All papers
On the Efficiency of Generic, Quantum Cryptographic Constructions
Keita Xagawa
Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA
Loïs Huguenin-Dumittan, Serge Vaudenay
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López
Proximity Testing with Logarithmic Randomness
Benjamin E. Diamond, Jim Posen
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures
Marloes Venema, Leon Botros
Verifiable Encryption from MPC-in-the-Head
Akira Takahashi, Greg Zaverucha
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation
Dan Boneh, Benedikt Bünz, Ben Fisch
Optimizations and Practicality of High-Security CSIDH
Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers
Bit Security as Cost to Demonstrate Advantage
Keewoo Lee
A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves
Thomas Pornin
CCA Security with Short AEAD Tags
Mustafa Khairallah
Computing isogenies between finite Drinfeld modules
Benjamin Wesolowski
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers
Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
Understanding binary-Goppa decoding
Daniel J. Bernstein
Simple Two-Message OT in the Explicit Isogeny Model
Emmanuela Orsini, Riccardo Zanotto
Feldman's Verifiable Secret Sharing for a Dishonest Majority
Yi-Hsiu Chen, Yehuda Lindell
Post-Quantum Ready Key Agreement for Aviation
Marcel Tiepelt, Christian Martin, Nils Maeurer
Broadcast Encryption using Sum-Product decomposition of Boolean functions
Aurélien Dupin, Simon Abelard
How to Make Rational Arguments Practical and Extractable
Matteo Campanelli, Chaya Ganesh, Rosario Gennaro
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira
X-Wing The Hybrid KEM You've Been Looking For
Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan
New Attacks on LowMC Using Partial Sets in the Single-Data Setting
Subhadeep Banik, Andrea Caforio, Serge Vaudenay
A provably masked implementation of BIKE Key Encapsulation Mechanism
Loïc Demange, Mélissa Rossi
Verifiable FHE via Lattice-based SNARKs
Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability
Yehuda Lindell
Computing 2-isogenies between Kummer lines
Damien Robert, Nicolas Sarkis
On the Two-sided Permutation Inversion Problem
Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi
Survey: Recovering cryptographic keys from partial information, by example
Gabrielle De Micheli, Nadia Heninger
Secure Multi-Party Linear Algebra with Perfect Correctness
Jules Maire, Damien Vergnaud
Preliminary Cryptanalysis of the Biscuit Signature Scheme
Charles Bouillaguet, Julia Sauvage
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation
Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
Samuel Bouaziz–Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu
All volumes
Volume | Issues |
---|---|
1 | 1 (32 papers) |