov, Mats Näslund:
Security analysis of the Milenage-construction based on a PRF. 607 - Paul Germouty, Enrique Larraia, Wei Zhang:
Publicly Verifiable Auctions with Privacy. 608 - Ferhat Karakoç, Alptekin Küpçü:
Enabling Two-Party Secure Computation on Set Intersection. 609 - Xingyu Meng, Abhrajit Sengupta, Kanad Basu:
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans. 610 - Thomas Marquet, Elisabeth Oswald:
A Comparison of Multi-task learning and Single-task learning Approaches. 611 - Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. 612 - Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Computational Quantum Secret Sharing. 613 - Tianyu Zhang:
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing. 614 - Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. 615 - Andrea Cerulli, Aisling Connolly, Gregory Neven, Franz-Stefan Preiss, Victor Shoup:
vetKeys: How a Blockchain Can Keep Many Secrets. 616 - Soham Roy, Anubhab Baksi, Anupam Chattopadhyay:
Quantum Implementation of ASCON Linear Layer. 617 - Jonas Bertels, Michiel Van Beirendonck, Furkan Turan, Ingrid Verbauwhede:
Hardware Acceleration of FHEW. 618 - Hiroki Furue, Tsuyoshi Takagi:
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. 619 - Benedikt Bünz, Binyi Chen:
ProtoStar: Generic Efficient Accumulation/Folding for Special Sound Protocols. 620 - Claude Carlet:
On APN functions whose graphs are maximal Sidon sets. 621 - Emanuele Bellini, David Gérault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan K. Tiwari, Rusydi H. Makarim:
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives. 622 - Duhyeong Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE. 623 - Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi:
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures. 624 - Junru Li, Pengzhen Ke, Liang Feng Zhang:
Efficient Information-Theoretic Distributed Point Function with General Output Groups. 625 - Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang:
Sprints: Intermittent Blockchain PoW Mining. 626 - Benny Applebaum, Eliran Kachlon:
Conflict Checkable and Decodable Codes and Their Applications. 627 - Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
SEC: Fast Private Boolean Circuit Evaluation from Encrypted Look-ups. 628 - Vlasis Koutsos, Dimitrios Papadopoulos:
Publicly Auditable Functional Encryption. 629 - Benjamin E. Diamond, Jim Posen:
Proximity Testing with Logarithmic Randomness. 630 - KeYi Liu, Chungen Xu, Bennian Dou, Lei Xu:
Optimization of Functional Bootstrap with Large LUT and Packing Key Switching. 631 - Jung Hee Cheon, Minsik Kang, Taeseong Kim, Junyoung Jung, Yongdong Yeo:
High-Throughput Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Channel-By-Channel Packing. 632 - Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box To Threshold. 633 - Sreyosi Bhattacharyya, Kaushik Nath, Palash Sarkar:
Polynomial Hashing over Prime Order Fields. 634 - Schwinn Saereesitthipitak, Dionysis Zindros:
Cassiopeia: Practical On-Chain Witness Encryption. 635 - Gustavo Banegas, Florian Caullery:
Multi-Armed SPHINCS+. 636 - Jean Liénardy:
Padding-based forgeries in the mode XOCB. 637 - Shahram Rasoolzadeh:
Classification of All t-Resilient Boolean Functions with t+4 Variables. 638 - Lena Heimberger, Fredrik Meisingseth, Christian Rechberger:
OPRFs from Isogenies: Designs and Analysis. 639 - Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Benjamin Wesolowski:
A Direct Key Recovery Attack on SIDH. 640 - Charles Gouert, Vinu Joseph, Steven Dalton, Cédric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos:
Accelerated Encrypted Execution of General-Purpose Applications. 641 - Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux:
PELTA - Shielding Multiparty-FHE against Malicious Adversaries. 642 - Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova:
Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata. 643 - Jakob Burkhardt, Ivan Damgård, Tore Kasper Frederiksen, Satrajit Ghosh, Claudio Orlandi:
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. 644 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. 645 - Zhengjun Cao, Lihua Liu:
A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT". 646 - Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh:
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service. 647 - Wei Ren:
Collatz Computation Sequence for Sufficient Large Integers is Random. 648 - Michael Brand, Hamish Ivey-Law, Tania Churchill:
FinTracer: A privacy-preserving mechanism for tracing electronic money. 649 - Geoffroy Couteau, Clément Ducros:
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited. 650 - Marc Fischlin:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. 651 - Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Efficient and Robust Secure Quantized Aggregation. 652 - Sonja Bruckner, Sebastian Ramacher, Christoph Striecks:
Muckle+: End-to-End Hybrid Authenticated Key Exchanges. 653 - Thomas Schneider, Hossein Yalame, Michael Yonli:
Griffin: Towards Mixed Multi-Key Homomorphic Encryption. 654 - Joshua Davis, Rashid Minhas, Michelle Casario:
TandaPay Whistleblowing Communities: Shifting Workplace Culture Towards Zero-Tolerance Sexual Harassment Policies. 655 - Bolton Bailey, Andrew Miller:
Formalizing Soundness Proofs of SNARKs. 656 - Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao:
Ou: Automating the Parallelization of Zero-Knowledge Protocols. 657 - Zhengjun Cao, Lihua Liu:
A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things". 658 - Tianrui Wang, Anyu Wang, Xiaoyun Wang:
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. 659 - Andrea Basso, Luciano Maino, Giacomo Pope:
FESTA: Fast Encryption from Supersingular Torsion Attacks. 660 - Tiago Martins, João Farinha:
Study of Arithmetization Methods for STARKs. 661 - Reo Eriguchi:
Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity. 662 - Joel Gärtner:
NTWE: A Natural Combination of NTRU and LWE. 663 - Antoine Joux:
MPC in the head for isomorphisms and group actions. 664 - Keita Emura:
On the Feasibility of Identity-based Encryption with Equality Test against Insider Attacks. 665 - Morgan Thomas:
Arithmetization of predicates into Halo 2 using application specific trace types. 666 - Sina Aeeneh:
New Bounds on the Accuracy of Majority Voting for Multi-Class Classification. 667 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Statement-Oblivious Threshold Witness Encryption. 668 - Thomas Kaeding:
Classical substitution ciphers and group theory. 669 - István András Seres, Péter Burcsi:
Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time. 670 - Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit:
Proving knowledge of isogenies - A survey. 671 - Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. 672 - Mark Zhandry:
Tracing Quantum State Distinguishers via Backtracking. 673 - Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. 674 - Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang:
Efï¬cient and Secure Quantile Aggregation of Private Data Streams. 675 - Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang:
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. 676 - Barbara Gigerl, Robert Primas, Stefan Mangard:
Secure Context Switching of Masked Software Implementations. 677 - Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas Sen:
A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version. 678 - Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren:
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path. 679 - Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang:
Private Polynomial Commitments and Applications to MPC. 680 - Colin Steidtmann, Sanjay Gollapudi:
Benchmarking ZK-Circuits in Circom. 681 - Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman:
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT. 682 - Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi:
MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More. 683 - Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment". 684 - Foo Yee Yeo, Jason H. M. Ying:
Third-Party Private Set Intersection. 685 - Raziyeh Salarifard, Hadi Soleimany:
Efficient Accelerator for NTT-based Polynomial Multiplication. 686 - Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia:
SoK: Delay-based Cryptography. 687 - Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia:
Applications of Timed-release Encryption with Implicit Authentication. 688 - Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither:
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. 689 - Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini:
Invertible Quadratic Non-Linear Functions over 픽pn via Multiple Local Maps. 690 - Quang Dao, Jim Miller, Opal Wright, Paul Grubbs:
Weak Fiat-Shamir Attacks on Modern Proof Systems. 691 - Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes. 692 - Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik:
LeakyOhm: Secret Bits Extraction using Impedance Analysis. 693 - Xiaohan Yue:
VeriVoting: A decentralized, verifiable and privacy-preserving scheme for weighted voting. 694 - Jeffrey Champion, David J. Wu:
Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments. 695 - Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri-Eliasi, Joan Daemen:
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices. 696 - Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan:
NFT Trades in Bitcoin with Off-chain Receipts. 697 - S. Murugesh:
A public-key based secure quantum-communication protocol using entangled qubits. 698 - Xiaokang Dai, Jingwei Chen, Wenyuan Wu, Yong Feng:
Lattice-based, more general anti-leakage model and its application in decentralization. 699 - Luke Harmon, Gaetan Delavignette, Arnab Roy, David William Honorio Araujo da Silva:
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption. 700 - Tabitha Ogilvie:
Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. 701 - Ghada Almashaqbeh, Rohit Chatterjee:
Building Unclonable Cryptography: A Tale of Two No-cloning Paradigms. 702 - Ping Wang, Yiting Su:
BQP ≠q QMA. 703 - Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky:
Asymmetric Multi-Party Computation. 704 - Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. 705 - You Lyu, Shengli Liu:
Two-Message Authenticated Key Exchange from Public-Key Encryption. 706 - Julia Kastner, Julian Loss, Omar Renawi:
Concurrent Security of Anonymous Credentials Light, Revisited. 707 - Manuel Barbosa, Peter Schwabe:
Kyber terminates. 708 - Alexandre Augusto Giron:
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement. 709 - Varun Madathil, Alessandra Scafuro:
PriFHEte: Achieving Full-Privacy in Account-based Cryptocurrencies is Possible. 710 - Serge Fehr, Yu-Hsuan Huang:
On the Quantum Security of HAWK. 711 - Alexandru Ionita:
Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures. 712 - Ali Dogan, Kemal Bicakci:
KAIME : Central Bank Digital Currency with Realistic and Modular Privacy. 713 - ChihYun Chuang, IHung Hsu, TingFang Lee:
A Two-Party Hierarchical Deterministic Wallets in Practice. 714 - Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. 715 - Malik Imran, Aikata, Sujoy Sinha Roy, Samuel N. Pagliarini:
Towards High-speed ASIC Implementations of Post-Quantum Cryptography. 716 - Felice Manganiello, Freeman Slaughter:
Generic Error SDP and Generic Error CVE. 717 - Giacomo Borin, Edoardo Persichetti, Paolo Santini:
Zero-Knowledge Proofs from the Action Subgraph. 718 - Erkan Tairi, Akin Ünal:
Lower Bounds for Lattice-based Compact Functional Encryption. 719 - Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang:
MUSES: Efficient Multi-User Searchable Encrypted Database. 720 - Supriya Adhikary, Angshuman Karmakar:
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication. 721 - Mugurel Barcau, Vicentiu Pasol, George C. Turcas:
Composing Bridges. 722 - Giuseppe D'Alconzo, Andrea Flamini, Andrea Gangemi:
Non-Interactive Commitment from Non-Transitive Group Actions. 723 - Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the ASCADv2 Dataset. 724 - Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. 725 - Zhengjun Cao, Lihua Liu:
A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT". 726 - Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab:
Safeguarding Physical Sneaker Sale Through a Decentralized Medium. 727 - Kevin Choi, Aathira Manoj, Joseph Bonneau:
SoK: Distributed Randomness Beacons. 728 - Yang Yu, Huiwen Jia, Xiaoyun Wang:
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures. 729 - Anubhab Baksi:
The Problem of Half Round Key XOR. 730 - Bo-Yin Yang, Wei-Jeng Wang, Shang-Yi Yang, Char-Shin Miou, Chen-Mou Cheng:
Fast Exhaustive Search for Polynomial Systems over F3. 731 - Quentin L. Meunier, Abdul Rahman Taleb:
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations. 732 - Vasyl Ustimenko, Tymoteusz Chojecki:
On implemented graph based generator of cryptographically strong pseudorandom sequences of multivariate nature. 733 - Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy:
TLS â' Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android. 734 - Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, Léo Robert:
Privacy-preserving Attestation for Virtualized Network Infrastructures. 735 - Julie Ha, Chloé Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller:
Private Eyes: Zero-Leakage Iris Searchable Encryption. 736 - Koustabh Ghosh, Joan Daemen:
Differential properties of integer multiplication. 737 - Vasyl Ustimenko, Aneta Wróblewska:
Extremal algebraic graphs, quadratic multivariate public keys and temporal rules. 738 - Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, MinJune Yi:
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits. 739 - Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen:
Practical Robust DKG Protocols for CSIDH. 740 - Artem Grigor, Vincenzo Iovino, Giuseppe Visconti:
The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations. 741 - Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha:
Finding Desirable Substitution Box with SASQUATCH. 742 - Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-based Anonymous Systems. 743 - Vasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski:
On Extremal Algebraic Graphs and implementations of new cubic Multivariate Public Keys. 744 - Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky:
PSI from ring-OLE. 745 - Masahito Ishizaka, Kazuhide Fukushima:
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. 746 - Masahito Ishizaka:
Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications. 747 - Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. 748 - Magnus Ringerud:
Note on Subversion-Resilient Key Exchange. 749 - Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomas Gerlich, Sylvain Guilley, Naina Gupta, Kai Hu, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdenek Martinasek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa:
BAKSHEESH: Similar Yet Different From GIFT. 750 - Yuval Gelles, Ilan Komargodski:
Scalable Agreement Protocols with Optimal Optimistic Efficiency. 751 - Denis Firsov, Tiago Oliveira, Dominique Unruh:
Schnorr protocol in Jasmin. 752 - Kaizhan Lin, Weize Wang, Zheng Xu, Chang-An Zhao:
A Faster Software Implementation of SQISign. 753 - Nir Bitansky, Chethan Kamath, Omer Paneth, Ron Rothblum, Prashant Nalini Vasudevan:
Batch Proofs are Statistically Hiding. 754 - Manuel Barbosa, Andreas Hülsing:
The security of Kyber's FO-transform. 755 - Carlos Aguilar Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue:
SDitH in the QROM. 756 - Zhengjun Cao, Lihua Liu:
A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System". 757 - Laura Hetz, Thomas Schneider, Christian Weinert:
Scaling Mobile Private Contact Discovery to Billions of Users. 758 - Jeongeun Park, Sergi Rovira:
Efficient TFHE Bootstrapping in the Multiparty Setting. 759 - Anton Wahrstätter, Liyi Zhou, Kaihua Qin, Davor Svetinovic, Arthur Gervais:
Time to Bribe: Measuring Block Construction Market. 760 - Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services (extended version). 761 - Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha:
How to Design Fair Protocols in the Multi-Blockchain Setting. 762 - Miranda Christ, Sam Gunn, Or Zamir:
Undetectable Watermarks for Language Models. 763 - Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager:
Subversion-Resilient Authenticated Encryption without Random Oracles. 764 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA in Three Rounds. 765 - Qiqi Lai, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang:
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials. 766 - Andrey Kim, Yongwoo Lee, Maxim Deryabin, Jieun Eom, Rakyong Choi:
LFHE: Fully Homomorphic Encryption with Bootstrapping Key Size Less than a Megabyte. 767 - Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. 768 - Ulrich Haböck:
Brakedown's expander code. 769 - Dominique Unruh:
Towards compressed permutation oracles. 770 - Mariya Georgieva, Sergiu Carpov, Nicolas Gama, Sandra Guasch, Dimitar Jetchev:
Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic. 771 - Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu:
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. 772 - Alexandre Adomnicai:
An update on Keccak performance on ARMv7-M. 773 - Yiming Li, Shengli Liu:
Tagged Chameleon Hash from Lattice and Application to Redactable Blockchain. 774 - Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Exact Security Analysis of ASCON. 775 - Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Quantum Attacks on Type-1 Generalized Feistel Schemes. 776 - Alexander May, Julian Nowakowski:
Too Many Hints - When LLL Breaks LWE. 777 - Alex Ozdemir, Riad S. Wahby, Fraser Brown, Clark W. Barrett:
Bounded Verification for Finite-Field-Blasting (In a Compiler for Zero Knowledge Proofs). 778 - Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH. 779 - Alia Umrani, Apurva K. Vangujar, Paolo Palmieri:
An Anonymous Multi-receiver Certificateless Hybrid Signcryption (AMCLHS) using mKEM-DEM for Broadcast Communication. 780 - Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel:
Skye: A Fast KDF based on Expanding PRF and its Application to Signal. 781 - Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. 782 - Andrea Di Giusto, Chiara Marcolla:
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings. 783 - Alessio Meneghetti, Edoardo Signorini:
History-Free Sequential Aggregate Signatures from Generic Trapdoor Functions. 784 - Dmitrii I. Koshelev:
Generation of two "independent" points on an elliptic curve of j-invariant ≠q 0, 1728. 785 - Zhipeng Wang, Xihan Xiong, William J. Knottenbelt:
Blockchain Transaction Censorship: (In)secure and (In)efficient? 786 - Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala:
Private Proof-of-Stake Blockchains using Differentially-private Stake Distortion. 787 - Steve Thakur:
A flexible Snark via the monomial basis. 788 - Sahiba Suryawanshi, Dhiman Saha:
Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher. 789 - Yaobin Shen, François-Xavier Standaert:
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. 790 - Andrea Basso, Tako Boris Fouotsa:
New SIDH Countermeasures for a More Efficient Key Exchange. 791 - Jiangxia Ge, Tianshu Shan, Rui Xue:
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security. 792 - Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers:
On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH. 793 - Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
Areion: Highly-Efficient Permutations and Its Applications (Extended Version). 794 - Shun Watanabe, Kenji Yasunaga:
Bit-Security Preserving Hardness Amplification. 795 - Bart Mennink, Charlotte Lefevre:
Generic Security of the Ascon Mode: On the Power of Key Blinding. 796 - Timo Glaser, Alexander May, Julian Nowakowski:
Entropy Suffices for Key Guessing. 797 - Alexandru Cojocaru, Juan A. Garay, Fang Song:
Generalized Hybrid Search and Applications. 798 - Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim:
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation. 799 - Benoît Libert:
Vector Commitments With Short Proofs of Smallness. 800 - Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner:
We Are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. 801 - Noga Amit, Guy N. Rothblum:
Constant-Round Arguments from One-Way Functions. 802 - Gideon Samid:
"Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity. 803 - Mariya Georgieva, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin:
Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation. 804 - Ohad Klein, Ilan Komargodski:
New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme. 805 - Hamza Abusalah:
SNACKs for Proof-of-Space Blockchains. 806 - David Jacquemin, Anisha Mukherjee, Sujoy Sinha Roy, Péter Kutas:
Towards a constant-time implementation of isogeny-based signature, SQISign. 807 - Benedikt Auerbach, Charlotte Hoffmann, Guillermo Pascual-Perez:
Generic-Group Lower Bounds via Reductions Between Geometric-Search Problems: With and Without Preprocessing. 808 - Dennis Dayanikli, Anja Lehmann:
Password-Based Credentials with Security against Server Compromise. 809 - Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. 810 - Giuseppe Persiano, Kevin Yeo:
Limits of Breach-Resistant and Snapshot-Oblivious RAMs. 811 - Cody Freitag, Brent Waters, David J. Wu:
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More. 812 - Seny Kamara, Tarik Moataz:
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search. 813 - Zhengjun Cao, Lihua Liu:
A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems". 814 - Morten Dahl, Daniel Demmler, Sarah El Kazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Samuel Tap, Michael Walter:
Noah's Ark: Efficient Threshold-FHE Using Noise Flooding. 815 - André Schrottenloher, Marc Stevens:
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks. 816 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl:
Oblivious Transfer with Constant Computational Overhead. 817 - Thomas Attema, Serge Fehr, Nicolas Resch:
A Generalized Special-Soundness Notion and its Knowledge Extractors. 818 - Anna Hambitzer, David Gérault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini:
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher. 819 - Ananya Appan, Ashish Choudhury:
Network Agnostic MPC with Statistical Security. 820 - Vijay Dahiphale, Hrishikesh Raut, Gaurav Bansod, Devendra Dahiphale:
Fast and Energy Efficient Implementation of PRIDE and PRESENT Ciphers on FPGA for IoT Applications. 821 - Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang:
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. 822 - Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Lattice-based Authenticated Key Exchange with Tight Security. 823 - Ulrich Haböck, Daniel Lubarov, Jacqueline Nabaglo:
Reed-Solomon Codes over the Circle Group. 824 - Katerina Mitrokotsa, Sayantan Mukherjee, Jenit Tomy:
Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC). 825 - Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications. 826 - Vipul Goyal, Xiao Liang, Giulio Malavolta:
On Concurrent Multi-Party Quantum Computation. 827 - Thomas Pornin:
Optimized Discrete Logarithm Computation for Faster Square Roots in Finite Fields. 828 - James Choncholas, Ketan Bhardwaj, Ada Gavrilovska:
TGh: A TEE/GC Hybrid Enabling Confidential FaaS Platforms. 829 - Borja Gomez Rodriguez:
HPPC: Hidden Product of Polynomial Composition. 830 - Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang:
An automated generation tool of hardware masked S-box: AGEMA+. 831 - Guy Zyskind, Avishay Yanai, Alex 'Sandy' Pentland:
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications. 832 - Ghada Almashaqbeh, Anca Nitulescu:
Anonymous, Timed and Revocable Proxy Signatures. 833 - Haetham Al Aswad, Cécile Pierrot, Emmanuel Thomé:
Discrete Logarithm Factory. 834 - Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb:
Unifying Freedom and Separation for Tight Probing-Secure Composition. 835 - Théophile Brézot, Paola de Perthuis, David Pointcheval:
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. 836 - Diego F. Aranha, Michele Battagliola, Lawrence Roy:
Faster coercion-resistant e-voting by encrypted sorting. 837 - Benny Applebaum, Oded Nir, Benny Pinkas:
How to Recover a Secret with O(n) Additions. 838 - Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou:
On Linear Communication Complexity for (Maximally) Fluid MPC. 839 - Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen:
Revisiting the Indifferentiability of the Sum of Permutations. 840 - Dylan Rowe, Joachim Breitner, Nadia Heninger:
The curious case of the half-half Bitcoin ECDSA nonces. 841 - Mingxun Zhou, Mengshi Zhao, T.-H. Hubert Chan, Elaine Shi:
Advanced Composition Theorems for Differential Obliviousness. 842 - Gareth T. Davies, Sebastian H. Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager:
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol. 843 - Diana Maimut, George Teseleanu:
Inferring Bivariate Polynomials for Homomorphic Encryption Application. 844 - Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros:
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding. 845 - Giacomo Fenzi, Ngoc Khanh Nguyen:
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency. 846 - Edoardo Persichetti, Paolo Santini:
A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures. 847 - Chen Qian, Yao Jiang Galteland, Gareth T. Davies:
Extending Updatable Encryption: Public Key, Tighter Security and Signed Ciphertexts. 848 - Marshall Ball, Alexander Bienstock, Lisa Kohl, Pierre Meyer:
Towards Topology-Hiding Computation from Oblivious Transfer. 849 - Kaiyi Zhang, Hongrui Cui, Yu Yu:
Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS. 850 - Alex Biryukov, Je Sen Teh, Aleksei Udovenko:
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. 851 - Kelong Cong, Robin Geelen, Jiayi Kang, Jeongeun Park:
Efficient and Secure k-NN Classification from Improved Data-Oblivious Programs and Homomorphic Encryption. 852 - Julia Hesse, Nitin Singh, Alessandro Sorniotti:
How to Bind Anonymous Credentials to Humans. 853 - Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager:
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. 854 - Luke Harmon, Gaetan Delavignette:
Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals. 855 - Ashrujit Ghoshal, Stefano Tessaro:
The Query-Complexity of Preprocessing Attacks. 856 - Carsten Baum, Samuel Dittmer, Peter Scholl, Xiao Wang:
SoK: Vector OLE-Based Zero-Knowledge Protocols. 857 - Krijn Reijnders:
Effective Pairings in Isogeny-based Cryptography. 858 - Michele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti:
Cutting the GRASS: Threshold GRoup Action Signature Schemes. 859 - Damiano Abram, Brent Waters, Mark Zhandry:
Security-Preserving Distributed Samplers: How to Generate any CRS in One Round without Random Oracles. 860 - Matilda Backendal, Mihir Bellare, Felix Günther, Matteo Scarlata:
When Messages are Keys: Is HMAC a dual-PRF? 861 - Jiangxia Ge, Tianshu Shan, Rui Xue:
Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 862 - Damiano Abram, Maciej Obremski, Peter Scholl:
On the (Im)possibility of Distributed Samplers: Lower Bounds and Party-Dynamic Constructions. 863 - Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, Akin Ünal:
Compact Lossy Trapdoor Functions and Selective Opening Security From LWE. 864 - Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH. 865 - Dennis Hofheinz, Julia Kastner, Akin Ünal, Bogdan Ursu:
Decoding LTFs in the Generic Group Model. 866 - Felix Dörre, Astrid Ottenhues:
Secure Logging in between Theory and Practice: Security Analysis of the Implementation of Forward Secure Log Sealing in Journald. 867 - Sarisht Wadhwa, Luca Zanolini, Francesco D'Amato, Aditya Asgaonkar, Fan Zhang, Kartik Nayak:
Breaking the Chains of Rationality: Understanding the Limitations to and Obtaining Order Policy Enforcement. 868 - Shumo Chu, Brandon H. Gomes, Francisco Hernandez Iglesias, Todd Norton, Duncan Tebbs:
UniPlonk: Plonk with Universal Verifier. 869 - Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Additive Randomized Encodings and Their Applications. 870 - Yu Long Chen, Wonseok Choi, Changmin Lee:
Improved Multi-User Security Using the Squared-Ratio Method. 871 - Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:
Conjunctive Searchable Symmetric Encryption from Hard Lattices. 872 - Jiale Chen, Dima Grigoriev, Vladimir Shpilrain:
Digital signature schemes using non-square matrices or scrap automorphisms. 873 - Dimitris Kolonelos, Giulio Malavolta, Hoeteck Wee:
Distributed Broadcast Encryption from Bilinear Groups. 874 - Dennis Hofheinz, Julia Kastner, Karen Klein:
The Power of Undirected Rewindings for Adaptive Security. 875 - Michele Fabbrini:
Circular Multiplicative Modular Exponentiation: A New Public Key Exchange Algorithm. 876 - Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta, Or Sattath, Quoc-Huy Vu, Michael Walter:
Public-Key Encryption with Quantum Keys. 877 - Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh:
Introducing two Low-Latency Cipher Families: Sonic and SuperSonic. 878 - Claude Carlet, Irene Villa:
On cubic-like bent Boolean functions. 879 - Khashayar Barooti, Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan, Serge Vaudenay:
On Active Attack Detection in Messaging with Immediate Decryption. 880 - Xiang Fu:
Strict Linear Lookup Argument. 881 - Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy:
Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN. 882 - Loïc Masure, François-Xavier Standaert:
Prouï¬ & Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model. 883 - Subhadeep Banik, Daniel Collins, Willi Meier:
Near Collision Attack Against Grain v1. 884 - Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan:
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling. 885 - Gabrielle De Micheli, Daniele Micciancio, Alice Pellet-Mary, Nam Tran:
Reductions from module lattices to free module lattices, and application to dequantizing module-LLL. 886 - Mingyao Shao, Yuejun Liu, Yongbin Zhou:
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. 887 - Qian Liu, Xiaobei Dong, Ximeng Liu, Jian Zou:
Further results on several classes of optimal ternary cyclic codes with minimum distance four. 888 - Zhengjun Cao, Lihua Liu:
A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network". 889 - Krzysztof Mank:
Efficient Evaluation of Frequency Test for Overlapping Vectors Statistic. 890 - Zhichun Lu, Ren Zhang:
When is Slower Block Propagation More Profitable for Large Miners? 891 - Aviv Yaish, Maya Dotan, Kaihua Qin, Aviv Zohar, Arthur Gervais:
Suboptimality in DeFi. 892 - Marina Krcek, Thomas Ordas, Stjepan Picek:
Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage. 893 - Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh:
Differentially Private Selection from Secure Distributed Computing. 894 - Anisha Mukherjee, Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy:
ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations. 895 - Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
Improved Gadgets for the High-Order Masking of Dilithium. 896 - Emanuele Giunta:
On the Impossibility of Algebraic NIZK In Pairing-Free Groups. 897 - Céline Chevalier, Guirec Lebrun, Ange Martinelli:
Leaking-cascades: an optimized construction for KEM hybridization. 898 - Hien Chu, Paul Gerhart, Tim Ruffing, Dominique Schröder:
Practical Schnorr Threshold Signatures Without the Algebraic Group Model. 899 - Anindya Bhandari, Allison Bishop:
What If Alice Wants Her Story Told? 900 - Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain:
Secure Multiparty Computation with Free Branching. 901 - Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha:
SublonK: Sublinear Prover PlonK. 902 - Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo:
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps. 903 - Prabhanjan Ananth, Yao-Ting Lin, Henry Yuen:
Pseudorandom Strings from Pseudorandom Quantum States. 904 - Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar:
zkSaaS: Zero-Knowledge SNARKs as a Service. 905 - Hoeteck Wee:
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions. 906 - Michael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, Xiang Fu:
Efficient Zero Knowledge for Regular Language. 907 - Emre Karabulut, Aydin Aysu:
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature. 908 - Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song:
Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference. 909 - Zeyu Liu, Yunhao Wang:
Amortized Functional Bootstrapping in less than 7ms, with Õ(1) polynomial multiplications. 910 - Zhongfeng Niu, Siwei Sun, Hailun Yan, Qi Wang:
General Results of Linear Approximations over Finite Abelian Groups. 911 - Ryad Benadjila, Arnaud Ébalard:
Randomness of random in Cisco ASA. 912 - John Preuß Mattsson:
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal. 913 - Dominik Hartmann, Eike Kiltz:
Limits in the Provable Security of ECDSA Signatures. 914 - Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa:
Attribute-based Single Sign-On: Secure, Private, and Efficient. 915 - Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez:
Unlinkability and Interoperability in Account-Based Universal Payment Channels. 916 - Tohru Kohrita, Patrick Towa:
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments. 917 - Nils Fleischhacker, Kasper Green Larsen, Maciej Obremski, Mark Simkin:
Invertible Bloom Lookup Tables with Less Memory and Randomness. 918 - Satrajit Ghosh, Mark Simkin:
Threshold Private Set Intersection with Better Communication Complexity. 919 - Jitendra Bhandari, Likhitha Mankali, Mohammed Nabeel, Ozgur Sinanoglu, Ramesh Karri, Johann Knechtel:
Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks. 920 - Koji Nuida:
Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding. 921 - Marco Cianfriglia, Elia Onofri, Marco Pedicini:
mRLWE-CP-ABE a revocable CP-ABE for Post-Quantum Cryptography. 922 - Ben Nassi, Etay Iluz, Danny Cohen-Or, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici:
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED. 923 - Christoph Dobraunig, Bart Mennink:
Generalized Initialization of the Duplex Construction. 924 - Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran:
Homomorphic Indistinguishability Obfuscation and its Applications. 925 - Nicolas Aragon, Victor Dyseryn, Philippe Gaborit:
Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme. 926 - Alessandro Gecchele:
Collision Entropy Estimation in a One-Line Formula. 927 - Claude Carlet, Enrico Piccione:
Restricting vectorial functions to affine spaces and deducing infinite families of 4-uniform permutations, in relation to the strong D-property. 928 - Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni:
The tweakable block cipher family QARMAv2. 929 - Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki:
Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time Verification. 930 - S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption. 931 - Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody:
On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model. 932 - Patrick Hough, Caroline Sandsbråten, Tjerand Silde:
Concrete NTRU Security and Advances in Practical Lattice-Based Electronic Voting. 933 - Jesús García Rodríguez, Stephan Krenn, Daniel Slamanig:
To Pass or Not to Pass: Privacy-Preserving Physical Access Control. 934 - Vincent Meyers, Dennis R. E. Gnad, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori:
Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs (Extended Version). 935 - Mohammad Vaziri, Vesselin Velichkov:
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak. 936 - Sam Widlund:
WESP: An encryption method that is proven to require an exponentially growing time to break it. 937 - Zeta Avarikioti, Stefan Schmid, Samarth Tiwari:
Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks. 938 - Renaud Dubois:
Speeding up elliptic computations for Ethereum Account Abstraction. 939 - Daniel J. Bernstein, Tung Chou:
CryptAttackTester: formalizing attack analyses. 940 - Shweta Agrawal, Melissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. 941 - Brett Hemenway Falk, Daniel Noble, Tal Rabin:
Proactive Secret Sharing with Constant Communication. 942 - James Hsin-yu Chiang, Bernardo David, Mariana Gama, Christian Janos Lebeda:
Correlated-Output-Differential-Privacy and Applications to Dark Pools. 943 - Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso:
BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks. 944 - Lukás Folwarczný, Mika Göös, Pavel Hubácek, Gilbert Maystre, Weiqiang Yuan:
One-Way Functions vs. TFNP: Simpler and Improved. 945 - Nils Fleischhacker, Kasper Green Larsen, Mark Simkin:
Compressing Encrypted Data Over Small Fields. 946 - Joel Gärtner:
Concrete Security from Worst-Case to Average-Case Lattice Reductions. 947 - Subhadeep Banik, Francesco Regazzoni:
Compact Circuits for Efficient Mobius Transform. 948 - Susil Kumar Bishoi:
Generalized word-oriented feedback shift registers. 949 - Alain Couvreur, Rocco Mora, Jean-Pierre Tillich:
A new approach based on quadratic forms to attack the McEliece cryptosystem. 950 - Huayi Qi, Minghui Xu, Xiuzhen Cheng, Weifeng Lyu:
Latency-First Smart Contract: Overclock the Blockchain for a while. 951 - Zvika Brakerski, Stav Medina:
Limits on Adaptive Security for Attribute-Based Encryption. 952 - Yibin Yang, Stanislav Peceny, David Heath, Vladimir Kolesnikov:
Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs). 953 - Julian Loss, Gilad Stern:
Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults. 954 - Benny Applebaum, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tianren Liu, Vinod Vaikuntanathan:
Succinct Computational Secret Sharing. 955 - Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais:
Speculative Denial-of-Service Attacks in Ethereum. 956 - Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain:
BASS: Boolean Automorphisms Signature Scheme. 957 - Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song:
Faster TFHE Bootstrapping with Block Binary Keys. 958 - Mohammad Hajiabadi, Shahram Khazaei, Behzad Vahdani:
Randomness Recoverable Secret Sharing Schemes. 959 - Akram Khalesi, Zahra Ahmadian:
Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU. 960 - Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. 961 - Mieczyslaw Kula:
Access structures induced by polymatroids with extreme rank function. 962 - Tim Beyne:
An invariant of the round function of QARMAv2-64. 963 - Xiang Xie, Kang Yang, Xiao Wang, Yu Yu:
Lightweight Authentication of Web Data via Garble-Then-Prove. 964 - Joppe W. Bos, Alexander Dima, Alexander Kiening, Joost Renes:
Post-Quantum Secure Over-the-Air Update of Automotive Systems. 965 - Hao Cheng, Daniel Page:
eLIMInate: a Leakage-focused ISE for Masked Implementation. 966 - Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song:
SoK: Data Sovereignty. 967 - Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets. 968 - Wilson D. Nguyen, Dan Boneh, Srinath T. V. Setty:
Revisiting the Nova Proof System on a Cycle of Curves. 969 - Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach:
A Note on Non-Interactive Zero-Knowledge from CDH. 970 - Arthur Américo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri:
Defining and Controlling Information Leakage in US Equities Trading. 971 - Adam Petcher, Matthew Campagna:
Security of Hybrid Key Establishment using Concatenation. 972 - Xihan Xiong, Zhipeng Wang, William J. Knottenbelt, Michael Huth:
Demystifying Just-in-Time (JIT) Liquidity Attacks on Uniswap V3. 973 - Zijing Di, Lucas Xia, Wilson D. Nguyen, Nirvan Tyagi:
MUXProofs: Succinct Arguments for Machine Computation from Tuple Lookups. 974 - Esra Günsay, Burcu E. Karakas, N. Gamze Orhon Kiliç, Oguz Yayla:
Design of Blockchain-Based Many-to-Many Anonymous Data Sharing Scheme. 975 - Kyoichi Asano, Yohei Watanabe:
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction. 976 - Miguel Ambrona, Marc Beunardeau, Raphael R. Toledo:
Timed Commitments Revisited. 977 - Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List:
sfPAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation. 978 - Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap:
Faster Secret Keys for (T)FHE. 979 - Thibault Balenbois, Jean-Baptiste Orfila, Nigel P. Smart:
Trivial Transciphering With Trivium and TFHE. 980 - Nigel P. Smart:
Practical and Efficient FHE-based MPC. 981 - Floe Foxon:
On the 32-Character Zodiac Cipher. 982 - Eyal Kushnir, Guy Moshkowich, Hayim Shaul:
Secure Range-Searching Using Copy-And-Recurse. 983 - Youcef Mokrani, David Jao:
Generating Supersingular Elliptic Curves over 픽p with Unknown Endomorphism Ring. 984 - Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi:
On the Two-sided Permutation Inversion Problem. 985 - Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin:
Efficient Private Multiset ID Protocols. 986 - Mike Wa Nkongolo:
Fuzzification-based Feature Selection for Enhanced Website Content Encryption. 987 - Karim Eldefrawy, Nicholas Genise, Nathan Manohar:
On the Hardness of Scheme-Switching Between SIMD FHE Schemes. 988 - Sai Sandilya Konduru, Sweta Mishra:
Detection of Password Reuse and Credential Stuffing: A Server-side Approach. 989 - Sai Sandilya Konduru, Vishal Saraswat:
Privacy Preserving Records Sharing using Blockchain and Format Preserving Encryption. 990 - Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang:
Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off. 991 - Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen:
VSS from Distributed ZK Proofs and Applications. 992 - Zhengjun Cao, Lihua Liu:
A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function". 993 - Asuka Wakasugi, Mitsuru Tada:
A proposal for quantum GRS algorithm and the cryptanalysis for ROLLO and RQC. 994 - Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith:
Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields. 995 - Carsten Baum, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Emmanuela Orsini, Lawrence Roy, Peter Scholl:
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head. 996 - Alain Couvreur, Ilaria Zappatore:
An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes. 997 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai:
Tiresias: Large Scale, Maliciously Secure Threshold Paillier. 998 - Syed Z. Abbas, Mudassar Aslam:
Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing. 999 - Enrique Larraia, Owen Vaughan:
Private Timestamps and Selective Verification of Notarised Data on a Blockchain. 1000 - Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman:
Oblivious Accumulators. 1001 - Shuaishuai Li, Cong Zhang, Dongdai Lin:
Oblivious Transfer from Rerandomizable PKE. 1002 - Ran Cohen, Pouyan Forghani, Juan A. Garay, Rutvik Patel, Vassilis Zikas:
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited. 1003 - Willow Barkan-Vered, Franklin Harding, Jonathan Keller, Jiayu Xu:
On the Non-Malleability of ECVRF in the Algebraic Group Model. 1004 - Yuting Zuo, Li Xu, Yuexin Zhang, Chenbin Zhao, Zhaozhe Kang:
BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks. 1005 - Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang:
Reusable Secure Computation in the Plain Model. 1006 - Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai:
On Provable White-Box Security in the Strong Incompressibility Model. 1007 - Pierre Briaud, Pierre Loidreau:
Cryptanalysis of rank-metric schemes based on distorted Gabidulin codes. 1008 - Yongha Son, Jinhyuck Jeong:
PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption. 1009 - Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen:
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets. 1010 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan:
A Framework for Statistically Sender Private OT with Optimal Rate. 1011 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Arithmetic Sketching. 1012 - Anasuya Acharya, Carmit Hazay, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam:
Best of Both Worlds: Revisiting the Spymasters Double Agent Problem. 1013 - Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch:
An Efficient Data-Independent Priority Queue and its Application to Dark Pools. 1014 - Binbin Tu, Xiangling Zhang, Yujie Bai, Yu Chen:
Fast Unbalanced Private Computing on (Labeled) Set Intersection with Cardinality. 1015 - Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. 1016 - Charlotte Hoffmann, Mark Simkin:
Stronger Lower Bounds for Leakage-Resilient Secret Sharing. 1017 - Amit Jana, Anup Kumar Kundu, Goutam Paul:
SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers. 1018 - Victor Shoup:
The many faces of Schnorr. 1019 - Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE. 1020 - Logan Allen, Brian Klatt, Philip Quirk, Yaseen Shaikh:
EDEN - a practical, SNARK-friendly combinator VM and ISA. 1021 - Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish:
Zombie: Middleboxes that Don't Snoop. 1022 - Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang:
An STP-based model toward designing S-boxes with good cryptographic properties. 1023 - Alireza Kavousi, Aydin Abadi, Philipp Jovanovic:
Timed Secret Sharing. 1024 - Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You. 1025 - Ramiro Martínez, Paz Morillo, Sergi Rovira:
Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations. 1026 - Maxim Jourenko, Mario Larangeira:
State Machines across Isomorphic Layer 2 Ledgers. 1027 - Qi Wang, Haodong Huang, Juyan Li:
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation. 1028 - Joachim Zahnentferner:
hodlCoin: A Financial Game. 1029 - Yujin Oh, Kyungbae Jang, Anubhab Baksi, Hwajeong Seo:
Depth-Optimized Implementation of ASCON Quantum Circuit. 1030 - George Teseleanu:
Security Analysis of a Color Image Encryption Scheme Based on a Fractionalâ'Order Hyperchaotic System. 1031 - Tim Dokchitser, Alexandr Bulkin:
Zero Knowledge Virtual Machine step by step. 1032 - Pawel Cyprys, Shlomi Dolev, Oded Margalit:
OWF Candidates Based on: Xors, Error Detection Codes, Permutations, Polynomials, Interaction and Nesting. 1033 - Rujia Li, Xuanwei Hu, Qin Wang, Sisi Duan, Qi Wang:
Transaction Fairness in Blockchains, Revisited. 1034 - Eliana Carozza, Geoffroy Couteau, Antoine Joux:
Short Signatures from Regular Syndrome Decoding in the Head. 1035 - Boris Ryabko:
Reduction of the secret key length in the perfect cipher by data compression and randomisation. 1036 - Rasheed Kibria, Farimah Farahmandi, Mark M. Tehranipoor:
ARC-FSM-G: Automatic Security Rule Checking for Finite State Machine at the Netlist Abstraction. 1037 - Mojtaba Bisheh-Niasar, Daniel Lo, Anjana Parthasarathy, Blake Pelton, Bharat Pillilli, Bryan Kelly:
PQC Cloudization: Rapid Prototyping of Scalable NTT/INTT Architecture to Accelerate Kyber. 1038 - Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari:
SoK: Privacy-Preserving Signatures. 1039 - Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu:
E2E near-standard and practical authenticated transciphering. 1040 - Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak:
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance. 1041 - Ruize Wang, Martin Brisfors, Elena Dubrova:
A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation. 1042 - Leonie Reichert:
An Analysis of Requirements and Privacy Threats in Mobile Data Donations. 1043 - Evgeny K. Alekseev, Alexandra Babueva, Olga Zazykina:
AKE Zoo: 100 two-party protocols (to be continued). 1044 - Tomer Ashur, Al Kindi, Mohammad Mahzoun:
XHash8 and XHash12: Efficient STARK-friendly Hash Functions. 1045 - Tolun Tosun, Erkay Savas:
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography. 1046 - Peter Chvojka:
Private Coin Verifiable Delay Function. 1047 - Dominic Gold, Koray Karabina, Francis C. Motta:
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption. 1048 - Andrej Bogdanov, Pravesh Kothari, Alon Rosen:
Public-Key Encryption, Local Pseudorandom Generators, and the Low-Degree Method. 1049 - Zvika Brakerski, Maya Farber Brodsky, Yael Tauman Kalai, Alex Lombardi, Omer Paneth:
SNARGs for Monotone Policy Batch NP. 1050 - Fatemeh Heidari Soureshjani, Mathias Hall-Andersen, MohammadMahdi Jahanara, Jeffrey Kam, Jan Gorzny, Mohsen Ahmadvand:
Automated Analysis of Halo2 Circuits. 1051 - Muhammad Imran:
A quantum algorithm for semidirect discrete logarithm problem on elliptic curves. 1052 - Alexander Bienstock, Paul Rösler, Yi Tang:
ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet. 1053 - Minki Hhan, Takashi Yamakawa, Aaram Yun:
Quantum Complexity for Discrete Logarithms and Related Problems. 1054 - Trevor Yap, Shivam Bhasin, Stjepan Picek:
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion. 1055 - Kwan Yin Chan, Handong Cui, Tsz Hon Yuen:
DIDO: Data Provenance from Restricted TLS 1.3 Websites. 1056 - Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy:
ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for ℤ2k. 1057 - Brent Waters, Daniel Wichs:
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM. 1058 - Xiangyu Su, Mario Larangeira, Keisuke Tanaka:
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning. 1059 - Pengfei Wang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka:
Auditable Attribute-Based Credentials Scheme and Its Applications in Contact Tracing. 1060 - Alireza Kavousi, Duc Viet Le, Philipp Jovanovic, George Danezis:
BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation. 1061 - Gal Arnon, Alessandro Chiesa, Eylon Yogev:
IOPs with Inverse Polynomial Soundness Error. 1062 - Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell:
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More. 1063 - Ernesto Dominguez Fiallo, Pablo Freyre Arrozarena, Luis Ramiro Piñeiro:
Decoding Quasi-Cyclic codes is NP-complete. 1064 - Zhengjun Cao, Lihua Liu:
A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment". 1065 - Jieyi Long:
Efficient Arguments and Proofs for Batch Arithmetic Circuit Satisfiability. 1066 - Markulf Kohlweiss, Mahak Pancholi, Akira Takahashi:
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach. 1067 - Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. 1068 - Nadim Kobeissi:
DuckyZip: Provably Honest Global Linking Service. 1069 - Christian Badertscher, Mahdi Sedaghat, Hendrik Waldner:
Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. 1070 - Alexander R. Block, Albert Garreta, Jonathan Katz, Justin Thaler, Pratyush Ranjan Tiwari, Michal Zajac:
Fiat-Shamir Security of FRI and Related SNARKs. 1071 - Muhammad Haris Mughees, Ling Ren:
Simple and Practical Single-Server Sublinear Private Information Retrieval. 1072 - Shah Fahd, Mehreen Afzal, Waseem Iqbal, Dawood Shah, Ijaz Khalid:
The Reality of Backdoored S-Boxes - An Eye Opener. 1073 - Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal:
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium. 1074 - Liliya R. Akhmetzyanova, Alexandra Babueva, Andrey Bozhko:
Streebog as a Random Oracle. 1075 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Threshold BBS+ From Pseudorandom Correlations. 1076 - Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov:
Taming Adaptivity in YOSO Protocols: The Modular Way. 1077 - Vincent Giraud, David Naccache:
Bypassing Android isolation with fuel gauges: new risks with advanced power ICs. 1078 - Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner:
Foundations of Data Availability Sampling. 1079 - Roy S. Wikramaratna:
ACORN-QRE: Specification and Analysis of a Method of Generating Secure One-time Pads for Use in Encryption. 1080 - Lilya Budaghyan, Mohit Pal:
ARITHMETIZATION-ORIENTED APN FUNCTIONS. 1081 - Erik Rybakken, Leona Hioki, Mario Yaksetig:
Intmax2: A ZK-rollup with Minimal Onchain Data and Computation Costs Featuring Decentralized Aggregators. 1082 - Ferdinand Sibleyras, Yosuke Todo:
Keyed Sum of Permutations: a simpler RP-based PRF. 1083 - Yanning Ji, Elena Dubrova:
A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber. 1084 - Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng:
Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency. 1085 - Yanyi Liu, Rafael Pass:
On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity. 1086 - Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Moving a Step of ChaCha in Syncopated Rhythm. 1087 - Riddhi Ghosal, Amit Sahai:
Building Hard Problems by Combining Easy Ones. 1088 - Shichen Wu, Puwen Wei, Ren Zhang, Bowen Jiang:
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols. 1089 - Michael Brand, Benoît Poletti:
Bulletproofs With Stochastic Equation Sets. 1090 - Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach:
On Derandomizing Yao's Weak-to-Strong OWF Construction. 1091 - Tomoki Moriya:
Adaptive attack for a possible PKE scheme using FESTA trapdoor functions in the wrong way. 1092 - Alessandro Budroni, Jesús-Javier Chi-Domínguez, Mukul Kulkarni:
Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms. 1093 - Jonathan Katz:
Round Optimal Robust Distributed Key Generation. 1094 - Xiaoyang Dong, Shun Li, Phuong Pham:
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More. 1095 - Hatice Kübra Güner, Ceyda Mangir, Oguz Yayla:
White-Box Block Cipher Implementation Based on LS-Design. 1096 - Mark Zhandry:
Quantum Money from Abelian Group Actions. 1097 - Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi:
sfAsterisk: Super-fast MPC with a Friend. 1098 - Jean-Luc Beuchat, Valon Rexhepi:
A Digital Identity in the Hands of Swiss Citizens. 1099 - Marina Krcek, Lichao Wu, Guilherme Perin, Stjepan Picek:
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis. 1100 - Agnese Gini, Pierrick Méaux:
S0-equivalent classes, a new direction to find better weightwise perfectly balanced functions, and more. 1101 - Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. 1102 - Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen:
Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast. 1103 - Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir:
An Efficient Unicode encoded in UTF-16 text cryptography based on the AES algorithm. 1104 - Tung Le, Thang Hoang:
MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust. 1105 - Liam Eagen, Ariel Gabizon:
ProtoGalaxy: Efficient ProtoStar-style folding of multiple instances. 1106 - Duygu Ozden, Oguz Yayla:
Verifiable Timed Proxy Signatures and Multi-signatures. 1107 - Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin:
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis. 1108 - Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation. 1109 - Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis. 1110 - Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Optimized stream-cipher-based transciphering by means of functional-bootstrapping. 1111 - Robert Muth, Florian Tschorsch:
Tornado Vote: Anonymous Blockchain-Based Voting. 1112 - Thomas Kaeding:
Breaking the Hutton 2 challenge. 1113 - Cezary Pilaszewicz, Marian Margraf:
On iterated punctured Grover. 1114 - Yibin Yang, David Heath:
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM. 1115 - Yonatan Zilpa:
Applying system of equations to factor semiprime numbers. 1116 - Markku-Juhani O. Saarinen, Mélissa Rossi:
Mask Compression: High-Order Masking on Memory-Constrained Devices. 1117 - Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht:
Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System. 1118 - Keita Emura, Kaisei Kajita, Go Ohtake:
Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts. 1119 - Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia:
TVA: A multi-party computation system for secure and expressive time series analytics. 1120 - Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic:
SoK: Public Randomness. 1121 - Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren:
Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption. 1122 - Benedikt Auerbach, Miguel Cueto Noval, Guillermo Pascual-Perez, Krzysztof Pietrzak:
On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key Agreement. 1123 - Robert Christian Subroto:
An Algebraic Approach to Circulant Column Parity Mixers. 1124 - Léo Ducas, Thomas Espitau, Eamonn W. Postlethwaite:
Finding short integer solutions when the modulus is small. 1125 - Navid Alamati, Varun Maram, Daniel Masny:
Non-Observable Quantum Random Oracle Model. 1126 - Cayle Sharrock, Schalk van Heerden:
TariScript: Bringing dynamic scripting to Mimblewimble. 1127 - Furkan Aydin, Aydin Aysu:
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks. 1128 - Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. 1129 - Ittai Abraham, Gilad Asharov, Arpita Patra, Gilad Stern:
Perfectly Secure Asynchronous Agreement on a Core Set in Constant Expected Time. 1130 - Pierre Pébereau:
One vector to rule them all: Key recovery from one vector in UOV schemes. 1131 - Ali Rezapour, Zahra Ahmadian:
Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme. 1132 - Fukang Liu, Mohammad Mahzoun:
Algebraic Attacks on RAIN and AIM Using Equivalent Representations. 1133 - Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert:
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue. 1134 - Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert:
HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO. 1135 - Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Secure Multiparty Computation with Identifiable Abort from Vindicating Release. 1136 - Yao Sun, Shuai Chang:
A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic. 1137 - Rui Gao:
Invisible Warning Line: Efï¬cient and Generic Regulation for Anonymous Cryptocurrencies. 1138 - Yuval Gelles, Ilan Komargodski:
Optimal Load-Balanced Scalable Distributed Agreement. 1139 - Harashta Tatimma Larasati, Howon Kim:
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves. 1140 - David Knichel, Amir Moradi:
Composable Gadgets with Reused Fresh Masks - First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks. 1141 - Keita Xagawa:
On the Efficiency of Generic, Quantum Cryptographic Constructions. 1142 - Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker:
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler. 1143 - Saba Eskandarian:
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing. 1144 - Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer:
New Random Oracle Instantiations from Extremely Lossy Functions. 1145 - Ruth Ng, Alexander Hoover, David Cash, Eileen Ee:
Structured Encryption for Indirect Addressing. 1146 - Xiaoyang Hou, Jian Liu, Jingyu Li, Yuhan Li, Wen-jie Lu, Cheng Hong, Kui Ren:
CipherGPT: Secure Two-Party GPT Inference. 1147 - Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik:
Post Quantum Fuzzy Stealth Signatures and Applications. 1148 - Siwoo Eum, Hyunjun Kim, Minho Song, Hwajeong Seo:
Analysis of Parallel Implementation of Pilsung Block Cipher On Graphics Processing Unit. 1149 - Gyeongju Song, Siwoo Eum, Hyeokdong Kwon, Minjoo Sim, Minwoo Lee, Hwajeong Seo:
Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2. 1150 - Minwoo Lee, Kyungbae Jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Hwajeong Seo:
High-speed Implementation of AIM symmetric primitives within AIMer digital signature. 1151 - Maya Dotan, Ayelet Lotem, Margarita Vald:
Haze: A Compliant Privacy Mixer. 1152 - Vikas Srivastava, Sumit Kumar Debnath:
A Multivariate Based Provably Secure Certificateless Signature Scheme with Applications to the Internet of Medical Things. 1153 - Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar:
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application. 1154 - Mounika Pratapa, Aleksander Essex:
Secure Function Extensions to Additively Homomorphic Cryptosystems. 1155 - Xiang Fu:
Instant Zero Knowledge Proof of Reserve. 1156 - Melanie Jauch, Varun Maram:
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery. 1157 - Amos Beimel, Oriol Farràs, Or Lasri:
Improved Polynomial Secret-Sharing Schemes. 1158 - Huan Zou, Yuting Xiao, Rui Zhang:
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction. 1159 - Yan Yan, Arnab Roy, Elisabeth Oswald:
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test. 1160 - Karim Baghery, Axel Mertens, Mahdi Sedaghat:
Benchmarking the Setup of Updatable zk-SNARKs. 1161 - Masaaki Shirase:
Reduction of Search-LWE Problem to Integer Programming Problem. 1162 - Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo:
Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach. 1163 - Luciano Freitas de Souza, Andrei Tonkikh:
Swiper and Dora: efficient solutions to weighted distributed problems. 1164 - Fabio Banfi, Ueli Maurer, Silvia Ritsch:
On the Security of Universal Re-Encryption. 1165 - Gayathri Garimella, Mike Rosulek, Jaspal Singh:
Malicious Secure, Structure-Aware Private Set Intersection. 1166 - Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura:
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials. 1167 - Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura:
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. 1168 - Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura:
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA. 1169 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar:
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH. 1170 - Hao Lu, Jian Liu, Kui Ren:
Arena: Multi-leader Synchronous Byzantine Fault Tolerance. 1171 - Ittai Abraham, Kartik Nayak, Nibesh Shrestha:
Communication and Round Efficient Parallel Broadcast Protocols. 1172 - Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box MPC in the Plain Model. 1173 - Haochen Sun, Hongyang Zhang:
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training. 1174 - Jens Groth, Victor Shoup:
Fast batched asynchronous distributed key generation. 1175 - Sebastian H. Faller, Astrid Ottenhues, Johannes Ernst:
Composable Oblivious Pseudo-Random Functions via Garbled Circuits. 1176 - Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich:
DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing. 1177 - Leonid Azriel, Avi Mendelson:
Towards Open Scan for the Open-source Hardware. 1178 - Huimin Li, Guilherme Perin:
A Systematic Study of Data Augmentation for Protected AES Implementations. 1179 - Minghui Xu, Yihao Guo, Chun-Chi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng:
Exploring Blockchain Technology through a Modular Lens: A Survey. 1180 - Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Groß:
A Relational Credential System from q-SDH-based Graph Signatures. 1181 - Francesco Berti, Sebastian Faust, Maximilian Orlt:
Long Paper: Provable Secure Parallel Gadgets. 1182 - Aydin Abadi, Dan Ristea, Steven J. Murdoch:
Delegated Time-Lock Puzzle. 1183 - Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, Shivam Bhasin:
STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber. 1184 - Nan Wang, Sid Chi-Kin Chau, Dongxi Liu:
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. 1185 - Kittiphop Phalakarn, Athasit Surarerks:
Faster cellular automata cryptosystems with neighbor sequences. 1186 - Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. 1187 - Joohee Lee, Minju Lee, Jaehui Park:
A Novel CCA Attack for NTRU+ KEM. 1188 - Xiaohan Yue, Xue Bi, Haibo Yang, Shi Bai, Yuan He:
PAP: A Privacy-Preserving Authentication Scheme with Anonymous Payment for V2G Networks. 1189 - Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy:
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption. 1190 - Shweta Agrawal, Junichi Tomida, Anshu Yadav:
Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums. 1191 - Abhiram Kothapalli, Srinath T. V. Setty:
CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves. 1192 - Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir:
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures. 1193 - Xinyi Ji, Jiankuo Dong, Pinchang Zhang, Tonggui Deng, Jiafeng Hua, Fu Xiao:
HI-Kyber: A novel high-performance implementation scheme of Kyber based on GPU. 1194 - Colin O'Flynn:
PicoEMP: A Low-Cost EMFI Platform Compared to BBI and Voltage Fault Injection using TDC and External VCC Measurements. 1195 - Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren:
A New Paradigm for Verifiable Secret Sharing. 1196 - Thomas Decru, Luciano Maino, Antonio Sanso:
Towards a Quantum-resistant Weak Verifiable Delay Function. 1197 - Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb:
Towards Achieving Provable Side-Channel Security in Practice. 1198 - Ghous Amjad, Kevin Yeo, Moti Yung:
RSA Blind Signatures with Public Metadata. 1199 - Sunyeop Kim, Myoungsu Shin, Seonkyu Kim, Hanbeom Shin, Insung Kim, Donggeun Kwon, Dongjae Lee, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow. 1200 - Hernán Darío Vanegas Madrigal, Daniel Cabarcas Jaramillo, Diego F. Aranha:
Privacy-preserving edit distance computation using secret-sharing two-party computation. 1201 - Karel Burda:
Extension of Shannon's theory of ciphers based on Latin rectangles. 1202 - Ravit Geva, Alexander Gusev, Yuriy Polyakov, Lior Liram, Oded Rosolio, Andreea Alexandru, Nicholas Genise, Marcelo Blatt, Zohar Duchin, Barliz Waissengrin, Dan Mirelman, Felix Bukstein, Deborah T. Blumenthal, Ido Wolf, Sharon Pelles-Avraham, Tali Schaffer, Lee A. Lavi, Daniele Micciancio, Vinod Vaikuntanathan, Ahmad Al Badawi, Shafi Goldwasser:
Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption. 1203 - Daniel Escudero, Serge Fehr:
On Fully-Secure Honest Majority MPC without n2 Round Overhead. 1204 - Tanja Lange, Alex Pellegrini, Alberto Ravagnani:
On the security of REDOG. 1205 - Kwangsu Lee:
Decentralized Threshold Signatures for Blockchains with Non-Interactive and Transparent Setup. 1206 - Ding Feng, Rupert Hitsch, Kaihua Qin, Arthur Gervais, Roger Wattenhofer, Yaxing Yao, Ye Wang:
DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions. 1207 - Alan Szepieniec, Thorkil Værge:
Mutator Sets and their Application to Scalable Privacy. 1208 - Xiaoni Du, René Rodríguez, Hao Wu:
Infinite families of minimal binary codes via Krawtchouk polynomials. 1209 - Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang:
Decentralized Finance (DeFi): A Survey. 1210 - Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse:
Optimal Flexible Consensus and its Application to Ethereum. 1211 - Mustafa Khairallah:
CLRW13 is not Secure Beyond the Birthday Bound: Breaking TNT with O(2n/2) queries. 1212 - Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. 1213 - Marc Fischlin, Felix Günther:
Verifiable Verification in Cryptographic Protocols. 1214 - Ripon Patgiri, Dolendro Singh Laiphrakpam:
Authentica: A Secure Authentication Mechanism using a Software-defined Unclonable Function. 1215 - Srinath T. V. Setty, Justin Thaler, Riad S. Wahby:
Unlocking the lookup singularity with Lasso. 1216 - Arasu Arun, Srinath T. V. Setty, Justin Thaler:
Jolt: SNARKs for Virtual Machines via Lookups. 1217 - Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic:
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery. 1218 - Marcel Keller, Ke Sun:
A Note on "Secure Quantized Training for Deep Learning". 1219 - Pierre-Augustin Berthet, Cédric Tavernier, Jean-Luc Danger, Laurent Sauvage:
Quasi-linear Masking to Protect Kyber against both SCA and FIA. 1220 - Mario Mastriani:
Non-distributable key-sharing protocol with particular emphasis on the Internet of Things. 1221 - Zhipeng Wang, Marko Cirkovic, Duc Viet Le, William J. Knottenbelt, Christian Cachin:
Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers. 1222 - Johannes Mono, Kamil Kluczniak, Tim Güneysu:
Improved Circuit Synthesis with Amortized Bootstrapping for FHEW-like Schemes. 1223 - Kirill V. Vedenev, Yury V. Kosolapov:
Theoretical analysis of decoding failure rate of non-binary QC-MDPC codes. 1224 - Yuval Ishai, Mahimna Kelkar, Varun Narayanan, Liav Zafar:
One-Message Secure Reductions: On the Cost of Converting Correlations. 1225 - Huayi Qi, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng:
SoK: Privacy-Preserving Smart Contract. 1226 - Kosei Sakamoto, Ryoma Ito, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. 1227 - Elizabeth C. Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu:
Snowblind: A Threshold Blind Signature in Pairing-Free Groups. 1228 - Francesco Sica:
Two Remarks on Torsion-Point Attacks in Isogeny-Based Cryptography. 1229 - Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model. 1230 - Fangan-Yssouf Dosso, Alexandre Berzati, Nadia El Mrabet, Julien Proy:
PMNS revisited for consistent redundancy and equality test. 1231 - Tarek Galal, Anja Lehmann:
Privacy-Preserving Outsourced Certificate Validation. 1232 - Ashwin Jha, Mridul Nandi, Abishanka Saha:
Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack. 1233 - Nikolaos Makriyannis, Oren Yomtov:
Practical Key-Extraction Attacks in Leading MPC Wallets. 1234 - Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. 1235 - Sajin Sasy, Aaron Johnson, Ian Goldberg:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. 1236 - Hao Lei, Jiahui He, Kai Hu, Meiqin Wang:
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities. 1237 - Andreas Wiemers, Stephan Ehlen:
A remark on the Independence Heuristic in the Dual Attack. 1238 - Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin:
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist. 1239 - Sriram Sridhar, Yinuo Zhang:
Improved SNARK Frontend for Highly Repetitive Computations. 1240 - Dan Boneh, Aditi Partap, Lior Rotem:
Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments. 1241 - Nilanjan Datta, Shreya Dey, Avijit Dutta, Sougata Mandal:
Cascading Four Round LRW1 is Beyond Birthday Bound Secure. 1242 - Cas Cremers, Eyal Ronen, Mang Zhao:
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements. 1243 - Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, Damien Stehlé:
HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering. 1244 - Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. 1245 - Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao:
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security. 1246 - Giuseppe D'Alconzo, Antonio J. Di Scala:
Representations of Group Actions and their Applications in Cryptography. 1247 - Zhengjun Cao, Lihua Liu:
A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation". 1248 - Kyosuke Yamashita, Keisuke Hara:
On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes. 1249 - Bharath Namboothiry:
Revealable Functional Commitments: How to Partially Reveal a Secret Function. 1250 - Antonin Leroux:
Verifiable random function from the Deuring correspondence and higher dimensional isogenies. 1251 - Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. 1252 - Aggelos Kiayias, Nikos Leonardos, Yu Shen:
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions. 1253 - Matthias Geihs, Hart Montgomery:
A Low-Round Distributed PRF from Lattices and its Application to Distributed Key Management. 1254 - Alexander R. Block, Albert Garreta, Pratyush Ranjan Tiwari, Michal Zajac:
On Soundness Notions for Interactive Oracle Proofs. 1256 - Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam:
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK. 1257 - Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, Ke Yi:
Efficient Oblivious Sorting and Shuffling for Hardware Enclaves. 1258 - Michael Brand, Tania Churchill, Carsten Friedrich:
Nonlinear computations on FinTracer tags. 1259 - Hongda Li, Peifang Ni, Yao Zan:
Public-Key Encryption from Average Hard NP Language. 1260 - Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi:
Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing. 1261 - David Chaum, Bernardo Cardoso, William Carter, Mario Yaksetig, Baltasar Aroso:
Phoenixx: Linear consensus with random sampling. 1262 - Johanna Loyer:
Quantum security analysis of Wave. 1263 - Steve Thakur:
An optimization of the addition gate count in Plonkish circuits. 1264 - Noam Mazor:
Key-Agreement with Perfect Completeness from Random Oracles. 1265 - Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach. 1266 - Florian Hirner, Michael Streibl, Ahmet Can Mert, Sujoy Sinha Roy:
A Hardware Implementation of MAYO Signature Scheme. 1267 - Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski:
Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders. 1268 - Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma:
SIGMA: Secure GPT Inference with Function Secret Sharing. 1269 - Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. 1270 - Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, Yupeng Zhang:
Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs. 1271 - Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha:
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. 1272 - Peter Gazi, Aggelos Kiayias, Alexander Russell:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. 1273 - Antonio de la Piedra, Marloes Venema, Greg Alpár:
ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra. 1274 - Jacqueline Brendel, Sebastian Clermont, Marc Fischlin:
Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery. 1275 - Hanwen Feng, Qiang Tang:
Witness Authenticating NIZKs and Applications. 1276 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption. 1277 - Alessandro Coglio, Eric McCarthy, Eric Smith, Collin Chin, Pranav Gaddamadugu, Michel Dellepere:
Compositional Formal Verification of Zero-Knowledge Circuits. 1278 - Jun Yan:
General Non-interactive Quantum Commitments Are Compatible with Quantum Rewinding. 1279 - Shuping Mao, Zhiyu Zhang, Lei Hu, Luying Li, Peng Wang:
Quantum Security of TNT. 1280 - Christoffer Raun, Benjamin Estermann, Liyi Zhou, Kaihua Qin, Roger Wattenhofer, Arthur Gervais, Ye Wang:
Leveraging Machine Learning for Bidding Strategies in Miner Extractable Value (MEV) Auctions. 1281 - Zibo Zhou, Zongyang Zhang, Jin Dong:
Proof-Carrying Data from Multi-folding Schemes. 1282 - Augustin Bariant:
Algebraic Cryptanalysis of Full Ciminion. 1283 - Shahar Papini, Ulrich Haböck:
Improving logarithmic derivative lookups using GKR. 1284 - Sujaya Maiyya, Sharath Chandra Vemula, Divyakant Agrawal, Amr El Abbadi, Florian Kerschbaum:
Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns. 1285 - Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. 1286 - Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, Lucie Johanna Kogelheide:
Generic Accelerators for Costly-to-Mask PQC Components. 1287 - Nicolas Gama, Anand Kumar Narayanan, Ryder LiuLin, Dongze Yue:
An erf Analog for Discrete Gaussian Sampling. 1288 - Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, Ralf Küsters:
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations. 1289 - Ayan Sajwan, Girish Mishra:
Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher. 1290 - Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited. 1291 - Payal, Pooja, Girish Mishra:
Enhancing Data Security: A Study of Grain Cipher Encryption using Deep Learning Techniques. 1292 - María Isabel González Vasco, Delaram Kahrobaei, Eilidh McKemmie:
Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era. 1293 - Gowri R. Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh:
PrivMail: A Privacy-Preserving Framework for Secure Emails. 1294 - Yuqing Zhao, Chun Guo, Weijia Wang:
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. 1295 - Zhengjun Cao, Lihua Liu:
A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid". 1296 - Daniel Nager:
Entropic Quasigroup Based Secret Agreement Using Large Order Automorphisms. 1297 - Jiang Zhang, Dengguo Feng, Di Yan:
NEV: Faster and Smaller NTRU Encryption using Vector Decoding. 1298 - Maher Boudabra, Abderrahmane Nitaj:
A New RSA Variant Based on Elliptic Curves. 1299 - Martin R. Albrecht, Benjamin Dowling, Daniel Jones:
Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core. 1300 - Joachim Neu, Ertem Nusret Tas, David Tse:
Accountable Safety Implies Finality. 1301 - Ling Song, Qianqian Yang, Huimin Liu:
Revisiting the Differential Meet-In-The-Middle Cryptanalysis. 1302 - Vitaly Kiryukhin:
On security aspects of CRISP. 1303 - Hiroki Okada, Rachel Player, Simon Pohmann:
Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping. 1304 - Vitaly Kiryukhin:
About "k-bit security" of MACs based on hash function Streebog. 1305 - Xavier Bonnetain, André Schrottenloher:
Single-query Quantum Hidden Shift Attacks. 1306 - Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa:
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. 1307 - Chris Orsini, Alessandra Scafuro, Tanner Verber:
How to Recover a Cryptographic Secret From the Cloud. 1308 - Anes Abdennebi, Erkay Savas:
A Lattice-based Publish-Subscribe Communication Protocol using Accelerated Homomorphic Encryption Primitives. 1309 - Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. 1310 - Debajyoti Das, Claudia Díaz, Aggelos Kiayias, Thomas Zacharias:
Are continuous stop-and-go mixnets provably secure? 1311 - Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. 1312 - Sietse Ringers:
Hashing into quadratic residues modulo a safe prime composite. 1313 - Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes:
Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24. 1314 - Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind:
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures. 1315 - Erica Blum, Elette Boyle, Ran Cohen, Chen-Da Liu-Zhang:
Communication Lower Bounds for Cryptographic Broadcast Protocols. 1316 - Ya-Nan Li, Tian Qiu, Qiang Tang:
Pisces: Private and Compliable Cryptocurrency Exchange. 1317 - Kamil Doruk Gür, Jonathan Katz, Tjerand Silde:
Two-Round Threshold Lattice Signatures from Threshold Homomorphic Encryption. 1318 - Kyosuke Yamashita, Keisuke Hara:
On the Black-Box Separation Between Ring Signatures and Public Key Encryptions. 1319 - Michael Brand, Gaëtan Pradel:
Practical Privacy-Preserving Machine Learning using Fully Homomorphic Encryption. 1320 - Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes. 1321 - Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, Vitor Pereira:
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge. 1322 - Thomas Chamelot, Damien Couroussé, Karine Heydemann:
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks. 1323 - Yunxiao Zhou, Shengli Liu, Shuai Han, Haibin Zhang:
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE. 1324 - Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele:
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. 1325 - Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu:
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. 1326 - Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. 1327 - Intak Hwang, Jinyeong Seo, Yongsoo Song:
Optimizing HE operations via Level-aware Key-switching Framework. 1328 - Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele:
Layered Symbolic Security Analysis in DY$^\star$. 1329 - Mengce Zheng:
Notes on Small Private Key Attacks on Common Prime RSA. 1330 - Ishtiyaque Ahmad, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
Pantheon: Private Retrieval from Public Key-Value Store. 1331 - Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, Abhishek Jain:
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem. 1332 - Shashi Kant Pandey:
Neutrosophic Boolean Function and Rejection Sampling in Post Quantum Cryptography. 1333 - Jiaxin Pan, Runzhi Zeng:
A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange. 1334 - Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, Alexandre Wallet:
Antrag: Annular NTRU Trapdoor Generation. 1335 - Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières:
Riggs: Decentralized Sealed-Bid Auctions. 1336 - Carlo Brunetta, Hans Heum, Martijn Stam:
SoK: Public Key Encryption with Openings. 1337 - Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. 1338 - Aniket Kate, Easwar Vivek Mangipudi, Siva Maradana, Pratyay Mukherjee:
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains. 1339 - Sila Özeren, Oguz Yayla:
Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks. 1340 - Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. 1341 - David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente:
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. 1342 - Valerie Fetzer, Michael Klooß, Jörn Müller-Quade, Markus Raiber, Andy Rupp:
Universally Composable Auditable Surveillance. 1343 - Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, Tal Rabin:
Analyzing the Real-World Security of the Algorand Blockchain. 1344 - Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, Mingyuan Wang:
Experimenting with Zero-Knowledge Proofs of Training. 1345 - Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, Giovanni Vigna:
Street Rep: A Privacy-Preserving Reputation Aggregation System. 1346 - Aydin Abadi, Steven J. Murdoch:
Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation. 1347 - Renas Bacho, Julian Loss:
Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons. 1348 - Mi-Ying (Miryam) Huang, Xinyu Mao, Guangxu Yang, Jiapeng Zhang:
Communication Lower Bounds of Key-Agreement Protocols via Density Increment Arguments. 1349 - Atsuki Momose, Sourav Das, Ling Ren:
On the Security of KZG Commitment for VSS. 1350 - Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu:
Bicameral and Auditably Private Signatures. 1351 - Emanuele Bellini, Juan Grados, Mohamed Rachidi, Nitin Satpute, Joan Daemen, Solane El Hirch:
ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations for High-Order avalanche Tests. 1352 - Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. 1353 - Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Privacy Preserving Feature Selection for Sparse Linear Regression. 1354 - Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong:
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations. 1355 - George Teseleanu, Paul Cotan:
Small Private Key Attack Against a Family of RSA-like Cryptosystems. 1356 - Koustabh Ghosh, Parisa Amiri-Eliasi, Joan Daemen:
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication. 1357 - Weijie Wang, Yujie Lu, Charalampos Papamanthou, Fan Zhang:
The Locality of Memory Checking. 1358 - Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. 1359 - Gijs van Dam:
Payment Splitting in Lightning Network as a Mitigation Against Balance Discovery Attacks. 1360 - Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel:
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. 1361 - David Fifield:
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols. 1362 - Fuchun Lin, Chaoping Xing, Yizhou Yao, Chen Yuan:
Amortized NISC over ℤ2k from RMFE. 1363 - Andrei Constantinescu, Diana Ghinea, Roger Wattenhofer, Floris Westermann:
Meeting in a Convex World: Convex Consensus with Asynchronous Fallback. 1364 - Nico Döttling, Tamer Mour:
On The Black-Box Complexity of Correlation Intractability. 1365 - Sam A. Markelon, Mia Filic, Thomas Shrimpton:
Compact Frequency Estimators in Adversarial Environments. 1366 - Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Practical Constructions for Single Input Functionality against a Dishonest Majority. 1367 - Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch, Alexander Wiesmaier:
Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model. 1368 - Hongqing Liu, Chaoping Xing, Yanjiang Yang, Chen Yuan:
Ramp hyper-invertible matrices and their applications to MPC protocols. 1369 - Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, Benjamin Wesolowski:
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals. 1370 - Minki Hhan, Aaram Yun:
Oracle Recording for Non-Uniform Random Oracles, and its Applications. 1371 - Gideon Samid:
Cryptographic Key Exchange: An Innovation Outlook. 1372 - Giuseppe Manzoni:
Reframing And Extending The Random Probing Expansion. 1373 - Koji Nuida, Tomoko Adachi:
On Weighted-Sum Orthogonal Latin Squares and Secret Sharing. 1374 - Karim M. Abdellatif, Olivier Hériveaux:
DeepCover DS28C36: A Hardware Vulnerability Identification and Exploitation Using T-Test and Double Laser Fault Injection. 1375 - Nir Bitansky, Tomer Solomon:
Bootstrapping Homomorphic Encryption via Functional Encryption. 1376 - Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, Sebastian Steinhorst:
Janus: Fast Privacy-Preserving Data Provenance For TLS 1.3. 1377 - Benny Applebaum, Oded Nir:
Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography. 1378 - Peter Campbell:
GLEVIAN and VIGORNIAN: Robust beyond-birthday AEAD modes. 1379 - Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Tighter Security for Generic Authenticated Key Exchange in the QROM. 1380 - Jack Doerner, Yashvanth Kondi, Leah Namisa Rosenbloom:
Sometimes You Can't Distribute Random-Oracle-Based Proofs. 1381 - Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos:
HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables. 1382 - Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered ABE via Predicate Encodings. 1383 - Dmitrii I. Koshelev:
Application of Mordell-Weil lattices with large kissing numbers to acceleration of multi-scalar multiplication on elliptic curves. 1384 - David Balbás, Daniel Collins, Phillip Gajland:
WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs. 1385 - Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan:
Improving Privacy of Anonymous Proof-of-Stake Protocols. 1386 - Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu:
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes. 1387 - Min Zhang, Yu Chen, Chuanzhou Yao, Zhichao Wang:
Sigma Protocols from Verifiable Secret Sharing and Their Applications. 1388 - Dario Fiore, Dimitris Kolonelos, Paola de Perthuis:
Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces. 1389 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:
Comparse: Provably Secure Formats for Cryptographic Protocols. 1390 - Zhenzhen Bao, Jinyu Lu, Yiran Yao, Liu Zhang:
More Insight on Deep Learning-aided Cryptanalysis. 1391 - Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. 1392 - Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, Subhashis Banerjee:
OpenVoting: Recoverability from Failures in Dual Voting. 1393 - Omer Paneth, Rafael Pass:
Incrementally Verifiable Computation via Rate-1 Batch Arguments. 1394 - Ronan Lashermes, Hélène Le Bouder:
Generic SCARE: reverse engineering without knowing the algorithm nor the machine. 1395 - David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, Sujoy Sinha Roy:
Parallel Hardware for Isogeny-based VDF: Attacker's Perspective. 1396 - Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui:
Algebraic Attacks on Round-Reduced RAIN and Full AIM-III. 1397 - Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen:
To attest or not to attest, this is the question - Provable attestation in FIDO2. 1398 - Aurel Page, Benjamin Wesolowski:
The supersingular Endomorphism Ring and One Endomorphism problems are equivalent. 1399 - Calvin Abou Haidar, Alain Passelègue, Damien Stehlé:
Efficient Updatable Public-Key Encryption from Lattices. 1400 - Roman Langrehr:
On the Multi-User Security of LWE-based NIKE. 1401 - Sara Logsdon:
Fully Homomorphic Encryption: A Mathematical Introduction. 1402 - Marc Fischlin, Felix Rohrbach:
Searching for ELFs in the Cryptographic Forest. 1403 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Tomás Krnák:
(Verifiable) Delay Functions from Lucas Sequences. 1404 - Valerio Cini, Russell W. F. Lai, Giulio Malavolta:
Lattice-based Succinct Arguments from Vanishing Polynomials. 1405 - George Kadianakis, Mary Maller, Andrija Novakovic:
Sigmabus: Binding Sigmas in Circuits for Fast Curve Operations. 1406 - Jingwei Hu, Junyan Chen, Wangchen Dai, Huaxiong Wang:
Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities. 1407 - Jianhua Wang, Lu Qin, Baofeng Wu:
Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques. 1408 - Jonas Meers, Julian Nowakowski:
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith. 1409 - Ali Sah Özcan, Erkay Savas:
Two Algorithms for Fast GPU Implementation of NTT. 1410 - Xuan-Thanh Do, Dang Truong Mac, Quoc-Huy Vu:
zk-SNARKs from Codes with Rank Metrics. 1411 - Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem. 1412 - Xiang Liu, Ying Gao:
Scalable Multi-party Private Set Union from Multi-Query Secret-Shared Private Membership Test. 1413 - Yi Chen, Zhenzhen Bao, Hongbo Yu:
Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck. 1414 - Jonathan Bootle, Sebastian H. Faller, Julia Hesse, Kristina Hostáková, Johannes Ottenhues:
Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes. 1415 - Helger Lipmaa:
On Black-Box Knowledge-Sound Commit-And-Prove SNARKs. 1416 - Qun Liu, Bart Preneel, Zheng Zhao, Meiqin Wang:
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits. 1417 - Karim Eldafrawy, Nicholas Genise, Stanislaw Jarecki:
Short Concurrent Covert Authenticated Key Exchange (Short cAKE). 1418 - Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, Zhuohui Feng:
Improving the Rectangle Attack on GIFT-64. 1419 - Gil Segev, Amit Sharabi, Eylon Yogev:
Rogue-Instance Security for Batch Knowledge Proofs. 1420 - Long Chen, Hui Guo, Ya-Nan Li, Qiang Tang:
Efficient Secure Storage with Version Control and Key Rotation. 1421 - Nilanjan Datta, Avijit Dutta, Samir Kundu:
Tight Security Bound of 2k-LightMAC Plus. 1422 - Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia:
Quantum Lattice Enumeration in Limited Depth. 1423 - Bala Subramanyan:
PRIVATON - Privacy Preserving Automaton for Proof of Computations. 1424 - Fernando Virdia:
Popping "R-propping": breaking hardness assumptions for matrix groups over F_{2^8}. 1425 - Aysajan Abidin, Erik Pohle, Bart Preneel:
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC. 1426 - Samuel Coulon, Pengzhou He, Tianyou Bao, Jiafeng Xie:
Efficient Hardware RNS Decomposition for Post-Quantum Signature Scheme FALCON. 1427 - Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, Yunlei Zhao:
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption. 1428 - Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. 1429 - Zhengjun Cao, Lihua Liu:
A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor". 1430 - Yaobin Shen, François-Xavier Standaert, Lei Wang:
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. 1431 - Jean Paul Degabriele, Vukasin Karadzic:
Populating the Zoo of Rugged Pseudorandom Permutations. 1432 - Wouter Castryck, Frederik Vercauteren:
A polynomial-time attack on instances of M-SIDH and FESTA. 1433 - Ian McQuoid, Jiayu Xu:
An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions. 1434 - Sohto Chiku, Keitaro Hashimoto, Keisuke Hara, Junji Shikata:
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions. 1435 - Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of Elisabeth-4. 1436 - Yongryeol Choi, MinGi Kim, YoungBeom Kim, Jingyo Song, JaeHwan Jin, HeeSeok Kim, Seog Chung Seo:
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates. 1437 - Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich:
Private Web Search with Tiptoe. 1438 - Alessandro Melloni, Martijn Stam, Øyvind Ytrehus:
Dynamic Security Aspects of Onion Routing. 1439 - Chenglian Liu, Sonia Chien-I Chen:
Comment on Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. 1440 - Hubert Kario:
Out of the Box Testing. 1441 - Hubert Kario:
Everlasting ROBOT: the Marvin Attack. 1442 - Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-Encryption from CPA. 1443 - Akshima, Xiaoqi Duan, Siyao Guo, Qipeng Liu:
On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions. 1444 - Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. 1445 - Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. 1446 - Shuichi Katsumata, Michael Reichle, Yusuke Sakai:
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions. 1447 - Arthur Herlédan Le Merdy, Benjamin Wesolowski:
The supersingular endomorphism ring problem given one endomorphism. 1448 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:
Truncated Differential Attacks: New Insights and 10-round Attacks on QARMA. 1449 - Christopher Leonardi, Maya Gusak:
Post-Quantum Fully Homomorphic Encryption with Group Ring Homomorphisms. 1450 - Noam Mazor, Rafael Pass:
Counting Unpredictable Bits: A Simple PRG from One-way Functions. 1451 - Jules Maire, Damien Vergnaud:
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems. 1452 - Qinggan Fu, Ye Luo, Qianqian Yang, Ling Song:
Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies. 1453 - Mohsen Minaei, Duc Viet Le, Ranjit Kumaresan, Andrew Beams, Pedro Moreno-Sanchez, Yibin Yang, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Mahdi Zamani:
Scalable Off-Chain Auctions. 1454 - Sermin Kocaman, Younes Talibi Alaoui:
Efficient Secure Two Party ECDSA. 1455 - Daniel Smith-Tone:
The Generating Series of Support Minors MinRank Ideals. 1456 - Dennis Dayanikli, Anja Lehmann:
Provable Security Analysis of the Secure Remote Password Protocol. 1457 - Jiaxin Wang, Fang-Wei Fu, Yadi Wei, Jing Yang:
A Further Study of Vectorial Dual-Bent Functions. 1458 - Shahla Atapoor:
Identity-Based Threshold Signatures from Isogenies. 1459 - Charles Meyer-Hilfiger, Jean-Pierre Tillich:
Rigorous Foundations for Dual Attacks in Coding Theory. 1460 - Agostino Capponi, Ruizhe Jia, Ye Wang:
Do Private Transaction Pools Mitigate Frontrunning Risk? 1461 - Rashmi Agrawal, Jung Ho Ahn, Flávio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, Wen Wang:
High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application. 1462 - Hao Lu, Jian Liu, Kui Ren:
Aurora: Leaderless State-Machine Replication with High Throughput. 1463 - Daniele Cozzo, Emanuele Giunta:
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols. 1464 - Dominique Dittert, Thomas Schneider, Amos Treiber:
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search. 1465 - Amit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, Peter Rindal:
On Black-Box Verifiable Outsourcing. 1466 - Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide:
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. 1467 - Kohei Nakagawa, Hiroshi Onuki:
QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras. 1468 - Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen:
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions. 1469 - Cyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, Barry Van Leeuwen:
Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer. 1470 - Cong Ling, Andrew Mendelsohn:
NTRU in Quaternion Algebras of Bounded Discriminant. 1471 - István András Seres, Noemi Glaeser, Joseph Bonneau:
Naysayer proofs. 1472 - Noemi Glaeser, István András Seres, Michael Zhu, Joseph Bonneau:
Cicada: A framework for private non-interactive on-chain auctions and voting. 1473 - Seongkwang Kim, Jincheol Ha, Mincheol Son, ByeongHak Lee:
Mitigation on the AIM Cryptanalysis. 1474 - Jiale Chen, Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography III: digital signatures. 1475 - Shalini Banerjee, Steven D. Galbraith:
Auditable Obfuscation. 1476 - Julien Devevey, Alain Passelègue, Damien Stehlé:
G+G: A Fiat-Shamir Lattice Signature Based on Convolved Gaussians. 1477 - Alex Evans, Guillermo Angeris:
Succinct Proofs and Linear Algebra. 1478 - Keigo Yamashita, Kenji Yasunaga:
Rational Broadcast Protocols against Timid Adversaries. 1479 - Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp:
The Pre-Shared Key Modes of HPKE. 1480 - Daniel Smith-Tone:
A Total Break of the Scrap Digital Signature Scheme. 1481 - Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu:
Twinkle: Threshold Signatures from DDH with Full Adaptive Security. 1482 - Willy Quach, LaKyah Tyner, Daniel Wichs:
Lower Bounds on Anonymous Whistleblowing. 1483 - Paulo S. L. M. Barreto, Devin D. Reich, Marcos A. Simplício Jr., Gustavo H. M. Zanon:
Blind signatures from Zero knowledge in the Kummer variety. 1484 - Houda Ferradi, Antoine Houssais, David Naccache:
How to Physically Hold Your Bitcoins ? 1485 - Oleg Khovayko, Dmitry Schelkunov:
RC4OK. An improvement of the RC4 stream cipher. 1486 - Chenglian Liu, Sonia Chien-I Chen:
A Novel Mathematical Formal Proof in Unreliability Protocol with XOR in Two's Complement System. 1487 - Mingjie Chen, Antonin Leroux:
SCALLOP-HD: group action from 2-dimensional isogenies. 1488 - Chon Kit Lao, Rui Jiang, Luyao Zhang, Fan Zhang, Ye Wang:
To Broadcast or Not to Broadcast: Decision-Making Strategies for Mining Empty Blocks. 1489 - Jiayu Zhang:
Revisiting Remote State Preparation with Verifiability: A New Set of Notions with Well-behaved Properties. 1490 - Pascal Bemmann, Sebastian Berndt, Rongmao Chen:
Subversion-Resilient Signatures without Random Oracles. 1491 - Jiayu Zhang:
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives. 1492 - Simon Brown:
Measuring the Concentration of Control in Contemporary Ethereum. 1493 - Joan Daemen, Silvia Mella, Gilles Van Assche:
Committing authenticated encryption based on SHAKE. 1494 - Takanori Isobe, Mostafizar Rahman:
Key Committing Security Analysis of AEGIS. 1495 - Wang Mong Tikvah Chan:
A Privacy-preserving Central Bank Ledger for Central Bank Digital Currency. 1496 - Zhengjun Cao, Lihua Liu:
A note on "authenticated key agreement protocols for dew-assisted IoT systems". 1497 - Yilei Chen, Zihan Hu, Qipeng Liu, Han Luo, Yaxin Tu:
On the Hardness of $\sf{S|LWE\rangle}$ with Gaussian and Other Amplitudes. 1498 - David Pointcheval:
Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership. 1499 - Susumu Kiyoshima:
Holographic SNARGs for P and Batch-NP from (Polynomially Hard) Learning with Errors. 1500 - Seyoon Ragavan, Vinod Vaikuntanathan:
Optimizing Space in Regev's Factoring Algorithm. 1501 - Michal Wronski, Elzbieta Burek, Mateusz Lesniak:
(In)security of stream ciphers against quantum annealing attacks on the example of the Grain 128 and Grain 128a ciphers. 1502 - Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, Michele Orrù:
zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs. 1503 - Helger Lipmaa, Roberto Parisella, Janno Siim:
Algebraic Group Model with Oblivious Sampling. 1504 - Konstantina Miteloudi, Joppe W. Bos, Olivier Bronchain, Björn Fay, Joost Renes:
PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber. 1505 - Tomoki Moriya:
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram. 1506 - Ran Cohen, Julian Loss, Tal Moran:
Efficient Agreement Over Byzantine Gossip. 1507 - Amaury Pouly, Yixin Shen:
Provable Dual Attacks on Learning with Errors. 1508 - Neyire Deniz Sarier:
Efficient and Usable Coercion-Resistant E-Voting on the Blockchain. 1509 - Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert:
Towards Practical Doubly-Efficient Private Information Retrieval. 1510 - Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates. 1511 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner:
List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing. 1512 - Marcel Tiepelt, Edward Eaton, Douglas Stebila:
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements. 1513 - José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh:
Leakage-Free Probabilistic Jasmin Programs. 1514 - Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno:
OPTIKS: An Optimized Key Transparency System. 1515 - Jacob D. Leshno, Rafael Pass, Elaine Shi:
Can open decentralized ledgers be economically secure? 1516 - Siemen Dhooghe, Artemii Ovchinnikov:
Threshold Implementations with Non-Uniform Inputs. 1517 - Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, Helger Lipmaa:
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. 1518 - Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qin Wang, Mark Ryan:
Accountable Decryption made Formal and Practical. 1519 - Charlotte Lefevre, Yanis Belkheyar, Joan Daemen:
Kirby: A Robust Permutation-Based PRF Construction. 1520 - Dragan Lambic:
A reduced set of submatrices for a faster evaluation of the MDS property of a circulant matrix with entries that are powers of two. 1521 - Shiyu Shen, Hao Yang, Wenqian Li, Yunlei Zhao:
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA. 1522 - Seung Geol Choi, Dana Dachman-Soled, Mingyu Liang, Linsheng Liu, Arkady Yerukhimovich:
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching. 1523 - Sofía Celi, Scott Griffy, Lucjan Hanzlik, Octavio Perez Kempner, Daniel Slamanig:
SoK: Signatures With Randomizable Keys. 1524 - Juliane Krämer, Patrick Struck, Maximiliane Weishäupl:
Committing AE from Sponges: Security Analysis of the NIST LWC Finalists. 1525 - Isaac Andrés Canales Martinez, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. 1526 - Cruz Barnum, David Heath, Vladimir Kolesnikov, Rafail Ostrovsky:
Adaptive Garbled Circuits and Garbled RAM from Non-Programmable Random Oracles. 1527 - Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, Zheli Liu:
Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves. 1528 - Elia Anzuoni, Tommaso Gagliardoni:
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux. 1529 - Leonid Reyzin:
Proofs of Space with Maximal Hardness. 1530 - Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira:
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space. 1531 - Ruta Jawale, Dakshita Khurana:
Unclonable Non-Interactive Zero-Knowledge. 1532 - Tung Chou, Edoardo Persichetti, Paolo Santini:
On Linear Equivalence, Canonical Forms, and Digital Signatures. 1533 - Danilo Francati, Daniele Venturi:
Evolving Secret Sharing Made Short. 1534 - Daniel Smith-Tone:
A Total Break of the 3WISE Digital Signature Scheme. 1535 - Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom:
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information. 1536 - Knud Ahrens, Jens Zumbrägel:
DEFEND: Towards Verifiable Delay Functions from Endomorphism Rings. 1537 - Vipul Goyal, Giulio Malavolta, Justin Raizes:
Unclonable Commitments and Proofs. 1538 - Dimitrios Sikeridis, David Ott, Sean Huntley, Shivali Sharma, Vasantha Kumar Dhanasekar, Megha Bansal, Akhilesh Kumar, Anwitha U. N, Daniel Beveridge, Sairam Veeraswamy:
ELCA: Introducing Enterprise-level Cryptographic Agility for a Post-Quantum Era. 1539 - Zhengjun Cao, Lihua Liu:
A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments". 1540 - Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, Seong Oun Hwang:
TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores. 1541 - Yu Dai, Fangguo Zhang, Chang-An Zhao:
Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees. 1542 - Amit Jana, Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers. 1543 - Jung Hee Cheon, Hyeongmin Choe, Saebyul Jung, Duhyeong Kim, Dah Hoon Lee, Jai Hyun Park:
Arithmetic PCA for Encrypted Data. 1544 - Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider:
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium. 1545 - Sudhanshu Sekhar Tripathy, Bichitrananda Behera:
PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION SYSTEM. 1546 - Alessandro Budroni, Erik Mårtensson:
Further Improvements of the Estimation of Key Enumeration with Applications to Solving LWE. 1547 - Carsten Baum, Nikolas Melissaris, Rahul Rachuri, Peter Scholl:
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. 1548 - Xiao Sui, Sisi Duan:
Signature-Free Atomic Broadcast with Optimal O(n2) Messages and O(1) Expected Time. 1549 - Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi:
A Thorough Evaluation of RAMBAM. 1550 - Vasily Mikhalev, Nils Kopal, Bernhard Esslinger:
Evaluating GPT-4's Proficiency in Addressing Cryptography Examinations. 1551 - Xiuquan Ding, Giulio Malavolta, Tianwei Zhang:
Doubly Efficient Batched Private Information Retrieval. 1552 - Sourav Das, Ling Ren:
Adaptively Secure BLS Threshold Signatures from DDH and co-CDH. 1553 - Miranda Christ, Kevin Choi, Joseph Bonneau:
Cornucopia: Distributed randomness beacons at scale. 1554 - Yuncong Zhang, Shi-Feng Sun, Ren Zhang, Dawu Gu:
Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines. 1555 - Srivatsan Sridhar, Dionysis Zindros, David Tse:
Better Safe than Sorry: Recovering after Adversarial Majority. 1556 - Yanbin Xu, Yonglin Hao, Mingxing Wang:
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1. 1557 - Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar:
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations. 1558 - Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Krijn Reijnders:
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing. 1559 - Samuel D. Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, Léo Robert:
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun. 1560 - Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark M. Tehranipoor, Farimah Farahmandi:
LLM for SoC Security: A Paradigm Shift. 1561 - Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. 1562 - Akira Ito, Rei Ueno, Rikuma Tanaka, Naofumi Homma:
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks. 1563 - Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. 1564 - Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwang-il Bae, Il Kwon Sohn, Hwajeong Seo:
Finding Shortest Vector Using Quantum NV Sieve on Grover. 1565 - Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo:
Optimized Quantum Implementation of SEED. 1566 - Yujin Yang, Kyungbae Jang, Yujin Oh, Hwajeong Seo:
Depth-Optimized Quantum Implementation of ARIA. 1567 - Andre Esser, Paolo Santini:
Not Just Regular Decoding: Asymptotics and Improvements of Regular Syndrome Decoding Attacks. 1568 - Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, Ioanna Karantaidou:
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation. 1569 - Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner:
Jackpot: Non-Interactive Aggregatable Lotteries. 1570 - Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. 1571 - Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, Emanuele Strieder:
Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures. 1572 - Thibauld Feneuil, Matthieu Rivain:
Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments. 1573 - Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. 1574 - Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, Mainack Mondal:
SoK: Web3 Recovery Mechanisms. 1575 - Bruno Sterner:
Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and its Isogeny-based Applications. 1576 - Léo Ducas, Andre Esser, Simona Etinski, Elena Kirshanova:
Asymptotics and Improvements of Sieving for Codes. 1577 - Zeyuan Yin, Bingsheng Zhang, Andrii Nastenko, Roman Oliynykov, Kui Ren:
A Scalable Coercion-resistant Blockchain Decision-making Scheme. 1578 - Tianyu Zheng, Shang Gao, Yu Guo, Bin Xiao:
KiloNova: Non-Uniform PCD with Zero-Knowledge Property from Generic Folding Schemes. 1579 - Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang:
Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime. 1580 - Chris Brzuska, Christoph Egger, Kirthivaasan Puniamurthy:
CryptoZoo: A Viewer for Reduction Proofs. 1581 - Jesko Dujmovic, Rachit Garg, Giulio Malavolta:
Time-Lock Puzzles with Efficient Batch Solving. 1582 - Rachit Garg, George Lu, Brent Waters, David J. Wu:
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. 1583 - Hanjun Li, Tianren Liu:
How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations. 1584 - Yuzhe Zhang, Qin Wang, Shiping Chen, Chen Wang:
How to Rationally Select Your Delegatee in PoS. 1585 - Ittai Abraham, Naama Ben-David, Gilad Stern, Sravya Yandamuri:
On the Round Complexity of Asynchronous Crusader Agreement. 1586 - Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova:
A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber. 1587 - Khue Do, Lucjan Hanzlik, Eugenio Paracucchi:
M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition. 1588 - Nicolas Bon, David Pointcheval, Matthieu Rivain:
Optimized Homomorphic Evaluation of Boolean Functions. 1589 - Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau:
Single trace HQC shared key recovery with SASCA. 1590 - Yanyi Liu, Rafael Pass:
One-way Functions and Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions. 1591 - Zhengjun Cao, Lihua Liu:
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement. 1592 - Quang Dao, Yuval Ishai, Aayush Jain, Huijia Lin:
Multi-Party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN. 1593 - Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao:
Secure Noise Sampling for DP in MPC with Finite Precision. 1594 - Sofía Celi, Shai Levin, Joe Rowell:
CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness. 1595 - Raja Adhithan RadhaKrishnan:
A Black Box Attack Using Side Channel Analysis and Hardware Trojans. 1596 - Anamaria Costache, Lea Nürnberger, Tjerand Silde:
Computational FHE Circuit Privacy for Free. 1597 - Léo Weissbart, Stjepan Picek:
Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller. 1598 - Thomas Lavaur, Jérôme Lacan:
Boomy: Batch Opening Of Multivariate polYnomial commitment. 1599 - Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, Rishub Nagpal:
Compress: Reducing Area and Latency of Masked Pipelined Circuits. 1600 - Balthazar Bauer, Pooya Farshim, Patrick Harasser, Markulf Kohlweiss:
The Uber-Knowledge Assumption: A Bridge to the AGM. 1601 - Alex Lombardi, Fermi Ma, John Wright:
A one-query lower bound for unitary synthesis and breaking quantum cryptography. 1602 - Shuichi Katsumata, Yi-Fu Lai, Michael Reichle:
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures. 1603 - Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, Fei Yan:
Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations. 1604 - Bar Alon, Amos Beimel, Eran Omri:
Three Party Secure Computation with Friends and Foes. 1605 - Intak Hwang, Jinyeong Seo, Yongsoo Song:
Efficient Lattice-based Sublinear Arguments for R1CS without Aborts. 1606 - Yinghao Wang, Jiawen Zhang, Jian Liu, Xiaohu Yang:
Crust: Verifiable And Efficient Private Information Retrieval with Sublinear Online Time. 1607 - Bar Alon, Eran Omri, Muthuramakrishnan Venkitasubramaniam:
Can Alice and Bob Guarantee Output to Carol? 1608 - Sanjam Garg, Aarushi Goel, Mingyuan Wang:
How to Prove Statements Obliviously? 1609 - Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu:
An Efficient ZK Compiler from SIMD Circuits to General Circuits. 1610 - Lev Soukhanov:
Power circuits: a new arithmetization for GKR-styled sumcheck. 1611 - Amirhossein Khajehpour, Hanzaleh Akbarinodehi, Mohammad Jahanara, Chen Feng:
Mitigating MEV via Multiparty Delay Encryption. 1612 - Jiaxin Pan, Benedikt Wagner:
Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures. 1613 - Cyprien Delpech de Saint Guilhem, Robi Pedersen:
New proof systems and an OPRF from CSIDH. 1614 - Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. 1615 - Johannes Mueller, Balazs Pejo, Ivan Pryvalov:
DeVoS: Deniable Yet Verifiable Vote Updating. 1616 - Ahmet Malal:
Designing Efficient and Flexible NTT Accelerators. 1617 - Benjamin Bencina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, Charlotte Weitkämper:
Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves. 1618 - Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, Yuan Hong:
Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage. 1619 - Dakshita Khurana, Kabir Tomer:
Commitments from Quantum One-Wayness. 1620 - Xin Liu, Joonsang Baek, Willy Susilo:
Withdrawable Signature: How to Call off a Signature. 1621 - Mingfei Zhang, Rujia Li, Sisi Duan:
Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS. 1622 - Shi Bai, Iggy van Hoof, Floyd Johnson, Tanja Lange, Tran Ngo:
Concrete Analysis of Quantum Lattice Enumeration. 1623 - Charmaine Ndolo, Florian Tschorsch:
On the (Not So) Surprising Impact of Multi-Path Payments on Performance and Privacy in the Lightning Network. 1624 - Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu:
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning. 1625 - Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin:
Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM. 1626 - Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber. 1627 - Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe:
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. 1628 - Zhengjun Cao, Lihua Liu:
A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0". 1629 - Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery. 1630 - Zuodong Wu, Dawei Zhang, Yong Li, Xu Han:
ASKPIR: Authorized Symmetric Keyword Privacy Information Retrieval Protocol Based on DID. 1631 - Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stanica, Svetla Nikova:
On Decompositions of Permutations in Quadratic Functions. 1632 - Yang Li, Wei Wang, Dawei Zhang, Xu Han:
One-time and Revocable Ring Signature with Logarithmic Size in Blockchain. 1633 - Jelle Don, Serge Fehr, Yu-Hsuan Huang, Patrick Struck:
On the (In)Security of the BUFF Transform. 1634 - Michele Orrù, Stefano Tessaro, Greg Zaverucha, Chenzhi Zhu:
Oblivious issuance of proofs. 1635 - Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang:
Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval. 1636 - Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Bo-Yin Yang:
Algorithmic Views of Vectorized Polynomial Multipliers - NTRU. 1637 - Henry Corrigan-Gibbs, David J. Wu:
The One-Wayness of Jacobi Signatures. 1638 - Tingfei Feng:
Analysis of a Quantum Attack on the Blum-Micali Pseudorandom Number Generator. 1639 - Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. 1640 - Zuodong Wu, Dawei Zhang, Yong Li, Xu Han:
PSKPIR: Symmetric Keyword Private Information Retrieval based on PSI with Payload. 1641 - Johannes Mono, Tim Güneysu:
A New Perspective on Key Switching for BGV-like Schemes. 1642 - Sofiane Azogagh, Victor Deflour, Marc-Olivier Killijian:
Oblivious Turing Machine. 1643 - Ricardo J. M. Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, Ricardo Jacobi:
An End-to-End Framework for Private DGA Detection as a Service. 1644 - Chenglian Liu, Sonia Chien-I Chen:
The Dilemma and Prospects of Academic Misconduct in Digital Forensics-A Case Study to Wan's Improved Scheme. 1645 - Alessandro Chiesa, Ziyi Guan, Shahar Samocha, Eylon Yogev:
Security Bounds for Proof-Carrying Data from Straightline Extractors. 1646 - Amund Askeland, Svetla Nikova, Ventzislav Nikov:
Who Watches the Watchers: Attacking Glitch Detection Circuits. 1647 - Apostolos Tzinas, Srivatsan Sridhar, Dionysis Zindros:
On-Chain Timestamps Are Accurate. 1648 - Xiaopeng Zheng, Hongbo Li, Dingkang Wang:
A New Framework for Fast Homomorphic Matrix Multiplication. 1649 - Kosuke Sakata, Tsuyoshi Takagi:
An Efficient Algorithm for Solving the MQ Problem using Hilbert Series. 1650 - Ignacio Cascudo, Bernardo David:
Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO. 1651 - Claudia Bartoli, Ignacio Cascudo:
On Sigma-Protocols and (packed) Black-Box Secret Sharing Schemes. 1652 - Jannis Leuther, Stefan Lucks:
QCB is Blindly Unforgeable. 1653 - Thomas Espitau, Alexandre Wallet, Yang Yu:
On Gaussian sampling, smoothing parameter and application to signatures. 1654 - Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, Anatoliy Zinovyev:
Approximate Lower Bound Arguments. 1655 - Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu:
Privacy-Preserving Digital Vaccine Passport. 1656 - Abel C. H. Chen:
PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme. 1657 - Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal:
On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks. 1658 - Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:
Partial Sums Meet FFT: Improved Attack on 6-Round AES. 1659 - Yu Song, Yu Long, Xian Xu, Dawu Gu:
FaBFT: Flexible Asynchronous BFT Protocol Using DAG. 1660 - Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang:
Publicly Detectable Watermarking for Language Models. 1661 - Antonio Sanso:
Family of embedded curves for BLS. 1662 - Juan A. Garay, Aggelos Kiayias, Yu Shen:
Proof-of-Work-based Consensus in Expected-Constant Time. 1663 - João Diogo Duarte:
On the Complexity and Admissible Parameters of the Crossbred Algorithm in $\mathbb{F}_{q\geq2}$. 1664 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples. 1665 - Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier A. Verbel, Floyd Zweydinger:
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head. 1666 - Soumya Sahoo, Debasmita Chakraborty, Santanu Sarkar:
Unleashing the Power of Differential Fault Attacks on QARMAv2. 1667 - Tomer Ashur, Al Kindi:
Arithmetization Oriented Encryption. 1668 - Karim Baghery:
Π: A Unified Framework for Verifiable Secret Sharing. 1669 - Jörn Kußmaul, Matthew Akram, Anselme Tueno:
Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing. 1670 - Zhengjun Cao, Lihua Liu:
A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement". 1671 - Keyu Ji, Bingsheng Zhang, Kui Ren:
Fine-grained Policy Constraints for Distributed Point Function. 1672 - Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi:
Designing Full-Rate Sponge based AEAD modes. 1673 - Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. 1674 - Orr Dunkelman, Ariel Weizman:
Another Look at Differential-Linear Attacks. 1675 - Gilad Asharov, Ilan Komargodski, Yehuda Michelson:
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM. 1676 - Michele Ciampi, Yu Xia:
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions. 1677 - Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Kui Ren, Cheng Hong, Tao Wei, Wenguang Chen:
BumbleBee: Secure Two-party Inference Framework for Large Transformers. 1678 - Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, Debdeep Mukhopadhyay:
Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks. 1679 - Pierrick Méaux, Yassine Ozaim:
On the cryptographic properties of weightwise affine and weightwise quadratic functions. 1680 - Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression. 1681 - Jiaxin Pan, Runzhi Zeng:
Selective Opening Security in the Quantum Random Oracle Model, Revisited. 1682 - Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer:
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4. 1683 - Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo:
Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication. 1684 - Janik Huth, Antoine Joux:
MPC in the head using the subfield bilinear collision problem. 1685 - André Chailloux, Jean-Pierre Tillich:
The Quantum Decoding Problem. 1686 - Shuhei Nakamura:
Admissible Parameter Sets and Complexity Estimation of Crossbred Algorithm. 1687 - Thomas Pornin:
Faster Complete Formulas for the GLS254 Binary Curve. 1688 - Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe:
Revisiting the Boomerang Attack from a Perspective of 3-differential. 1689 - Shuqing Zhang:
Efficient VOLE based Multi-Party PSI with Lower Communication Cost. 1690 - George Teseleanu:
Some Results on Related Key-IV Pairs of Espresso. 1691 - Xu An Wang, Lunhai Pan, Hao Liu, Xiaoyuan Yang:
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. 1692 - George Teseleanu, Paul Cotan:
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes. 1693 - Tian Qiu, Qiang Tang:
Predicate Aggregate Signatures and Applications. 1694 - Andrei Lapets:
Implementing Arbitrary Maps over Small Finite Domains using Ring Addition and Scalar Multiplication. 1695 - Zhengjun Cao:
A note on "a novel authentication and key agreement scheme for Internet of Vehicles". 1696 - Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version). 1697 - Xiaolu Hou, Jakub Breier, Mladen Kovacevic:
Another Look at Side-Channel Resistant Encoding Schemes. 1698 - Osman Biçer, Christian Tschudin:
Oblivious Homomorphic Encryption. 1699 - Radhika Garg, Kang Yang, Jonathan Katz, Xiao Wang:
Scalable Mixed-Mode MPC. 1700 - Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder:
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. 1701 - Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, Quoc-Huy Vu:
On Quantum Simulation-Soundness. 1702 - Surya Mathialagan:
Memory Checking for Parallel RAMs. 1703 - Wonseok Choi, Minki Hhan, Yu Wei, Vassilis Zikas:
Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs. 1704 - Hadas Zeilberger, Binyi Chen, Ben Fisch:
BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes. 1705 - Yang Tan, Bo Lv:
Breaking two PSI-CA protocols in polynomial time. 1706 - Ivan Buchinskiy, Matvei Kotov, Alexander Treier:
Analysis of four protocols based on tropical circulant matrices. 1707 - Jan Schoone, Joan Daemen:
Algebraic properties of the maps χn. 1708 - Zhiwei Li, Jun Xu, Lei Hu:
Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol. 1709 - Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, Christophe Petit:
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies. 1710 - Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger:
Passive SSH Key Compromise via Lattices. 1711 - Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, Xiangfu Song:
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage. 1712 - Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Peter Schwabe:
High-assurance zeroization. 1713 - Alessandro Chiesa, Ziyi Guan, Burcu Yildiz:
On Parallel Repetition of PCPs. 1714 - Shiyuan Xu, Yibo Cao, Xue Chen, Yuer Yang, Siu-Ming Yiu:
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications. 1715 - Yao-Ching Hsieh, Huijia Lin, Ji Luo:
Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices: Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and More. 1716 - Elli Androulaki, Marcus Brandenburger, Angelo De Caro, Kaoutar Elkhiyaoui, Liran Funaro, Alexandros Filios, Yacov Manevich, Senthilnathan Natarajan, Manish Sethi:
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies. 1717 - Yimeng Sun, Jiamin Cui, Meiqin Wang:
Improved Attacks on LowMC with Algebraic Techniques. 1718 - Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain:
MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem. 1719 - Samuel Bouaziz-Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu:
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions. 1720 - Fuxin Zhang, Zhenyu Huang:
Optimizing S-box Implementations Using SAT Solvers: Revisited. 1721 - Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont:
Quantitative Fault Injection Analysis. 1722 - Fatima Elsheimy, Giorgos Tsimos, Charalampos Papamanthou:
Deterministic Byzantine Agreement with Adaptive O(n· f) Communication. 1723 - Dan Boneh, Aditi Partap, Lior Rotem:
Traitor Tracing for Threshold Decryption. 1724 - René Rodríguez-Aldama:
Few-weight linear codes over 픽p from t-to-one mappings. 1725 - Steven D. Galbraith, Derek Perrin, José Felipe Voloch:
CSIDH with Level Structure. 1726 - Shoichi Hirose, Kazuhiko Minematsu:
A Formal Treatment of Envelope Encryption. 1727 - Daniele Micciancio, Adam Suhl:
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus. 1728 - Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram:
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks. 1729 - Elena Kirshanova, Ekaterina Malygina:
Construction-D lattice from Garcia-Stichtenoth tower code. 1730 - Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede:
A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer. 1731 - Suparna Kundu, Angshuman Karmakar, Ingrid Verbauwhede:
On the Masking-Friendly Designs for Post-Quantum Cryptography. 1732 - Baiyu Li, Daniele Micciancio, Mariana Raykova, Mark Schultz:
Hintless Single-Server Private Information Retrieval. 1733 - Keita Xagawa:
Signatures with Memory-Tight Security in the Quantum Random Oracle Model. 1734 - Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:
Exploiting the Symmetry of ℤn: Randomization and the Automorphism Problem. 1735 - Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy:
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption. 1736 - Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner:
Concrete Security for Succinct Arguments from Vector Commitments. 1737 - Simon Holmgaard Kamp, Jesper Buus Nielsen:
Byzantine Agreement Decomposed: Honest Majority Asynchronous Total-Order Broadcast from Reliable Broadcast. 1738 - Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, Sophia Yakoubov:
Broadcast-Optimal Four-Round MPC in the Plain Model. 1739 - Miguel de Vega, Andrei Lapets, Stanislaw Jarecki, Wicher Malten, Mehmet Ugurbil, Wyatt Howe:
Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase. 1740 - Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu, Yao-Ting Lin:
Pseudorandom Isometries. 1741 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner:
Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions. 1742 - Kazumasa Shinagawa, Koji Nuida:
Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions. 1743 - Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version). 1744 - Rémi Géraud-Stewart, David Naccache:
New Public-Key Cryptosystem Blueprints Using Matrix Products in 픽p. 1745 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. 1746 - Pierrick Dartois, Luciano Maino, Giacomo Pope, Damien Robert:
An Algorithmic Approach to (2,2)-isogenies in the Theta Model and Applications to Isogeny-based Cryptography. 1747 - Lorenz Panny:
Forging tropical signatures. 1748 - Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk:
Dora: Processor Expressiveness is (Nearly) Free in Zero-Knowledge for RAM Programs. 1749 - Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks. 1750 - Raja Adhithan RadhaKrishnan:
Secure Encryption and Key Exchange using Arbiter PUF. 1752 - Sophie Stevens:
Formal verification of the post-quantum security properties of IKEv2 PPK (RFC 8784) using the Tamarin Prover. 1753 - Cecilia Boschini, Hila Dahari, Moni Naor, Eyal Ronen:
That's not my signature! Fail-stop signatures for a post-quantum world. 1754 - Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup. 1755 - Andrea Coladangelo, Sam Gunn:
How to Use Quantum Indistinguishability Obfuscation. 1756 - Matthieu Rambaud:
Adaptively Secure Consensus with Linear Complexity and Constant Round under Honest Majority in the Bare PKI Model, and Separation Bounds from the Idealized Message-Authentication Model. 1757 - Tushar M. Jois, Gabrielle Beck, Gabriel Kaptchuk:
Pulsar: Secure Steganography through Diffusion Models. 1758 - Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-Interactive Zero-Knowledge Functional Proofs. 1759 - Luk Bettale, Delaram Kahrobaei, Ludovic Perret, Javier A. Verbel:
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials. 1760 - Elsie Mestl Fondevik, Britta Hale, Xisen Tian:
Guardianship in Group Key Exchange for Limited Environments. 1761 - Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo:
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. 1762 - Mu Yuan, Lan Zhang, Xiang-Yang Li:
Secure Transformer Inference. 1763 - Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study. 1764 - Noam Mazor, Rafael Pass:
The Non-Uniform Perebor Conjecture for Time-Bounded Kolmogorov Complexity is False. 1765 - Aurel Page, Damien Robert:
Introducing Clapoti(s): Evaluating the isogeny class group action in polynomial time. 1766 - Patrick Karl, Jonas Schupp, Georg Sigl:
The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+. 1767 - Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, Dafu Lou:
Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature. 1768 - Amit Mazumder Shuvo, Tao Zhang, Farimah Farahmandi, Mark M. Tehranipoor:
A Comprehensive Survey on Non-Invasive Fault Injection Attacks. 1769 - Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao:
On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial. 1770 - Zhengjun Cao:
A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment". 1771 - Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Robust Combiners and Universal Constructions for Quantum Cryptography. 1772 - Hanwen Feng, Tiancheng Mai, Qiang Tang:
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing. 1773 - Uddipana Dowerah, Aikaterini Mitrokotsa:
Decentralized Private Steam Aggregation from Lattices. 1774 - Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, Kan Yang:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. 1775 - Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models. 1776 - Jelle Vos, Mauro Conti, Zekeriya Erkin:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. 1777 - Marshall Ball, Yevgeniy Dodis, Eli Goldin:
Immunizing Backdoored PRGs. 1778 - Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang:
Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics. 1779 - Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu:
Pairing-Free Blind Signatures from CDH Assumptions. 1780 - Yen-Ting Kuo, Atsushi Takayasu:
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis. 1781 - Kamil Otal:
A Solution to a Conjecture on the Maps χn(k). 1782 - John Bostanci, Luowen Qian, Nicholas Spooner, Henry Yuen:
An efficient quantum parallel repetition theorem and applications. 1783 - Benjamin E. Diamond, Jim Posen:
Succinct Arguments over Towers of Binary Fields. 1784 - Yuan Zhang, Yaqing Song, Shiyu Li, Weijia Li, Zeqi Lai, Qiang Tang:
There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation. 1785 - Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla:
CASE: A New Frontier in Public-Key Authenticated Encryption. 1786 - Bernardo David, Felix Engelmann, Tore Kasper Frederiksen, Markulf Kohlweiss, Elena Pagnin, Mikhail Volkhov:
Updatable Privacy-Preserving Blueprints. 1787 - Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Damien Stehlé:
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption. 1788 - Arup Mondal, Priyam Panda, Shivam Agarwal, Abdelrahaman Aly, Debayan Gupta:
Fast and Secure Oblivious Stable Matching over Arithmetic Circuits. 1789 - Daniel Espinoza Figueroa:
Compromising sensitive information through Padding Oracle and Known Plaintext attacks in Encrypt-then-TLS scenarios. 1790 - Jamal Mosakheil, Kan Yang:
Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation. 1791 - Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford:
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones. 1792 - Dan Boneh, Aditi Partap, Brent Waters:
Accountable Multi-Signatures with Constant Size Public Keys. 1793 - Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang:
Secret-Shared Shuffle with Malicious Security. 1794 - Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits without Conductivity. 1795 - Andersson Calle Viera, Alexandre Berzati, Karine Heydemann:
Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification. 1796 - Prabhanjan Ananth, Amit Behera:
A Modular Approach to Unclonable Cryptography. 1797 - Carlos Aguilar Melchor, Victor Dyseryn, Philippe Gaborit:
Somewhat Homomorphic Encryption based on Random Codes. 1798 - Srinath T. V. Setty, Justin Thaler:
BabySpartan: Lasso-based SNARK for non-uniform computation. 1799 - Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier:
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions. 1800 - Falko Strenzke:
ForgedAttributes: An Existential Forgery Vulnerability of CMS and PKCS#7 Signatures. 1801 - Elette Boyle, Geoffroy Couteau, Pierre Meyer:
Sublinear-Communication Secure Multiparty Computation does not require FHE. 1802 - Gaëtan Leurent, Clara Pernot:
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation. 1803 - Marian Dietz, Stefano Tessaro:
Fully Malicious Authenticated PIR. 1804 - Hien Chu, Khue Do, Lucjan Hanzlik:
On the Security of Rate-limited Privacy Pass. 1805 - Xudong Zhu, Xuyang Song, Yi Deng:
Fast and Designated-verifier Friendly zkSNARKs in the BPK Model. 1806 - Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Entrada to Secure Graph Convolutional Networks. 1807 - Yuchao Chen, Tingting Guo, Lei Hu, Lina Shang, Shuping Mao, Peng Wang:
Small Stretch Problem of the DCT Scheme and How to Fix it. 1808 - Alex Biryukov, Marius Lombard-Platet:
PURED: A unified framework for resource-hard functions. 1809 - Julia Kastner, Ky Nguyen, Michael Reichle:
Pairing-Free Blind Signatures from Standard Assumptions in the ROM. 1810 - Kathrin Hövelmanns, Christian Majenz:
A note on Failing gracefully: Completing the picture for explicitly rejecting Fujisaki-Okamoto transforms using worst-case correctness. 1811 - Sahil Sharma:
The NTT and residues of a polynomial modulo factors of X2d + 1. 1812 - Julian Loss, Jesper Buus Nielsen:
Early Stopping for Any Number of Corruptions. 1813 - Ahmad Khoureich Ka:
Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption. 1814 - Neil Thanawala, Hamid Nejatollahi, Nikil D. Dutt:
Accelerating Polynomial Multiplication for RLWE using Pipelined FFT. 1815 - Tianjian Liu, Dawei Zhang, Wei Wang:
ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain. 1816 - Julien S. Jainsky, David Naccache, Bassem Ouni, Ofer Yifrach-Stav:
Authenticating Medications with QR-Codes and Compact Digital Signatures. 1817 - Romain Gay, Bogdan Ursu:
On the Feasibility of Unleveled Fully-Homomorphic Signatures. 1818 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs. 1819 - Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang:
Chipmunk: Better Synchronized Multi-Signatures from Lattices. 1820 - Aleksei Udovenko:
Cryptanalysis of TS-Hash. 1821 - Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Goubin, Robin Larrieu, Brice Minaud:
Rectangular Attack on VOX. 1822 - Abel C. H. Chen:
PQC-NN: Post-Quantum Cryptography Neural Network. 1823 - Jiaqi Liu, Fang-Wei Fu:
Learning with Errors over Group Rings Constructed by Semi-direct Product. 1824 - Céline Chevalier, Paul Hermouet, Quoc-Huy Vu:
Unclonable Cryptography in the Plain Model. 1825 - Yibiao Lu, Bingsheng Zhang, Kui Ren:
Load-Balanced Server-Aided MPC in Heterogeneous Computing. 1826 - Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, Daniele Venturi:
Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE. 1827 - Yi Wang, Rongmao Chen, Xinyi Huang, Moti Yung:
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. 1828 - Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness. 1829 - Ertem Nusret Tas, Dan Boneh:
Vector Commitments with Efficient Updates. 1830 - François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, Christine Solnon:
A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics - Extended Version. 1831 - Noam Mazor, Rafael Pass:
A Note On the Universality of Black-box MKtP Solvers. 1832 - Hosein Hadipour, Yosuke Todo:
Cryptanalysis of QARMAv2. 1833 - Ritam Bhaumik, Mohammad Amin Raeisi:
BBB PRP Security of the Lai-Massey Mode. 1834 - Apurva K. Vangujar, Alia Umrani, Paolo Palmieri:
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs. 1835 - Hamza Abusalah, Valerio Cini:
An Incremental PoSW for General Weight Distributions. 1836 - Daniel R. L. Brown, Chris Monico:
More forging (and patching) of tropical signatures. 1837 - Daniel J. Bernstein:
Quantifying risks in cryptographic selection processes. 1838 - Charanjit S. Jutla, Chengyu Lin:
Ring-LWE Hardness Based on Ideals of Hidden Orders of Number Fields. 1839 - Luowen Qian:
Unconditionally secure quantum commitments with preprocessing. 1840 - Alper Çakan, Vipul Goyal:
Unclonable Cryptography with Unbounded Collusions. 1841 - Xihan Xiong, Zhipeng Wang, Xi Chen, William J. Knottenbelt, Michael Huth:
Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks. 1842 - Mike Wa Nkongolo:
Zero-day vulnerability prevention with recursive feature elimination and ensemble learning. 1843 - Tomoyuki Morimae, Barak Nehoran, Takashi Yamakawa:
Unconditionally Secure Commitments with Quantum Auxiliary Inputs. 1844 - Olivier Sanders, Jacques Traoré:
Efficient Issuer-Hiding Authentication, Application to Anonymous Credential. 1845 - Orhun Kara:
New Security Proofs and Complexity Records for Advanced Encryption Standard. 1846 - Xianghan Wang, Jianghua Zhong, Dongdai Lin:
Cycle Structure and Observability of Two Types of Galois NFSRs. 1847 - Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos:
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. 1848 - Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Lattice-based Programmable Hash Functions and Applications. 1849 - Léo Ducas, Ludo N. Pulles:
Accurate Score Prediction for Dual-Sieve Attacks. 1850 - Paul Frixons, Sébastien Canard, Loïc Ferreira:
Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK. 1851 - Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich:
Reduction from sparse LPN to LPN, Dual Attack 3.0. 1852 - Jolijn Cottaar, Kathrin Hövelmanns, Andreas Hülsing, Tanja Lange, Mohammad Mahzoun, Alex Pellegrini, Alberto Ravagnani, Sven Schäge, Monika Trimoska, Benne de Weger:
Report on evaluation of KpqC candidates. 1853 - Zhengjun Cao:
A note on quantum approximate optimization algorithm. 1854 - Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. 1855 - Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, Limin Fan:
Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model. 1856 - Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen:
A Simple and Efficient Framework of Proof Systems for NP. 1857 - Charanjit S. Jutla, Eamonn W. Postlethwaite, Arnab Roy:
A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs. 1858 - Dimitar Jetchev, Marius Vuille:
XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models. 1859 - Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay:
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis. 1860 - Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking. 1861 - Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Analyzing UTXO-Based Blockchain Privacy Threats. 1862 - Dongyu Wu, Bei Liang, Zijie Lu, Jintai Ding:
Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification. 1863 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:
Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses. 1864 - Kévin Carrier, Valérian Hatey, Jean-Pierre Tillich:
Projective Space Stern Decoding and Application to SDitH. 1865 - Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, Shuo Sun:
When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber. 1866 - Pihla Karanko:
Different Flavours of HILL Pseudoentropy and Yao Incompressibility Entropy. 1867 - Albert Garreta, Adam Gagol, Aikaterini-Panagiota Stouka, Damian Straszak, Michal Zajac:
COMMON: Order Book with Privacy. 1868 - Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach:
Accountable Bulletin Boards: Definition and Provably Secure Implementation. 1869 - Weizhe Wang, Haoyang Wang, Deng Tang:
An Improved Method for Evaluating Secret Variables and Its Application to WAGE. 1870 - Dipesh, Vishesh Mishra, Urbi Chatterjee:
B2T: The Third Logical Value of a Bit. 1871 - Weizhe Wang, Deng Tang:
Integral Multiset: A Novel Framework for Integral Attacks over Finite Fields. 1872 - Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier:
SoK: Post-Quantum TLS Handshake. 1873 - George Teseleanu:
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. 1874 - Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit, Adrien Vinçotte:
The Blockwise Rank Syndrome Learning problem and its applications to cryptography. 1875 - Rosario Giustolisi, Maryam Sheikhi Garjan, Carsten Schuermann:
Thwarting Last-Minute Voter Coercion. 1876 - George Teseleanu:
Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps. 1877 - Daniel J. Bernstein:
Predicting performance for post-quantum encrypted-file systems. 1878 - Dániel Zentai, Mihail Plesa, Robin Frot:
A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem. 1879 - Chris Peikert, Yi Tang:
Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work. 1880 - Wonseok Choi, Xiangyu Liu, Vassilis Zikas:
Blockchain Governance via Sharp Anonymous Multisignatures. 1881 - Swati Rawal, Sahadeo Padhye, Debiao He:
Lattice Based Signatures with Additional Functionalities. 1882 - Marc Damie, Jean-Benoist Leger, Florian Hahn, Andreas Peter:
The statistical nature of leakage in SSE schemes and its role in passive attacks. 1883 - Anja Lehmann, Cavit Özbay:
Multi-Signatures for Ad-hoc and Privacy-Preserving Group Signing. 1884 - Michael Schmid, Dorian Amiet, Jan Wendler, Paul Zbinden, Tao Wei:
Falcon Takes Off - A Hardware Implementation of the Falcon Signature Scheme. 1885 - Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath T. V. Setty, Jess Woods:
Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs. 1886 - Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis:
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Almost) Quadratic Communication Complexity. 1887 - Lev Soukhanov:
Reverie: an end-to-end accumulation scheme from Cyclefold. 1888 - Jong-Yeon Park, Dongsoo Lee, Seonggyeom Kim, Wonil Lee, Bo-Gyeong Kang, Kouichi Sakurai:
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography. 1889 - Taipei Lu, Bingsheng Zhang, Lichun Li, Kui Ren:
Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries. 1890 - Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. 1891 - Daniel J. Bernstein:
Asymptotics of hybrid primal lattice attacks. 1892 - Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider:
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. 1893 - Yilei Chen, Jiatu Li:
Hardness of Range Avoidance and Remote Point for Restricted Circuits via Cryptography. 1894 - Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert:
The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm. 1895 - Colin Putman, Keith M. Martin:
Selective Delegation of Attributes in Mercurial Signature Credentials. 1896 - Sajin Sasy, Adithya Vadapalli, Ian Goldberg:
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures. 1897 - Ori Mazor, Ori Rottenstreich:
An Empirical Study of Cross-chain Arbitrage in Decentralized Exchanges. 1898 - Tom Azoulay, Uri Carl, Ori Rottenstreich:
Allowing Blockchain Loans with Low Collateral. 1899 - Mingxun Zhou, Elaine Shi, Giulia Fanti:
Proof of Compliance for Anonymous, Unlinkable Messages. 1900 - Cong Ling, Andrew Mendelsohn:
Middle-Products of Skew Polynomials and Learning with Errors. 1901 - François-Xavier Wicht, Zhipeng Wang, Duc Viet Le, Christian Cachin:
A Transaction-Level Model for Blockchain Privacy. 1902 - Céline Chevalier, Guirec Lebrun, Ange Martinelli:
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users. 1903 - Sulaiman Alhussaini, Craig Collett, Sergei Sergeev:
Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Circulants. 1904 - Scott R. Fluhrer:
Oops, I did it again revisited: another look at reusing one-time signatures. 1905 - Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah:
Exploring SIDH-based Signature Parameters. 1906 - Tim Beyne, Michiel Verbauwhede:
Integral Cryptanalysis Using Algebraic Transition Matrices. 1907 - Amirreza Sarencheh, Aggelos Kiayias, Markulf Kohlweiss:
PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin. 1908 - Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller:
Ratel: MPC-extensions for Smart Contracts. 1909 - Daniel R. L. Brown:
Failed crypto: Matrices over non-standard arithmetic. 1910 - Nai-Hui Chia, Shih-Han Hung:
Non-Interactive Classical Verification of Quantum Depth: A Fine-Grained Characterization. 1911 - Hongqing Liu, Chaoping Xing, Chen Yuan, Taoxu Zou:
Dishonest Majority Multiparty Computation over Matrix Rings. 1912 - Prasanna Ravi, Arpan Jati, Shivam Bhasin:
Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software. 1913 - Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, Rishub Nagpal:
Efficient Low-Latency Masking of Ascon without Fresh Randomness. 1914 - Poulami Das, Andreas Erwig, Michael Meyer, Patrick Struck:
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies. 1915 - Victor Shoup:
DispersedSimplex: simple and efficient atomic broadcast. 1916 - Toluwani Aremu:
Regularized PolyKervNets: Optimizing Expressiveness and Efficiency for Private Inference in Deep Neural Networks. 1917 - Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, Ajith Suresh:
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC. 1918 - Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
When and How to Aggregate Message Authentication Codes on Lossy Channels? 1919 - Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. 1920 - Alexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, Víctor Mateu:
Automated Issuance of Post-Quantum Certificates: a New Challenge. 1921 - Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin:
One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis. 1922 - Amit Jana:
Differential Fault Attack on Ascon Cipher. 1923 - Daniel J. Bernstein:
Analyzing the complexity of reference post-quantum software. 1924 - Anindya Ganguly, Angshuman Karmakar, Nitin Saxena:
VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme. 1925 - Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau:
NOTRY: deniable messaging with retroactive avowal. 1926 - Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams:
Holepunch: Fast, Secure File Deletion with Crash Consistency. 1927 - Ping Wang, Yikang Lei, Yiting Su:
Unconditionally Secure Quantum Bit Commitment and Quantum Oblivious Transfer. 1928 - Damiano Abram, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan:
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. 1929 - Jiahui Gao, Son Nguyen, Ni Trieu:
Toward A Practical Multi-party Private Set Union. 1930 - Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova:
Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality? 1931 - Sebastian Hasler, Pascal Reisert, Marc Rivinius, Ralf Küsters:
Multipars: Reduced-Communication MPC over Z2k. 1932 - Cas Cremers, Alexander Dax, Niklas Medinger:
Keeping Up with the KEMs: Stronger Security Notions for KEMs. 1933 - Wicher Malten, Mehmet Ugurbil, Miguel de Vega:
More efficient comparison protocols for MPC. 1934 - Wenzhe Yang:
The Splitting Field of Yn-2, Two-Variable NTT and Lattice-Based Cryptography. 1935 - Hanjun Li, Huijia Lin, Antigoni Polychroniadou, Stefano Tessaro:
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking. 1936 - Tomoyuki Morimae, Alexander Poremba, Takashi Yamakawa:
Revocable Quantum Digital Signatures. 1937 - Eli Bradley, Brent Waters, David J. Wu:
Batch Arguments to NIZKs from One-Way Functions. 1938 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Applications of Neural Network-Based AI in Cryptography. 1939 - Sreyosi Bhattacharyya, Palash Sarkar:
Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm. 1940 - Chloé Cachet, Ariel Hamlin, Maryam Rezapour, Benjamin Fuller:
Upgrading Fuzzy Extractors. 1941 - Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee:
Traceable mixnets. 1942 - Jinpeng Liu, Ling Sun:
Distinguisher and Related-Key Attack on HALFLOOP-96. 1943 - Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Revisiting The Multiple of Property for SKINNY The Exact Computation of the number of right pairs. 1944 - Thomas Attema, Serge Fehr, Michael Klooß, Nicolas Resch:
The Fiat-Shamir Transformation of (Γ1,đots,Γμ)-Special-Sound Interactive Proofs. 1945 - Xun Liu, Shang Gao, Tianyu Zheng, Bin Xiao:
SnarkFold: Efficient SNARK Proof Aggregation from Split Incrementally Verifiable Computation. 1946 - Marloes Venema, Leon Botros:
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures. 1947 - Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou:
PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments. 1948 - Diego F. Aranha, Anamaria Costache, Antonio Guimarães, Eduardo Soria-Vazquez:
HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical. 1949 - Brett Hemenway Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang:
GigaDORAM: Breaking the Billion Address Barrier. 1950 - Paula Arnold, Sebastian Berndt, Jörn Müller-Quade, Astrid Ottenhues:
Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework. 1951 - Stone Li:
Overview and Discussion of Attacks on CRYSTALS-Kyber. 1952 - Muhammad Imran, Gábor Ivanyos:
Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem. 1953 - Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav:
Fiat-Shamir Goes Tropical. 1954 - Vincent Hwang, YoungBeom Kim, Seog Chung Seo:
Barrett Multiplication for Dilithium on Embedded Devices. 1955 - Abdelhaliem Babiker:
A Signature Scheme from Full-Distance Syndrome Decoding. 1956 - Takahiro Matsuda:
Chosen Ciphertext Security via BARGs. 1957 - Yu Dai, Debiao He, Cong Peng, Zhijian Yang, Chang-an Zhao:
Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14. 1958 - Theophilus Agama:
On the notion of carries of numbers 2n-1 and Scholz conjecture. 1959 - David Anthony Stainton:
Post Quantum Sphinx. 1960 - David Naccache, Ofer Yifrach-Stav:
On The Practical Advantage of Committing Challenges in Zero-Knowledge Protocols. 1961 - Vincent Hwang:
SoK: Polynomial Multiplications for Lattice-Based Cryptosystems. 1962 - Andrew Mendelsohn, Edmund Dable-Heath, Cong Ling:
A Small Serving of Mash: (Quantum) Algorithms for SPDH-Sign with Small Parameters. 1963 - Clara Shikhelman:
Maypoles: Lightning Striking Twice. 1964 - Shuai Han, Shengli Liu, Dawu Gu:
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. 1965 - Matteo Campanelli, Chaya Ganesh, Rosario Gennaro:
How to Make Rational Arguments Practical and Extractable. 1966 - Shafik Nassar, Brent Waters, David J. Wu:
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption. 1967 - Kelsey A. Jackson, Carl A. Miller, Daochen Wang:
Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model. 1968 - Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, Kui Ren:
Secure and Practical Functional Dependency Discovery in Outsourced Databases. 1969 - Anupam Chattopadhyay, Subhamoy Maitra, Bimal Mandal, Manmatha Roy, Deng Tang:
Efficient Hardware Implementation for Maiorana-McFarland type Functions. 1970 - Zhengjun Cao, Zhenfu Cao:
The Planck Constant and Quantum Fourier Transformation. 1971 - Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, Amit Sahai:
Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness. 1972 - Yuval Ishai, Eyal Kushnir, Ron D. Rothblum:
Combinatorially Homomorphic Encryption. 1973
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.