Stop the war!
Остановите войну!
for scientists:
default search action
IACR Cryptology ePrint Archive, Volume 2024
Volume 2024, 2024
- Vasyl Ustimenko:
On short digital signatures with Eulerian transformations. 1 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López:
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs. 2 - Alex Kampa:
Simple Soundness Proofs. 3 - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Practical Two-party Computational Differential Privacy with Active Security. 4 - Tamir Tassa, Avishay Yanai:
The Multiple Millionaires' Problem. 5 - Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein:
Towards general-purpose program obfuscation via local mixing. 6 - Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. 7 - Alessandro Budroni, Isaac A. Canales-Martínez, Lucas Pandolfo Perin:
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography. 8 - Aviad Ben Arie, Tamir Tassa:
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation. 9 - Sulaiman Alhussaini, Craig Collett, Sergei Sergeev:
On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs. 10 - Daniel Noble, Brett Hemenway Falk, Rafail Ostrovsky:
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier. 11 - Behnam Zahednejad, Chong-zhi Gao:
Two-Round ID-PAKE with strong PFS and single pairing operation. 12 - Zhengjun Cao, Lihua Liu:
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era". 13 - Ahmet Ramazan Agirtas, Oguz Yayla:
A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup. 14 - Zhenkai Hu, Kang Yang, Yu Yu:
Unconditionally secure MPC for Boolean circuits with constant online communication. 15 - Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar:
Reducing the computational complexity of fuzzy identity-based encryption from lattice. 16 - Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang:
PT-symmetric mapping of three states and its implementation on a cloud quantum processor. 17 - Scott R. Fluhrer, Quynh Dang:
Smaller Sphincs+. 18 - Randy Kuang, Maria Perepechaenko, Dafu Lou, Brinda Tank:
Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes. 19 - Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, Christiane Weis:
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy. 20 - Gérald Gavin, Sandrine Tainturier:
Designing homomorphic encryptions with rational functions. 21 - San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. 22 - Mustafa Khairallah:
CCA Security with Short AEAD Tags. 23 - Muhammed Ali Bingöl, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu:
FlexHi: A Flexible Hierarchical Threshold. 24 - Siavash Riahi, Orfeas Stefanos Thyfronitis Litos:
Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures. 25 - Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-based Encryption on Ideal Lattices. 26 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. 27 - Hoeteck Wee, David J. Wu:
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. 28 - Aarav Varshney, Prashant Agrawal, Mahabir Prasad Jhanwar:
YouChoose: A Lightweight Anonymous Proof of Account Ownership. 29 - Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé:
Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs. 30 - Yi-Hsiu Chen, Yehuda Lindell:
Feldman's Verifiable Secret Sharing for a Dishonest Majority. 31 - Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens:
Verifiable FHE via Lattice-based SNARKs. 32 - Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, Li Fagen:
Security analysis and improvements on a semi-quantum electronic voting protocol. 33 - István András Seres, Péter Burcsi, Péter Kutas:
How (not) to hash into class groups of imaginary quadratic fields? 34 - Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg:
A New Approach to Efficient and Secure Fixed-point Computation. 35 - Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li:
Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack. 36 - Damien Robert, Nicolas Sarkis:
Computing 2-isogenies between Kummer lines. 37 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
On Computing the Multidimensional Scalar Multiplication on Elliptic Curves. 38 - Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, Bas Westerbaan:
X-Wing: The Hybrid KEM You've Been Looking For. 39 - Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang:
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. 40 - Aikata, Dhiman Saha, Sujoy Sinha Roy:
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault. 41 - Jan Bobolz, Jesus Diaz, Markulf Kohlweiss:
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. 42 - Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Fuzzy Identity Based Encryption with a flexible threshold value. 43 - Estuardo Alpirez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy:
Adaptive Distributional Security for Garbling Schemes with 풪(|x|) Online Complexity. 44 - Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu:
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion. 45 - Benjamin Dowling, Bhagya Wimalasiri:
Quantum-Secure Hybrid Communication for Aviation Infrastructure. 46 - Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani:
On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing. 47 - Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. 48 - Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu:
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis. 49 - Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Do You Need a Zero Knowledge Proof? 50 - Atul Luykx, Kenneth G. Paterson:
Limits on Authenticated Encryption Use in TLS. 51 - Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram:
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash. 52 - Michael Clear, Ciaran McGoldrick, Hitesh Tewari:
Anonymous Homomorphic IBE with Application to Anonymous Aggregation. 53 - Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. 54 - Yunxiao Zhou, Shengli Liu, Shuai Han:
Multi-Hop Fine-Grained Proxy Re-Encryption. 55 - Youcef Mokrani, David Jao:
Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion. 56 - Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. 57 - Sacha Servan-Schreiber:
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. 58 - Oren Ganon, Itamar Levi:
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors. 59 - Julius Hermelink, Kai-Chun Ning, Emanuele Strieder:
The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. 60 - Mengce Zheng:
Partial Key Exposure Attack on Common Prime RSA. 61 - WenBin Hsieh:
Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol. 62 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:
A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms. 63 - Pierrick Méaux, Qingju Wang:
Extreme Algebraic Attacks. 64 - Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink:
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation. 65 - Tolun Tosun, Amir Moradi, Erkay Savas:
Exploiting the Central Reduction in Lattice-Based Cryptography. 66 - Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-step Mode. 67 - Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs:
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation. 68 - Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. 69 - Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. 70 - Seyedmohammad Nouraniboosjin, Fatemeh Ganji:
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis. 71 - Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. 72 - Lipeng He:
A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications. 73 - Beyza Bozdemir, Betül Askin Özdemir, Melek Önen:
PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. 74 - Moumita Dutta, Chaya Ganesh, Neha Jawalkar:
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting. 75 - Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. 76 - Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. 77 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. 78 - Yanze Yang, Yiran Jia, Guangwu Xu:
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform. 79 - Samuel Jaques:
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions. 80 - Yulin Zhao, Hualin Zhou, Zhiguo Wan:
SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness. 81 - James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan:
Quantum State Obfuscation from Classical Oracles. 82 - Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan:
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers. 83 - Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko:
Efficient Instances of Docked Double Decker With AES. 84 - Dmitrii I. Koshelev:
Simultaneously simple universal and indifferentiable hashing to elliptic curves. 85 - Momonari Kudo, Kazuhiro Yokoyama:
On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases. 86 - Jung Hee Cheon, Hyeongmin Choe, Jai Hyun Park:
Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption. 87 - Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin:
Enabling PERK on Resource-Constrained Devices. 88 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Lidiia Nikiforova, Stanislav Smyshlyaev:
Two-party GOST in two parts: fruitless search and fruitful synthesis. 89 - Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. 90 - Vasyl Ustimenko:
On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography. 91 - Sofía Celi, Alex Davidson:
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. 92 - Xindong Liu, Li-Ping Wang:
Short Code-based One-out-of-Many Proofs and Applications. 93 - Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade:
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions. 94 - Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. 95 - Yasuhiko Ikematsu, Rika Akiyama:
Revisiting the security analysis of SNOVA. 96 - Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem:
Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures. 97 - Pierrick Méaux, Dibyendu Roy:
Theoretical differential fault attacks on FLIP and FiLIP. 98 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains. 99 - Luke Demarest, Sohaib Ahmad, Sixia Chen, Benjamin Fuller, Alexander Russell:
FiveEyes: Cryptographic Biometric Authentication from the Iris. 100 - Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji:
Unconditional Security using (Random) Anonymous Bulletin Board. 101 - Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, Alice Murphy:
Laconic Branching Programs from the Diffie-Hellman Assumption. 102 - Daniel Nager:
ChaCha related 64 bit oriented ARX cipher. 103 - Bo Jiang, Jian Du, Qiang Yan:
AnonPSI: An Anonymity Assessment Framework for PSI. 104 - Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti:
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. 105 - Ibrahim Yakut, Huseyin Polat:
A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy. 106 - Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. 107 - Angus Gruen:
Some Improvements for the PIOP for ZeroCheck. 108 - Jaehyung Kim, Jinyeong Seo, Yongsoo Song:
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. 109 - Peigen Li, Jintai Ding:
Cryptanalysis of the SNOVA signature scheme. 110 - Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. 111 - Matthias J. Kannwischer, Markus Krausz, Richard Petri, Shang-Yi Yang:
pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers. 112 - Wenhui Wu, Muzhou Li, Meiqin Wang:
Improved Linear Key Recovery Attacks on PRESENT. 113 - Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, Ingrid Verbauwhede:
Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC. 114 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤpe. 115 - Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel, Antoine Choffrut:
On the practical CPAD security of "exact" and threshold FHE schemes and libraries. 116 - Alex Pellegrini, Giovanni Tognolini:
Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes. 117 - Charles Gouert, Nektarios Georgios Tsoutsos:
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption. 118 - Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath:
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE. 119 - Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay:
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures. 120 - Stephen M. Williams:
An acceleration of the AKS prime identification algorithm. 121 - Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra:
SPRITE: Secure and Private Routing in Payment Channel Networks. 122 - Elette Boyle, Ilan Komargodski, Neekon Vafa:
Memory Checking Requires Logarithmic Overhead. 123 - Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks. 124 - Melike Çakmak, Ahmet Sinak, Oguz Yayla:
New self-orthogonal codes from weakly regular plateaued functions and their application in LCD codes. 125 - Emanuele Bellini, David Gérault, Matteo Protopapa, Matteo Rossi:
Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK. 126 - Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto:
Attacks Against the INDCPA-D Security of Exact FHE Schemes. 127 - Ehsan Ebrahimi:
Non-Binding (Designated Verifier) Signature. 128 - Gideon Samid:
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. 129 - Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
HADES: Automated Hardware Design Exploration for Cryptographic Primitives. 130 - Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders:
Practical Post-Quantum Signatures for Privacy. 131 - Rui Hao, Chenglong Yi, Weiqi Dai, Zhaonan Zhang:
SimpleFT: A Simple Byzantine Fault Tolerant Consensus. 132 - Meltem Sönmez Turan:
Optimizing Implementations of Boolean Functions. 133 - Sisi Duan, Yue Huang:
Byzantine Fault Tolerance with Non-Determinism, Revisited. 134 - Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, Liehuang Zhu:
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks. 135 - Jiawen Zhang, Jian Liu, Xinpeng Yang, Yinghao Wang, Kejia Chen, Xiaoyang Hou, Kui Ren, Xiaohu Yang:
Secure Transformer Inference Made Non-interactive. 136 - Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, Xiuzhen Cheng:
Sleepy Consensus in the Known Participation Model. 137 - Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu:
Correction Fault Attacks on Randomized CRYSTALS-Dilithium. 138 - David Heath:
Efficient Arithmetic in Garbled Circuits. 139 - Binbin Tu, Min Zhang, Yu Chen:
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps. 140 - Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida:
Secure Statistical Analysis on Multiple Datasets: Join and Group-By. 141 - Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, Hai Jin:
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency. 142 - Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, Xiaohu Yang:
Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security. 143 - Maria Corte-Real Santos, Craig Costello, Benjamin Smith:
Efficient (3,3)-isogenies on fast Kummer surfaces. 144 - Charlotte Hoffmann, Pavel Hubácek, Svetlana Ivanova:
Practical Batch Proofs of Exponentiation. 145 - Jonathan Komada Eriksen, Antonin Leroux:
Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications. 146 - Thorben Moos, Sayandeep Saha, François-Xavier Standaert:
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks. 147 - Charles Bouillaguet, Julia Sauvage:
Preliminary Cryptanalysis of the Biscuit Signature Scheme. 148 - Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. 149 - Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. 150 - Antonio Flórez-Gutiérrez, Yosuke Todo:
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing. 151 - Patrick Derbez, Marie Euler:
Equivalence of Generalised Feistel Networks. 152 - Robin Geelen:
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV. 153 - Aurélien Dupin, Simon Abelard:
Broadcast Encryption using Sum-Product decomposition of Boolean functions. 154 - Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats:
Fully Homomorphic Encryption on large integers. 155 - Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats:
Homomorphic sign evaluation using functional bootstrapping with a RNS representation of integers. 156 - Jeroen van de Graaf, Arjen K. Lenstra:
Delphi: sharing assessments of cryptographic assumptions. 157 - Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, Rohit Sinha:
HiSE: Hierarchical (Threshold) Symmetric-key Encryption. 158 - Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal:
Logstar: Efficient Linear* Time Secure Merge. 159 - Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, Hai Jin:
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast. 160 - Mingshu Cong, Tsz Hon Yuen, Siu Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. 161 - Kasra Abbaszadeh, Christodoulos Pappas, Dimitrios Papadopoulos, Jonathan Katz:
Zero-Knowledge Proofs of Training for Deep Neural Networks. 162 - Chun Guo, Xiao Wang, Kang Yang, Yu Yu:
On Tweakable Correlation Robust Hashing against Key Leakages. 163 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT. 164 - Brent Waters, David J. Wu:
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation. 165 - Hao Guo, Jintai Ding:
A Practical MinRank Attack Against VOX. 166 - Trevor Yap, Dirmanto Jap:
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. 167 - Hanwen Feng, Zhenliang Lu, Qiang Tang:
Breaking the Cubic Barrier: Distributed Key and Randomness Generation through Deterministic Sharding. 168 - Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM. 169 - Trevor Yap Hong Eng, Shivam Bhasin, Léo Weissbart:
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis. 170 - Tairong Huang, Shihe Ma, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. 171 - Zeyu Liu, Yunhao Wang:
Relaxed Functional Bootstrapping: A New Perspective on BGV/BFV Bootstrapping. 172 - Helger Lipmaa, Roberto Parisella, Janno Siim:
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. 173 - Randy Kuang:
QPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation Group. 174 - Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. 175 - Panos Kampanakis, Will Childs-Klein:
The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections. 176 - Qiaohan Chu, Li Lin, Chen Qian, Jie Chen:
Registered Functional Encryption for Quadratic Functions from MDDH. 177 - Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia:
Fast Public-Key Silent OT and More from Constrained Naor-Reingold. 178 - Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo:
Traitor Tracing without Trusted Authority from Registered Functional Encryption. 179 - Aya Fukami, Richard Buurke, Zeno Geradts:
Exploiting RPMB authentication in a closed source TEE implementation. 180 - Dongwon Lee, Seonhong Min, Yongsoo Song:
Functional Bootstrapping for FV-style Cryptosystems. 181 - Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, Yipu Wu:
FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network. 182 - Balthazar Bauer, Georg Fuchsbauer:
On Security Proofs of Existing Equivalence Class Signature Schemes. 183 - Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen:
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. 184 - Alexandre Belling, Azam Soleimanian, Bogdan Ursu:
Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge. 185 - Daniel Dobkin, Nimrod Cever, Itamar Levi:
RAD-FS - Inherent and Embedded SCA-Security in Ultra-Low Power IoTs. 186 - Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, Gohar M. Kyureghyan:
On the bijectivity of the map χ. 187 - Yanxue Jia, Varun Madathil, Aniket Kate:
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. 188 - Haoqian Zhang, Michelle Yeo, Vero Estrada-Galiñanes, Bryan Ford:
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution. 189 - Patrick Struck, Maximiliane Weishäupl:
Constructing Committing and Leakage-Resilient Authenticated Encryption. 190 - Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. 191 - Elette Boyle, Lisa Kohl, Zhe Li, Peter Scholl:
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism. 192 - Laura Maddison:
MQ Does Not Reduce to TUOV. 193 - Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso:
Helium: Scalable MPC among Lightweight Participants and under Churn. 194 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac A. Canales-Martínez, Jorge Chávez-Saab, Julio López:
PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs. 195 - Pierre Pébereau:
Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform. 196 - Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei:
Alba: The Dawn of Scalable Bridges for Blockchains. 197 - Sourav Das, Benny Pinkas, Alin Tomescu, Zhuolun Xiang:
Distributed Randomness using Weighted VRFs. 198 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing. 199 - Karl Kreder, Shreekara Shastry, Apostolos Tzinas, Sriram Vishwanath, Dionysis Zindros:
A Better Proof-of-Work Fork Choice Rule. 200 - Antonio Sanso:
Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders. 201 - Mark Manulis, Jérôme Nguyen:
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability. 202 - Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, Yuriy Polyakov:
Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use. 203 - Zeyu Liu, Eran Tromer, Yunhao Wang:
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. 204 - ChihYun Chuang, IHung Hsu, TingFang Lee:
A Generalized Distributed RSA Key Generation. 205 - Andi Liu, Yizhong Liu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Yuan Lu:
Kronos: A Robust Sharding Blockchain Consensus with Optimal Communication Overhead. 206 - Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, Brent Waters:
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness. 207 - Samuel Lavery:
Asymmetric Cryptography from Number Theoretic Transformations. 208 - Konstantinos Brazitikos, Vassilis Zikas:
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption. 209 - Dionysis Zindros, Apostolos Tzinas, David Tse:
Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers. 210 - Tao Zhang, Shang Shi, Md Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, Mark M. Tehranipoor:
INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems. 211 - Elijah Pelofske:
Analysis of a Programmable Quantum Annealer as a Random Number Generator. 212 - Charlotte Lefevre:
A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes. 213 - Michele Battagliola, Andrea Flamini:
Distributed Fiat-Shamir Transform. 214 - Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo:
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression. 215 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto:
Rate-1 Fully Local Somewhere Extractable Hashing from DDH. 216 - David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede:
Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption. 217 - Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs using Superposition. 218 - Pierre Pébereau:
Singular points of UOV and VOX. 219 - John Preuß Mattsson:
Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3. 220 - Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, Nektarios Georgios Tsoutsos:
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics. 221 - Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Factoring. 222 - Sri Aravinda Krishnan Thyagarajan, Ke Wu, Pratik Soni:
Game-Theoretically Fair Distributed Sampling. 223 - Nir Bitansky, Nathan Geier:
Amplification of Non-Interactive Zero Knowledge, Revisited. 224 - Yilei Chen, Xinyu Mao:
Universal Computational Extractors from Lattice Assumptions. 225 - Keita Emura, Shingo Sato, Atsushi Takayasu:
Attribute-based Keyed (Fully) Homomorphic Encryption. 226 - Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan:
Adaptively Sound Zero-Knowledge SNARKs for UP. 227 - Ren Taguchi, Atsushi Takayasu:
On the Untapped Potential of the Quantum FLT-based Inversion. 228 - Changrui Mu, Shafik Nassar, Ron D. Rothblum, Prashant Nalini Vasudevan:
Strong Batching for Non-Interactive Statistical Zero-Knowledge. 229 - Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu:
Analysis of Layered ROLLO-I. 230 - Eugene Frimpong, Alexandros Bakas, Camille Foucault, Antonis Michalas:
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices. 231 - Hyeonbum Lee, Jae Hong Seo:
On the Security of Nova Recursive Proof System. 232 - Vladimir Shpilrain, Bianca Sosnovski:
Cayley hashing with cookies. 233 - Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from just Passwords. 234 - Miranda Christ, Sam Gunn:
Pseudorandom Error-Correcting Codes. 235 - Hart Montgomery, Sikhar Patranabis:
Public-Key Cryptography through the Lens of Monoid Actions. 236 - Hao Chung, Tim Roughgarden, Elaine Shi:
Collusion-Resilience in Transaction Fee Mechanism Design. 237 - Sönke Jendral:
A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium. 238 - Hiroki Okada, Tsuyoshi Takagi:
Simulation-Secure Threshold PKE from Standard (Ring-)LWE. 239 - Nobuyuki Sugio:
Implementation of Cryptanalytic Programs Using ChatGPT. 240 - Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi:
Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings. 241 - Yifan Song, Xiaxi Ye:
Perfectly-Secure MPC with Constant Online Communication Complexity. 242 - Vipul Goyal, Chen-Da Liu-Zhang, Yifan Song:
Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience. 243 - Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, Mukul Kulkarni:
Don't Use It Twice! Solving Relaxed Linear Code Equivalence Problems. 244 - Xiaoyu Ji, Junru Li, Yifan Song:
Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience. 245 - Adam Blatchley Hansen, Jesper Buus Nielsen, Mark Simkin:
OCash: Fully Anonymous Payments between Blockchain Light Clients. 246 - Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. 247 - Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner:
FRIDA: Data Availability Sampling from FRI. 248 - Nir Bitansky, Sapir Freizeit:
Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes. 249 - Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger:
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi. 250 - Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer:
Communication-Optimal Convex Agreement. 251 - Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, Antoine Joux:
Short Signatures from Regular Syndrome Decoding, Revisited. 252 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai:
2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC. 253 - Brent Waters, Mark Zhandry:
Adaptive Security in SNARGs via iO and Lossy Functions. 254 - Hosein Hadipour, Patrick Derbez, Maria Eichlseder:
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. 255 - Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, Yiding Zhang:
Fiat-Shamir for Bounded-Depth Adversaries. 256 - Dan Boneh, Binyi Chen:
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems. 257 - Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng:
SoK: Decentralized Storage Network. 258 - Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, Xiuzhen Cheng:
Anonymity on Byzantine-Resilient Decentralized Computing. 259 - Antoine Joux, Julian Loss, Benedikt Wagner:
Kleptographic Attacks against Implicit Rejection. 260 - Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi:
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility. 261 - Tim Beyne, Addie Neyt:
Note on the cryptanalysis of Speedy. 262 - Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, Mingyuan Wang:
Threshold Encryption with Silent Setup. 263 - Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin:
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT. 264 - Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha:
Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits. 265 - Leo de Castro, Kevin Lewi, Edward Suh:
WhisPIR: Stateless Private Information Retrieval with Low Communication. 266 - Evan Laufer, Alex Ozdemir, Dan Boneh:
zkPi: Proving Lean Theorems in Zero-Knowledge. 267 - Minki Hhan:
A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More. 268 - Milad Seddigh, Seyed Hamid Baghestani:
A note on PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks. 269 - Samir Jordan Menon, David J. Wu:
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing. 270 - Janice Jianing Si, Tanusree Sharma, Kanye Ye Wang:
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem. 271 - Narendra Kumar Patel, Hemraj Shobharam Lamkuche:
Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers. 272 - Jonathan Trostle:
Information-Theoretic Homomorphic Encryption and 2-Party Computation. 273 - Heewon Chung, Hyojun Kim, Young-Sik Kim, Yongwoo Lee:
Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption. 274 - Chun Guo, Xiao Wang, Xiang Xie, Yu Yu:
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets. 275 - Jiseung Kim, Changmin Lee:
Reduce and Prange: Revisiting Prange's Information Set Decoding for LPN and RSD. 276 - Juliane Krämer, Mirjam Loiero:
Fault Attacks on UOV and Rainbow. 277 - Ulrich Haböck, David Levit, Shahar Papini:
Circle STARKs. 278 - River Moreira Ferreira, Ludovic Perret:
Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$. 279 - Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner:
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. 280 - Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, Hoeteck Wee:
Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup. 281 - Antoine Joux, Hunter Kippen, Julian Loss:
A Concrete Analysis of Wagner's k-List Algorithm over ℤp. 282 - Carmit Hazay, Yibin Yang:
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling. 283 - Baris Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala:
Practical Improvements to Statistical Ineffective Fault Attacks. 284 - Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. 285 - Jules Maire, Damien Vergnaud:
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head. 286 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. 287 - Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:
A generic algorithm for efficient key recovery in differential attacks - and its associated tool. 288 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice. 289 - Martin Mittelbach, Rafael F. Schaefer, Matthieu R. Bloch, Aylin Yener, Onur Günlü:
Secure Integrated Sensing and Communication under Correlated Rayleigh Fading. 290 - Samuel Bouaziz-Ermann, Garazi Muguruza:
Quantum Pseudorandomness Cannot Be Shrunk In a Black-Box Way. 291 - Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, Xue Liu:
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON. 292 - Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen:
Registered Attribute-Based Signature. 293 - Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate. 294 - Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Arnab Roy:
An Efficient Hash Function for Imaginary Class Groups. 295 - Yiming Gao, Jinghui Wang, Honggang Hu, Binang He:
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. 296 - Abhisar, Madhav Yadav, Girish Mishra:
Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography. 297 - Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher:
New Models for the Cryptanalysis of ASCON. 298 - Robin Leander Schröder, Stefan Gast, Qian Guo:
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. 299 - Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-like Hashing. 300 - David Lubicz, Viktor Fischer:
Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device. 301 - Tony Metger, Alexander Poremba, Makrand Sinha, Henry Yuen:
Pseudorandom unitaries with non-adaptive security. 302 - Arthur Lazzaretti, Charalampos Papamanthou:
Single Pass Client-Preprocessing Private Information Retrieval. 303 - Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou:
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. 304 - Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal. 305 - Intak Hwang, Jinyeong Seo, Yongsoo Song:
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions. 306 - Afonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot:
SweetPAKE: Key exchange with decoy passwords. 307 - Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot:
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM. 308 - Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Thari Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, Ozgur Sinanoglu:
NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack. 309 - Matthias Johann Steiner:
A Zero-Dimensional Gröbner Basis for Poseidon. 310 - Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, Akira Takahashi:
Aggregating Falcon Signatures with LaBRADOR. 311 - Benedikt Auerbach, Christoph U. Günther, Krzysztof Pietrzak:
Trapdoor Memory-Hard Functions. 312 - Matthias Johann Steiner:
The Complexity of Algebraic Algorithms for LWE. 313 - Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, Sujoy Sinha Roy:
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration. 314 - Christina Boura, Patrick Derbez, Margot Funk:
Alternative Key Schedules for the AES. 315 - Schuyler Rosefield, Abhi Shelat, LaKyah Tyner:
Threshold Garbled Circuits with Low Overhead. 316 - Giovanni Deligios, Mose Mizrahi Erbes:
Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus. 317 - Alexander Hoover, Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs. 318 - Vasyl Ustimenko:
On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings Z2s, s>1. 319 - Hanjun Li, Sela Navot, Stefano Tessaro:
POPSTAR: Lightweight Threshold Reporting with Reduced Leakage. 320 - Vincent Hwang:
Formal Verification of Emulated Floating-Point Arithmetic in Falcon. 321 - Weixi Zheng, Liu Zhang, Zilong Wang:
Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis. 322 - Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang:
Circuit Bootstrapping: Faster and Smaller. 323 - Jake Januzelli, Lawrence Roy, Jiayu Xu:
Under What Conditions Is Encrypted Key Exchange Actually Secure? 324 - Benedikt Bünz, Jessica Chen:
Proofs for Deep Thought: Accumulation for large memories and deterministic computations. 325 - Nicolas Alhaddad, Mayank Varia, Ziling Yang:
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications. 326 - Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. 327 - Cécile Delerablée, Lénaïck Gouriou, David Pointcheval:
Attribute-Based Signatures with Advanced Delegation, and Tracing. 328 - Houda Ferradi:
How to Validate a Verification? 329 - Aron van Baarsen, Sihang Pu:
Fuzzy Private Set Intersection with Large Hyperballs. 330 - Maryam Bahrani, Pranav Garimidi, Tim Roughgarden:
Transaction Fee Mechanism Design in a Post-MEV World. 331 - Yuval Ishai, Yifan Song:
Leakage-Tolerant Circuits. 332 - Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the DME Signature Scheme. 333 - Jeremiah Blocki, Blake Holman, Seunghoon Lee:
The Impact of Reversibility on Parallel Pebbling. 334 - Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro:
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages. 335 - Khai Hanh Tang, Minh Pham, Chan Nam Ngo:
RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs. 336 - Valerie Gilchrist, Laurane Marco, Christophe Petit, Gang Tang:
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme. 337 - Itai Dinur:
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. 338 - Gianluca Brian, Stefan Dziembowski, Sebastian Faust:
From Random Probing to Noisy Leakages Without Field-Size Dependence. 339 - Brent Waters:
A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors. 340 - Leo de Castro, Keewoo Lee:
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers. 341 - Jiahui He, Kai Hu, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium. 342 - Yang Gao:
Partial Differential Fault Analysis on Ascon. 343 - Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. 344 - Guoqing Zhou, Maozhi Xu:
An Efficient Adaptive Attack Against FESTA. 345 - Maria Ferrara, Antonio Tortora, Maria Tota:
A data aggregation protocol based on TFHE. 346 - Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. 347 - David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, Tina Zhang:
A Computational Tsirelson's Theorem for the Value of Compiled XOR Games. 348 - Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on SHA-2. 349 - Yingxin Li, Fukang Liu, Gaoli Wang:
Automating Collision Attacks on RIPEMD-160. 350 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:
Improved Differential Meet-In-The-Middle Cryptanalysis. 351 - Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. 352 - Felicitas Hörmann, Wessel P. J. van Woerden:
FuLeakage: Breaking FuLeeca by Learning Attacks. 353 - Lev Soukhanov:
WARPfold : Wrongfield ARithmetic for Protostar folding. 354 - Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai:
Adaptively Secure Streaming Functional Encryption. 355 - Kai-Min Chung, Eli Goldin, Matthew Gray:
On Central Primitives for Quantum Cryptography with Classical Communication. 356 - Douglas Stebila:
Security analysis of the iMessage PQ3 protocol. 357 - Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, Debiao He:
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication. 358 - Caicai Chen, Chris Jones:
Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique. 359 - Yassine Hamoudi, Qipeng Liu, Makrand Sinha:
The NISQ Complexity of Collision Finding. 360 - Jiaxin Pan, Doreen Riepel, Runzhi Zeng:
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation. 361 - Shan Chen, Marc Fischlin:
Integrating Causality in Messaging Channels. 362 - Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel:
Time-Averaged Analysis of Selfish Mining in Bitcoin. 363 - Lars Ran, Simona Samardjiska, Monika Trimoska:
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem. 364 - Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Combined Threshold Implementation. 365 - Dipayan Das, Antoine Joux:
Key Recovery Attack on the Partial Vandermonde Knapsack Problem. 366 - Markku-Juhani O. Saarinen:
Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit. 367 - Anand Kumar Narayanan, Youming Qiao, Gang Tang:
Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants. 368 - David Heath, Vladimir Kolesnikov, Lucien K. L. Ng:
Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts. 369 - Daniel Escudero, Yifan Song, Wenhao Wang:
Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus. 370 - Seungjun Baek, Giyoon Kim, Jongsung Kim:
Preimage Attacks on Reduced-Round Ascon-Xof. 371 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan:
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate. 372 - Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, Uri Stemmer:
Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries. 373 - You Lyu, Shengli Liu, Shuai Han:
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World. 374 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search. 375 - Gilad Asharov, Anirudh Chandramouli:
Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS. 376 - Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert:
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking. 377 - Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, Ulrich Rührmair:
Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips. 378 - Elizabeth Crites, Aggelos Kiayias, Amirreza Sarencheh:
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity. 379 - Jan Buzek, Stefano Tessaro:
Collision Resistance from Multi-Collision Resistance for all Constant Parameters. 380 - Haotian Shi, Xiutao Feng:
Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure. 381 - Chirag Madaan, Rohan Agarwal, Vipul Saini, Ujjwal Kumar:
Decentralized Access Control Infrastructure for Enterprise Digital Asset Management. 382 - Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran:
Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers. 383 - Truman Welling, Onur Günlü, Aylin Yener:
Transmitter Actions for Secure Integrated Sensing and Communication. 384 - Michel Seck, Abderrahmane Nitaj:
A New Public Key Cryptosystem Based on the Cubic Pell Curve. 385 - Christopher Harth-Kitzerow, Georg Carle:
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings. 386 - Wenqing Hu, Tianyi Liu, Ye Zhang, Yuncong Zhang, Zhenfei Zhang:
Parallel Zero-knowledge Virtual Machine. 387 - Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang:
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding. 388 - Tomer Ashur, Carmit Hazay, Rahul Satish:
On the Feasibility of Sliced Garbling. 389 - Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev:
STIR: Reed-Solomon Proximity Testing with Fewer Queries. 390 - Daniel Escudero, Ivan Tjuawinata, Chaoping Xing:
On Information-Theoretic Secure Multiparty Computation with Local Repairability. 391 - Zhuang Shan, Leyou Zhang, Qing Wu:
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle. 392 - Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima:
Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409 in One Day. 393 - Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, Hongwei Wang:
A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System. 394 - Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos:
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators. 395 - Theresa Krüger:
On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology. 396 - Dan Boneh, Iftach Haitner, Yehuda Lindell:
Exponent-VRFs and Their Applications. 397 - Oana Ciobotaru, Maxim Peter, Vesselin Velichkov:
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK. 398 - Yanyi Liu, Rafael Pass:
A Direct PRF Construction from Kolmogorov Complexity. 399 - Max Duparc, Tako Boris Fouotsa, Serge Vaudenay:
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks. 400 - Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, Ron Steinfeld:
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures. 401 - Xinpeng Yang, Liang Cai, Yinghao Wang, Lu Sun, Jingwei Hu:
Efficient Unbalanced Quorum PSI from Homomorphic Encryption. 402 - Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira:
DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication. 403 - Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, Zheng Wu:
Breaking the DECT Standard Cipher with Lower Time Cost. 404 - Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Secret Sharing: Strong Security and Efficient Constructions. 405 - Damien Robert:
Some notes on algorithms for abelian varieties. 406 - Charlotte Lefevre, Bart Mennink:
Permutation-Based Hashing Beyond the Birthday Bound. 407 - Hongbo Wen, Hanzhi Liu, Shuyang Tang, Shuhan Cao, Domo, Yu Feng:
Modular Indexer: Fully User-Verified Execution Layer for Meta-Protocols on Bitcoin. 408 - Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa:
Nebula: A Privacy-First Platform for Data Backhaul. 409 - Hilarie Orman:
Recent Progress in Quantum Computing Relevant to Internet Security. 410 - Henry Bambury, Hugo Beguinet, Thomas Ricosset, Éric Sageloli:
Polytopes in the Fiat-Shamir with Aborts Paradigm. 411 - Slim Bettaieb, Alessandro Budroni, Marco Palumbi, Décio Luiz Gazzoni Filho:
Quasi-Optimal Permutation Ranking and Applications to PERK. 412 - Juan Carlos Ku-Cauich, Javier Diaz-Vargas, Sara Mandujano-Velazquez:
Bent functions construction using extended Maiorana-McFarland's class. 413 - Joseph Carolan, Alexander Poremba:
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations. 414 - Lei Fan, Zhenghao Lu, Hong-Sheng Zhou:
Column-wise Garbling, and How to Go Beyond the Linear Model. 415 - Wilson D. Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh:
Mangrove: A Scalable Framework for Folding-based SNARKs. 416 - Hongyuan Qu, Guangwu Xu:
An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic. 417 - Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko:
Atomic and Fair Data Exchange via Blockchain. 418 - Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, Anat Paskin-Cherniavsky:
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs. 419 - Noam Mazor, Rafael Pass:
Gap MCSP is not (Levin) NP-complete in Obfustopia. 420 - Xiangyu Hui, Sid Chi-Kin Chau:
LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup. 421 - Deepak Kumar Dalai, Krishna Mallick:
A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. 422 - Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan:
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores. 423 - Flavio Bergamaschi, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, Rui Tang:
On the Concrete Security of Approximate FHE with Noise-Flooding Countermeasures. 424 - Marshall Ball, Yanyi Liu, Noam Mazor, Rafael Pass:
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement. 425 - Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang:
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. 426 - Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. 427 - Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das:
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V. 428 - Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, Sacha Servan-Schreiber:
FOLEAGE: 픽4OLE-Based Multi-Party Computation for Boolean Circuits. 429 - Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang:
SoK: Zero-Knowledge Range Proofs. 430 - Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert:
Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version. 431 - Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra:
Perfect Asynchronous MPC with Linear Communication Overhead. 432 - Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling:
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience. 433 - Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption without Pairings. 434 - Emanuele Giunta, Alistair Stewart:
Unbiasable Verifiable Random Functions. 435 - Conrado Porto Lopes Gouvêa, Chelsea Komlo:
Re-Randomized FROST. 436 - Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. 438 - Enrico Piccione:
Threshold implementations of cryptographic functions between finite Abelian groups. 439 - Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau:
Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA. 440 - Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet:
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields. 441 - Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang:
Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking. 442 - Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. 443 - Mario Yaksetig:
A trust-minimized e-cash for cryptocurrencies. 444 - Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy:
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions. 445 - Ahmed S. Bendary, Wendson A. S. Barbosa, Andrew Pomerance, C. Emre Koksal:
Estimating the Unpredictability of Multi-Bit Strong PUF Classes. 446 - Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, Sebastian Steinhorst:
ORIGO: Proving Provenance of Sensitive Data with Constant Communication. 447 - Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey:
Differential Cryptanalysis of a Lightweight Block Cipher LELBC. 448 - Nabil Alkeilani Alkadri, Nico Döttling, Sihang Pu:
Practical Lattice-Based Distributed Signatures for a Small Number of Signers. 449 - Ward Beullens, Lucas Dodgson, Sebastian H. Faller, Julia Hesse:
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations. 450 - Louis Tremblay Thibault, Michael Walter:
Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2. 451 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Modeling Mobile Crash in Byzantine Consensus. 452 - Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang:
Verifiable Information-Theoretic Function Secret Sharing. 453 - Zhengjun Cao, Zhenfu Cao:
The Systemic Errors of Banded Quantum Fourier Transformation. 454 - Connor Bell, Saba Eskandarian:
Anonymous Complaint Aggregation for Secure Messaging. 455 - Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam:
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction. 456 - Lena Heimberger, Florian Lugstein, Christian Rechberger:
Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern. 457 - Maya Chartouny, Benoit Cogliati, Jacques Patarin:
Classical and Quantum Generic Attacks on 6-round Feistel Schemes. 458 - Luca De Feo, Tako Boris Fouotsa, Lorenz Panny:
Isogeny problems with level structure. 459 - Lorenzo Rovida, Alberto Leporati:
Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption. 460 - Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch:
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. 461 - Tom Gur, Jack O'Connor, Nicholas Spooner:
Perfect Zero-Knowledge PCPs for #P. 462 - Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, Bahattin Yildiz:
Security Guidelines for Implementing Homomorphic Encryption. 463 - Doryan Lesaignoux, Mikael Carmona:
On the Implementation of a Lattice-Based Daa for VANET System. 464 - Dung Bui:
Shorter VOLEitH Signature from Multivariate Quadratic. 465 - Chelsea Komlo, Ian Goldberg:
Arctic: Lightweight and Stateless Threshold Schnorr Signatures. 466 - Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu:
Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures. 467 - Matthias Johann Steiner:
Zero-Dimensional Gröbner Bases for Rescue-XLIX. 468 - Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Malicious Security for Sparse Private Histograms. 469 - Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud:
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations. 470 - Silvia Sconza, Arno Wildi:
Knot-based Key Exchange protocol. 471 - Nibesh Shrestha, Aniket Kate, Kartik Nayak:
Sailfish: Towards Improving Latency of DAG-based BFT. 472 - Mario Yaksetig:
Extremely Simple (Almost) Fail-Stop ECDSA Signatures. 473 - Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, William Wang:
Accumulation without Homomorphism. 474 - Matthew Gregoire, Rachel Thomas, Saba Eskandarian:
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs. 475 - Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, Jinsong Han:
OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning. 476 - Zheyuan He, Zihao Li, Sen Yang:
Large Language Models for Blockchain Security: A Systematic Literature Review. 477 - Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, Jian Wang, Jingyi Feng:
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions. 478 - Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang:
Making Hash-based MVBA Great Again. 479 - Wilbert Wu:
Folding-based zkLLM. 480 - Charlotte Hoffmann, Krzysztof Pietrzak:
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation. 481 - Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou:
Single Server PIR via Homomorphic Thorp Shuffles. 482 - Orhun Kara:
Lower data attacks on Advanced Encryption Standard. 483 - Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin:
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives. 484 - Florette Martinez:
A Variation on Knellwolf and Meier's Attack on the Knapsack Generator. 485 - Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Encryption: New Constructions and Homomorphic Realizations. 486 - Zvika Brakerski, Nir Magrafta:
Real-Valued Somewhat-Pseudorandom Unitaries. 487 - Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. 488 - Zhe Cen, Xiutao Feng, Zhangyi Wang, Yamin Zhu, Chunping Cao:
Guess and Determine Analysis Based on Set Split. 489 - Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl:
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. 490 - Christian Badertscher, Monosij Maitra, Christian Matt, Hendrik Waldner:
Updatable Policy-Compliant Signatures. 491 - Cameron Foreman, Richie Yeung, Florian J. Curchod:
Statistical testing of random number generators and their improvement using randomness extraction. 492 - Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac:
Reckle Trees: Updatable Merkle Batch Proofs with Applications. 493 - István Vajda:
HW-token-based Common Random String Setup. 494 - Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-code-based Signature Schemes. 495 - Thomas Espitau, Shuichi Katsumata, Kaoru Takemure:
Two-Round Threshold Signature from Algebraic One-More Learning with Errors. 496 - István Vajda:
On the Security of Data Markets and Private Function Evaluation. 497 - Jingwei Hu, Yuhong Fang, Wangchen Dai:
Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology. 498 - Jonas Meers, Doreen Riepel:
CCA Secure Updatable Encryption from Non-Mappable Group Actions. 499 - Scott R. Fluhrer:
Side Channel Resistant Sphincs+. 500 - Kwangsu Lee:
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation. 501 - Neyire Deniz Sarier:
Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain. 502 - Alexander Bienstock, Kevin Yeo:
Two Levels are Better than One: Dishonest Majority MPC with $\widetilde{O}(|C|)$ Total Communication. 503 - Benjamin E. Diamond, Jim Posen:
Polylogarithmic Proofs for Multilinears over Binary Towers. 504 - Victor Youdom Kemmoe, Anna Lysyanskaya:
RSA-Based Dynamic Accumulator without Hashing into Primes. 505 - Olive Chakraborty, Aymen Boudguiga:
A Decentralized Federated Learning using Reputation. 506 - Jehyuk Jang, Jamie Judd:
An Efficient SNARK for Field-Programmable and RAM Circuits. 507 - Jules Maire, Damien Vergnaud:
Secure Multi-Party Linear Algebra with Perfect Correctness. 508 - Eli Orvis:
Distribution of cycles in supersingular ℓ-isogeny graphs. 509 - Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang:
DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. 510 - Cezary Pilaszewicz, Lea R. Muth, Marian Margraf:
A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes. 511 - Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, Shuyi Chen:
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium. 512 - Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo:
Quantum Implementation and Analysis of SHA-2 and SHA-3. 513 - Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, Shixiao Sun:
Zero-Knowledge Proof Vulnerability Analysis and Security Auditing. 514 - Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang:
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE. 515 - Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang:
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages. 516 - Damien Robert:
Fast pairings via biextensions and cubical arithmetic. 517 - Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho:
Software-Defined Cryptography: A Design Feature of Cryptographic Agility. 518 - Sulaiman Alhussaini, Sergei Sergeev:
On implementation of Stickel's key exchange protocol over max-min and max-T semirings. 519 - Fernando Virdia, Mia Filic:
A note on securing insertion-only Cuckoo filters. 520 - Tomoki Moriya:
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram. 521 - Mahender Kumar:
Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. 522 - Sophie Schmieg:
Unbindable Kemmy Schmidt: ML-KEM is neither MAL-BIND-K-CT nor MAL-BIND-K-PK. 523 - Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Andrew Zitek-Estrada:
A Time-Space Tradeoff for the Sumcheck Prover. 524 - Marina Blanton, Dennis Murphy:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. 525 - Yi-Hsiu Chen, Yehuda Lindell:
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero-Knowledge. 526 - Taechan Kim:
Slice more? It leaks: Analysis on the paper "On the Feasibility of Sliced Garbling". 527 - Momonari Kudo, Kazuhiro Yokoyama:
The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences. 528 - Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, Younho Lee:
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest. 529 - Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay:
An efficient key generation algorithm for GR-NTRU over dihedral group. 530 - Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Celestin Nkuimi Jugnia:
Avoiding Trusted Setup in Isogeny-based Commitments. 531 - Martin R. Albrecht, Kenneth G. Paterson:
Analysing Cryptography in the Wild - A Retrospective. 532 - Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame:
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation. 533 - Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. 534 - Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei:
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree. 535 - Mihir Bellare, Doreen Riepel, Laura Shea:
Highly-Effective Backdoors for Hash Functions and Beyond. 536 - Wenxuan Wu, Soamar Homsi, Yupeng Zhang:
Confidential and Verifiable Machine Learning Delegations on the Cloud. 537 - Qiping Lin, Fengmei Liu:
A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99. 538 - Daniel Larsson:
Supersingular Hashing using Lattès Maps. 539 - Russell W. F. Lai, Giulio Malavolta:
Lattice-Based Timed Cryptography. 540 - Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank. 541 - Jun Xu, Zhiwei Li, Lei Hu:
Breaking Bicoptor from S&P 2023 Based on Practical Secret Recovery Attack. 542 - Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin:
A Note on the Common Haar State Model. 543 - Novak Kaluderovic, Nan Cheng, Katerina Mitrokotsa:
A post-quantum Distributed OPRF from the Legendre PRF. 544 - Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian:
Optimal Asynchronous Byzantine Consensus with Fair Separability. 545 - Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. 546 - Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, Harshal Shah:
Efficient Permutation Correlations and Batched Random Access for Two-Party Computation. 547 - Décio Luiz Gazzoni Filho, Tomás Recio, Julio López:
Efficient isochronous fixed-weight sampling with applications to NTRU. 548 - Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang:
Integral Attack on the Full FUTURE Block Cipher. 549 - Mustafa Khairallah:
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. 550 - Nimish Mishra, Debdeep Mukhopadhyay:
Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography. 551 - Mario Yaksetig:
Insights from building a blockchain-based metaverse. 552 - Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang:
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations. 553 - Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song:
Leakage-Abuse Attacks Against Structured Encryption for SQL. 554 - Yilei Chen:
Quantum Algorithms for Lattice Problems. 555 - Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann:
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. 556 - Charlotte Lefevre, Bart Mennink:
Permutation-Based Hash Chains with Application to Password Hashing. 557 - Damien Robissout, Lilian Bossuet, Amaury Habrard:
Scoring the predictions: a way to improve profiling side-channel attacks. 558 - Axel Mertens, Georgio Nicolas, Sergi Rovira:
Convolution-Friendly Image Compression in FHE. 559 - Robin Berger, Felix Dörre, Alexander Koch:
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption. 560 - Farzin Renan, Péter Kutas:
SQIAsignHD: SQIsignHD Adaptor Signature. 561 - Harjasleen Malvai, Gregory Neven, Andrew Miller, Siam Hussain:
Practical Proofs of Parsing for Context-free Grammars. 562 - Xavier Bonnetain, Virginie Lallemand:
A Note on Related-Tweakey Impossible Differential Attacks. 563 - Alexander May, Massimo Ostuzzi:
Multiple Group Action Dlogs with(out) Precomputation. 564 - Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun:
On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver. 565 - Foo Yee Yeo, Jason H. M. Ying:
A Near-Linear Quantum-Safe Third-Party Private Set Intersection Protocol. 566 - Aron van Baarsen, Marc Stevens:
Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting. 567 - Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl:
Communication-Efficient Multi-Party Computation for RMS Programs. 568 - Johannes Ottenhues:
An overview of symmetric fuzzy PAKE protocols. 569 - Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang:
Large-Scale Private Set Intersection in the Client-Server Setting. 570 - Thomas Locher, Victor Shoup:
MiniCast: Minimizing the Communication Complexity of Reliable Broadcast. 571 - Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark W. Barrett, Isil Dillig:
Split Gröbner Bases for Satisfiability Modulo Finite Fields. 572 - Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. 573 - Jannik Zeitschner, Amir Moradi:
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software. 574 - Shiping Cai, Kaizhan Lin, Chang-An Zhao:
Pairing Optimizations for Isogeny-based Cryptosystems. 575 - Ivan Buchinskiy, Matvei Kotov, Alexander Treier:
On complexity of the problem of solving systems of tropical polynomial equations of degree two. 576 - Said Eddahmani, Sihem Mesnager:
Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box. 577 - José Luis Crespo, Javier González-Villa, Jaime Gutierrez, Angel Valle:
Assessing the quality of Random Number Generators through Neural Networks. 578 - Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Tight Multi-user Security of Ascon and Its Large Key Extension. 579 - Duy Nguyen:
Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model. 580 - JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, GyuSang Kim, Suhri Kim, Heeseok Kim, Seokhie Hong:
Fault Attack on SQIsign. 581 - Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, Peter Rindal:
Improved Alternating Moduli PRFs and Post-Quantum Signatures. 582 - Omri Shmueli:
A Note on Quantum Algorithms for Lattice Problems. 583 - Jianming Lin, Weize Wang, Chang-An Zhao, Yuhao Zheng:
Efficient Implementations of Square-root Vélu's Formulas. 584 - Ardianto Satriawan, Rella Mareta:
A Complete Beginner Guide to the Number Theoretic Transform (NTT). 585 - Yongge Wang:
Encryption Based Covert Channel for Large Language Models. 586 - Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation. 587 - Simon Erfurth:
Digital Signatures for Authenticating Compressed JPEG Images. 588 - Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz:
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training. 589 - Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks. 590 - Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl:
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures. 591 - Daniel J. Bernstein:
Asymptotics for the standard block size in primal lattice attacks: second order, formally verified. 592 - George Teseleanu:
The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem. 593 - Enrico Bottazzi:
Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation. 594 - Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob and C. 595 - Sidoine Juicielle Kambiré, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Daniel Tieudjo, Djiby Sow:
Cryptanalysis of signature schemes based on the root extraction problem over braid group. 596 - Gewu Bu, Serge Fdida, Maria Potop-Butucaru, Bilel Zaghdoudi:
Blockchain-based decentralized identity system: Design and security analysis. 597 - Ganyuan Cao:
A Characterization of AE Robustness as Decryption Leakage Indistinguishability. 598 - Shany Ben-David:
Probabilistically Checkable Arguments for all NP. 599 - Mustafa Khairallah:
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-. 600 - Henry Bambury, Phong Q. Nguyen:
Improved Provable Reduction of NTRU and Hypercubic Lattices. 601 - Amos Beimel, Oriol Farràs, Oded Nir:
Secret-Sharing Schemes for High Slices. 602 - Divesh Aggarwal, Leong Jin Ming, Alexandra Veliche:
Worst-Case to Average-Case Hardness of LWE: A Simple and Practical Perspective. 603 - Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. 604 - Léo Perrin:
Security Analysis of XHASH8/12. 605 - Sam Gunn, Yael Tauman Kalai, Anand Natarajan, Agi Villanyi:
Classical Commitments to Quantum States. 606 - Truman Welling, Onur Günlü, Aylin Yener:
Low-latency Secure Integrated Sensing and Communication with Transmitter Actions. 607 - Zhengjun Cao, Lihua Liu:
The Practical Advantage of RSA over ECC and Pairings. 608 - Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, Brice Minaud:
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes. 609 - Min Xie, Peichen Ju, Yanqi Zhao, Zoe L. Jiang, Junbin Fang, Yong Yu, Xuan Wang:
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation. 610 - Ward Beullens, Pierre Briaud, Morten Øygarden:
A Security Analysis of Restricted Syndrome Decoding Problems. 611 - Gurgen Arakelov, Nikita Kaskov, Daria Pianykh, Yuriy Polyakov:
FHERMA: Building the Open-Source FHE Components Library for Practical Use. 612 - Jie Xie, Yuncong Hu, Yu Yu:
Hadamard Product Argument from Lagrange-Based Univariate Polynomials. 613 - Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav:
Non-interactive Blind Signatures from Lattices. 614 - Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang:
Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA. 615 - Hyeonbum Lee, Seunghun Paik, Hyunjung Son, Jae Hong Seo:
Cougar: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption. 616 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie:
Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions. 617 - Yuncong Zhang, Shifeng Sun, Dawu Gu:
Efficient KZG-based Univariate Sum-check and Lookup Argument. 618 - Huiqiang Liang, Haining Lu, Geng Wang:
BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison. 619 - Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. 620 - Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh:
How to Lose Some Weight - A Practical Template Syndrome Decoding Attack. 621 - Roozbeh Sarenche, Svetla Nikova, Bart Preneel:
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols. 622 - Elif Ozbay Gurler, Hüseyin Hisil:
Complete group law for genus 2 Jacobians on Jacobian coordinates. 623 - Andrea Basso:
POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies. 624 - Masaya Nanri, Octavio Perez Kempner, Mehdi Tibouchi, Masayuki Abe:
Interactive Threshold Mercurial Signatures and Applications. 625 - Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, Shibdas Roy:
Exponential Quantum Speedup for the Traveling Salesman Problem. 626 - Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos:
Distributed & Scalable Oblivious Sorting and Shuffling. 627 - Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. 628 - Cédric Pilatte:
Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms. 629 - Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, Chris Waddell:
Conditional disclosure of secrets with quantum resources. 630 - Tahoura Mosavirik, Shahin Tajik:
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring. 631 - Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. 632 - Tomer Ashur, Mohammad Mahzoun, Jim Posen, Danilo Sijacic:
Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields. 633 - Robin Jadoul, Axel Mertens, Jeongeun Park, Hilder V. L. Pereira:
NTRU-based FHE for Larger Key and Message Space. 634 - Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. 635 - Seyoon Ragavan:
Regev Factoring Beyond Fibonacci: Optimizing Prefactors. 636 - Marshall Ball, Juan A. Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos:
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity. 637 - Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual and transitive authentication mechanism for IoT network". 638 - Dustin Ray, Caroline El Jazmi:
Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning. 639 - Andrija Novakovic, Liam Eagen:
On Proving Pairings. 640 - Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan:
Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon. 641 - Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
GraphOS: Towards Oblivious Graph Processing. 642 - Giulio Malavolta:
Key-Homomorphic and Aggregate Verifiable Random Functions. 643 - Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, Ming-Shing Chen:
Jumping for Bernstein-Yang Inversion. 644 - Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh:
Toward Independent Key Encryption based on Q-Problem. 645 - Sanchita Ghosh, Anant Sharma, Sreetama Das, Shibdas Roy:
Efficient Quantum Algorithm for SUBSET-SUM Problem. 646 - Pierrick Méaux:
Weightwise (almost) perfectly balanced functions based on total orders. 647 - B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. 648 - Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. 649 - Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-based Direct Anonymous Attestation. 650 - Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-based Enhanced Privacy ID Signature Scheme. 651 - Samuel Lavery:
Compact and Secure Zero-Knowledge Proofs for Quantum-Resistant Cryptography from Modular Lattice Innovations. 652 - Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, Ling Ren:
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT. 653 - Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen:
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification. 654 - Davide Carnemolla, Dario Catalano, Mario Di Raimondo, Federico Savasta:
Implementation and Performance Analysis of Homomorphic Signature Schemes. 655 - Vincent Rijmen:
Cryptanalytic Audit of the XHash Sponge Function and its Components. 656 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. 657 - Tim Beyne, Yu Long Chen:
Information-theoretic security with asymmetries. 658 - Thijs Veugen, Vincent Dunning, Michiel Marcus, Bart Kamphorst:
Secure Latent Dirichlet Allocation. 659 - Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas:
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. 660 - Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, Michal Zajac:
On amortization techniques for FRI-based SNARKs. 661 - Kelong Cong, Jiayi Kang, Georgio Nicolas, Jeongeun Park:
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption. 662 - Xinwei Yong, Jiaojiao Wu, Jianfeng Wang:
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. 663 - Xin Wang, Haochen Wang, Haibin Zhang, Sisi Duan:
Pando: Extremely Scalable BFT Based on Committee Sampling. 664 - Amit Deo, Marc Joye, Benoît Libert, Benjamin R. Curtis, Mayeul de Bellabre:
Homomorphic Evaluation of LWR-based PRFs and Application to Transciphering. 665 - Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa:
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. 666 - Karoline Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, Alice Bowman:
Agile, Post-quantum Secure Cryptography in Avionics. 667 - Abdoulaye Ndiaye:
Blockchain Price vs. Quantity Controls. 668 - Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla:
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses. 669 - Raja Adhithan RadhaKrishnan:
Secure Implementation of SRAM PUF for Private Key Generation. 670 - Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, Asja Fischer:
Exploiting Internal Randomness for Privacy in Vertical Federated Learning. 671 - Shanuja Sasi, Onur Günlü:
Secure Coded Distributed Computing. 672 - Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B. 673 - Wyatt Benno:
SigmaSuite: How to Minimize Foreign Arithmetic in ZKP Circuits While Keeping Succinct Final Verification. 674 - Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, Meghna Sengupta:
Olympic Privacy-Preserving Blueprints: Faster Communication, Highly Functional, Stronger Security. 675 - Karim Eldefrawy, Benjamin Terner, Moti Yung:
Composing Timed Cryptographic Protocols: Foundations and Applications. 676 - Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup:
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography. 677 - Douglas Stebila, Spencer Wilson:
Quantum-Safe Account Recovery for WebAuthn. 678 - Martin Feussner, Igor Semaev:
Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures. 679 - Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, Aayush Yadav:
Universal Vector Commitments. 680 - Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV:
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security. 681 - Wutichai Chongchitmate, Steve Lu, Rafail Ostrovsky:
Approximate PSI with Near-Linear Communication. 682 - Zhengjun Cao, Lihua Liu:
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE". 683 - Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc Viet Le, Mohsen Minaei, Ranjit Kumaresan, Mahdi Zamani:
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains. 684 - Nicolas Alhaddad, Leonid Reyzin, Mayank Varia:
Committing AVID with Partial Retrieval and Optimal Storage. 685 - Ian Malloy:
Unstructured Inversions of New Hope. 686 - Nicholas Brandt:
Levin-Kolmogorov Complexity is not in Linear Time. 687 - Hoeteck Wee, David J. Wu:
Succinct Functional Commitments for Circuits from k-Lin. 688 - Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models. 689 - Alex Charlès, Aleksei Udovenko:
LPN-based Attacks in the White-box Setting. 690 - Alex Charlès, Aleksei Udovenko:
White-box filtering attacks breaking SEL masking: from exponential to polynomial time. 691 - Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, Dionysis Zindros:
Blink: An Optimal Proof of Proof-of-Work. 692 - Pierre Briaud:
A Note of Anemoi Gröbner Bases. 693 - Jesko Dujmovic, Mohammad Hajiabadi:
Lower-Bounds on Public-Key Operations in PIR. 694 - Richard Wassmer:
Beale Cipher 1 and Cipher 3: Numbers With No Messages. 695 - Victor Shoup:
A Theoretical Take on a Practical Consensus Protocol. 696 - Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov:
LINE: Cryptosystem based on linear equations for logarithmic signatures. 697 - Vladimir Braverman, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky:
Private Computations on Streaming Data. 698 - Elijah Pelofske:
An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization. 699 - Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song:
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over ℤ2k without Ring Extensions. 700 - Tomoyuki Morimae, Shogo Yamada, Takashi Yamakawa:
Quantum Unpredictability. 701 - Rune Fiedler, Felix Günther:
Security Analysis of Signal's PQXDH Handshake. 702 - Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, Jiaheng Zhang:
An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks. 703 - Krishnendu Chatterjee, Amirali Ebrahim-Zadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, Dorde Zikelic:
Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains. 704 - Remco Bloemen, Daniel Kales, Philipp Sippl, Roman Walch:
Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users. 705 - Zahra Javar, Bruce M. Kapron:
Linicrypt in the Ideal Cipher Model. 706 - Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, Rosario Cammarota:
Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators. 707 - Nicolai Müller, Amir Moradi:
Automated Generation of Fault-Resistant Circuits. 708 - Justine Paillet, Pierre-Augustin Berthet, Cédric Tavernier:
Masked Computation the Floor Function and its Application to the FALCON Signature. 709 - Samed Düzlü, Rune Fiedler, Marc Fischlin:
BUFFing FALCON without Increasing the Signature Size. 710 - F. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Non-Transferable Anonymous Tokens by Secret Binding. 711 - Hyunji Kim, Kyungbae Jang, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo:
Quantum NV Sieve on Grover for Solving Shortest Vector Problem. 712 - Leizhang Wang:
Analyzing Pump and jump BKZ algorithm using dynamical systems. 713 - Shanxiang Lyu, Ling Liu, Cong Ling:
Learning with Quantization, Polar Quantizer, and Secure Source Coding. 714 - Ali Mahdoum:
A New Cryptographic Algorithm. 715 - Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu:
Unclonable Secret Sharing. 716 - Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, Ida Tucker:
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. 717 - Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas:
PAC-Private Algorithms. 718 - Hoang-Dung Nguyen, Jorge Guajardo, Thang Hoang:
Client-Efficient Online-Offline Private Information Retrieval. 719 - Ward Beullens:
Multivariate Blind Signatures Revisited. 720 - Antonio Faonio, Dario Fiore, Luigi Russo:
Real-world Universal zkSNARKs are non-malleable. 721 - Tim Beyne, Michiel Verbauwhede:
Ultrametric integral cryptanalysis. 722 - Harish Karthikeyan, Antigoni Polychroniadou:
OPA: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning. 723 - Alessandro Chiesa, Giacomo Fenzi:
zkSNARKs in the ROM with Unconditional UC-Security. 724 - Nilanjan Datta, Shreya Dey, Avijit Dutta, Devdutto Kanungo:
Multi User Security of LightMAC and LightMAC_Plus. 725 - Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida:
Challenger: Blockchain-based Massively Multiplayer Online Game Architecture. 726 - Joseph Jaeger:
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise. 727 - Annalisa Barbara, Alessandro Chiesa, Ziyi Guan:
Relativized Succinct Arguments in the ROM Do Not Exist. 728 - Isheeta Nargis, Anwar Hasan:
Covert Adaptive Adversary Model: A New Adversary Model for Multiparty Computation. 729 - André Chailloux, Thomas Debris-Alazard:
New Solutions to Delsarte's Dual Linear Programs. 730 - Wonseok Choi, Jooyoung Lee, Yeongmin Lee:
Tight Security of Double-Block Nonce-Based MACs. 731 - Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, Jinwei Zheng:
Compact Encryption based on Module-NTRU problems. 732 - Zhongtang Luo, Yanxue Jia, Yaobin Shen, Aniket Kate:
Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability. 733 - Aram Jivanyan, Karen Terjanian:
Proof of Stake and Activity: Rewarding On-Chain Activity Through Consensus. 734 - Isheeta Nargis, Anwar Hasan:
Secure Multiparty Computation in the Presence of Covert Adaptive Adversaries. 735 - James Bartusek, Justin Raizes:
Secret Sharing with Certified Deletion. 736 - Rishab Goyal:
Mutable Batch Arguments and Applications. 737 - Prabhanjan Ananth, Zihan Hu, Zikuan Huang:
Quantum Key-Revocable Dual-Regev Encryption, Revisited. 738 - Ziyu Zhao, Jintai Ding, Bo-Yin Yang:
BGJ15 Revisited: Sieving with Streamed Memory Access. 739 - Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Public Inputs and Strong Security. 740 - Rune Fiedler, Christian Janson:
A Deniability Analysis of Signal's Initial Handshake PQXDH. 741 - David Pointcheval:
Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy. 742 - Kai Hu:
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings - with a Break-Fix Strategy. 743 - Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, Kentaro Mihara:
An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator. 744 - Mingyu Cho, Woohyuk Chung, Jincheol Ha, Jooyoung Lee, Eun-Gyeol Oh, Mincheol Son:
FRAST: TFHE-friendly Cipher Based on Random S-boxes. 745 - Céline Chevalier, Guirec Lebrun, Ange Martinelli, Jérôme Plût:
The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS. 746 - Martin R. Albrecht, Joe Rowell:
Scaling Lattice Sieves across Multiple Machines. 747 - Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, Marco Palumbi:
PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem. 748 - Rachit Garg, George Lu, Brent Waters, David J. Wu:
Reducing the CRS Size in Registered ABE Systems. 749 - Xinxin Fan, Veronika Kuchta, Francesco Sica, Lei Xu:
Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs. 750 - Prabhanjan Ananth, Fatih Kaleoglu, Henry Yuen:
Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography. 751 - Aurore Guillevic:
More Embedded Curves for SNARK-Pairing-Friendly Curves. 752 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung:
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption. 753 - Allison Bishop, Hayder Tirmazi:
Adversary Resilient Learned Bloom Filters. 754 - Barbara Gigerl, Florian Mendel, Martin Schläffer, Robert Primas:
Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice. 755 - Dennis Dayanikli, Anja Lehmann:
(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting. 756 - Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. 757 - John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier A. Verbel, Luis Villota:
Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields. 758 - Aloni Cohen, Alexander Hoover, Gabe Schoenbach:
Enhancing Watermarked Language Models to Identify Users. 759 - Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, Benjamin Wesolowski:
SQIsign2D-West: The Fast, the Small, and the Safer. 760 - Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu:
Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage. 761 - Sora Suegami:
Extractable Witness Encryption for Signed Vector Digests from Pairings and Trust-Scalable One-Time Programs. 762 - Yu Morishima, Masahiro Kaminaga:
On SIS-problem-based random Feistel ciphers and its statistical evaluation of resistance against differential cryptanalysis. 763 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Decentralized Multi-Client Functional Encryption with Strong Security. 764 - Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, Elaine Shi:
Information-Theoretic Multi-Server PIR with Global Preprocessing. 765 - Ziyi Guan, Artur Riazanov, Weiqiang Yuan:
Breaking Verifiable Delay Functions in the Random Oracle Model. 766 - Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Damien Stehlé:
Bootstrapping Bits with CKKS. 767 - Denis Firsov, Benjamin Livshits:
The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation. 768 - Damiano Abram, Lawrence Roy, Mark Simkin:
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More. 769 - Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, Benedikt Wagner:
Sublinear-Round Broadcast without Trusted Setup. 770 - Kohei Nakagawa, Hiroshi Onuki:
SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies. 771 - Oriol Farràs, Miquel Guiot:
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation. 772 - Max Duparc, Tako Boris Fouotsa:
SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies. 773
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.